Je Sen Teh

About Je Sen Teh

Je Sen Teh, With an exceptional h-index of 20 and a recent h-index of 20 (since 2020), a distinguished researcher at Universiti Sains Malaysia, specializes in the field of Cryptology, Cryptography, Cryptanalysis, Symmetric-key Cryptography, Symmetric Cryptography.

His recent articles reflect a diverse array of research interests and contributions to the field:

Towards accurate keyspace analysis of chaos-based image ciphers

On the resistance of new lightweight block ciphers against differential cryptanalysis

A new image encryption algorithm based on DNA state machine for UAV data encryption

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22 …

Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

Meet-in-the-Filter and Dynamic Counting with Applications to Speck

A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

Je Sen Teh Information

University

Position

Senior Lecturer/Assistant Professor at

Citations(all)

1598

Citations(since 2020)

1556

Cited By

448

hIndex(all)

20

hIndex(since 2020)

20

i10Index(all)

29

i10Index(since 2020)

29

Email

University Profile Page

Google Scholar

Je Sen Teh Skills & Research Interests

Cryptology

Cryptography

Cryptanalysis

Symmetric-key Cryptography

Symmetric Cryptography

Top articles of Je Sen Teh

Title

Journal

Author(s)

Publication Date

Towards accurate keyspace analysis of chaos-based image ciphers

Multimedia Tools and Applications

Abubakar Abba

Je Sen Teh

Moatsum Alawida

2024/3/2

On the resistance of new lightweight block ciphers against differential cryptanalysis

Heliyon

Yen Yee Chan

Cher-Yin Khor

Boo Tap Khoo

Je Sen Teh

Wei Jian Teng

...

2023/4/1

A new image encryption algorithm based on DNA state machine for UAV data encryption

Drones

Moatsum Alawida

Je Sen Teh

Wafa’Hamdan Alshoura

2023/1/5

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22 …

Jianying Zhou

Lejla Batina

Zengpeng Li

Jingqiang Lin

Eleonora Losiouk

...

2023/10/3

Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN

Cryptology ePrint Archive

Alex Biryukov

Je Sen Teh

Aleksei Udovenko

2023

On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM

Journal of Information Security and Applications

Wei Jian Teng

Je Sen Teh

Norziana Jamil

2023/8/1

Meet-in-the-Filter and Dynamic Counting with Applications to Speck

Alex Biryukov

Luan Cardoso dos Santos

Je Sen Teh

Aleksei Udovenko

Vesselin Velichkov

2023/5/29

A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

Journal of King Saud University-Computer and Information Sciences

Moatsum Alawida

Je Sen Teh

Abid Mehmood

Abdulhadi Shoufan

2022/11/1

New differential cryptanalysis results for the lightweight block cipher BORON

Journal of Information Security and Applications

Je Sen Teh

Li Jing Tham

Norziana Jamil

Wun-She Yap

2022/5/1

Differential cryptanalysis of lightweight block ciphers SLIM and LCB

Yen Yee Chan

Cher-Yin Khor

Je Sen Teh

Wei Jian Teng

Norziana Jamil

2022/10/29

Differential Cryptanalysis of WARP

Journal of Information Security and Applications

Je Sen Teh

Alex Biryukov

2022

BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning

Security and Communication Networks

Collins Chimeleze

Norziana Jamil

Roslan Ismail

Kwok-Yan Lam

Je Sen Teh

...

2022/10/11

An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

International Journal of Computers and Applications

Dyala R Ibrahim

Rosni Abdullah

Je Sen Teh

2022/7/3

Gradient-Boosted Convolutional Neural Network Malware Detection Technique for Android Smartphones

Collins U Chimeleze

Norziana Jamil

Je Sen Teh

Fiza Abdul Rahim

Zaihisma Che Cob

2022/11/28

SIM-P—A Simplified Consensus Protocol Simulator: Applications to Proof of Reputation-X and Proof of Contribution

IEEE Internet of Things Journal

Damilare Peter Oyinloye

Je Sen Teh

Norziana Jamil

Jiashen Teh

2022/11/14

Automated enumeration of block cipher differentials: an optimized branch-and-bound GPU framework

Journal of Information Security and Applications

Wei-Zhu Yeoh

Je Sen Teh

Jiageng Chen

2022/3/1

A deep learning approach for active S-box prediction of lightweight generalized feistel block ciphers

IEEE Access

Mohamed Fadl Idris

Je Sen Teh

Jasy Liew Suet Yan

Wei-Zhu Yeoh

2021/7/26

A novel hash function based on a chaotic sponge and DNA sequence

IEEE Access

Moatsum Alawida

Azman Samsudin

Nancy Alajarmeh

Je Sen Teh

Musheer Ahmad

...

2021/1/8

Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization

Dyala Rasheed Ibrahim

Je Sen Teh

Rosni Abdullah

2021

Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization

Information Security Journal: A Global Perspective

Dyala R Ibrahim

Je Sen Teh

Rosni Abdullah

2021/5/4

See List of Professors in Je Sen Teh University(Universiti Sains Malaysia)

Co-Authors

academic-engine