Teh Je Sen, Dr.


B.Eng (MMU), M.Sc (USM), Ph.D (USM) 




My research interests lies in information security, specifically the design and cryptanalysis of symmetric-key cryptographic algorithms. I am interested in cross-disciplinary reseach involving cryptography which includes applications of chaos theory, machine learning or massively parallel processing.



FRGS - Investigating the relationship between lightweight block cipher constructs and differential cluster distribution using GPU-optimized branch-and-bound strategies (PI)
USM RU Team - A Multi-actor Energy Distribution Model Based on Blockchain for Nationwide Solar Power Adoption (PI)
LRGS - Blockchain for Data Analytics (Co-PI)
FRGS - A zero-divisor code approach in cryptography with application to public key encryption scheme (Co-PI)


USM Short Term Grant - The Design of Lightweight Chaos-based Symmetric-key Cryptosystems for Constrained Environments (PI)
National Natural Science Foundation of China - A Study on the Accurate Security Margin of Symmetric Key Cryptography Against Statistical Attack (Co-PI)
FRGS - Novel Symmetric Encryption Scheme based on True Random Numbers and Chaotic Maps (Co-PI)

On-going Research Projects

Differential cryptanalysis of lightweight block ciphers
Machine learning approach for estimating the security margin of lightweight block ciphers
Enhancing consensus protocols for blockchain applications
Design of chaos-based cryptographic algorithms


Web of Science ResearcherID : B-7368-2018
Scopus ID      : 56579944200
ORCiD            : 0000-0001-5571-4148
ResearchGate: https://www.researchgate.net/profile/Je_Sen_Teh


Teh, J.S.✉, Biryukov, A., "Differential Cryptanalysis of WARP," Journal of Information Security and Applications. https://doi.org/10.1016/j.jisa.2022.103316

Alawida, M., Teh, J.S., Mehmood, A., Shoufan, A., Alshoura, W.H., "A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations," Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2022.07.025

Yeoh, W.Z., Teh, J.S.✉, Chen, J., "Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework," Journal of Information Security and Applications. https://doi.org/10.1016/j.jisa.2021.103087

Teh, J.S.✉, Tham, L.J., Jamil, N., Yap, W.S.✉, "New differential cryptanalysis results for the lightweight block cipher BORON," Journal of Information Security and Applications. https://doi.org/10.1016/j.jisa.2022.103129


Alshoura, W.H. ✉, Zainol, Z.✉, Teh, J.S.✉, Alawida, M.✉, "An FPP-resistant SVD-based image watermarking scheme based on chaotic control," Alexandria Engineering Journal. https://doi.org/10.1016/j.aej.2021.10.052

Lee, T.R., Teh, J.S., Jamil, N.✉, Yan, J.L.S., Chen, J., Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes (2021) IEEE Access. https://doi.org/10.1109/ACCESS.2021.3116468

Oyinloye, D.P., Teh, J.S., Jamil, N.✉, Alawida, M., Blockchain Consensus: An Overview of Alternative Protocols (2021) Symmetry. https://doi.org/10.3390/sym13081363

Idris, M.F.,  Teh, J.S., Yan, J. L. S., Yeoh, W-Z., A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers (2021) IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2021.3099802

Ibrahim, D.R., Teh, J.S., Abdullah, R., An overview of visual cryptography techniques (2021) Multimedia Tools and Applications. DOI: https://doi.org/10.1007/s11042-021-11229-9

Awadallah, R.✉, Samsudin, A.✉, Teh, J.S., Almazrooie, M., An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain (2021) IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2021.3077123

Ibrahim, D.R., Teh, J.S., Abdullah, R., Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization. In: Alfred R., Iida H., Haviluddin H., Anthony P. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 724. Springer, Singapore. https://doi.org/10.1007/978-981-33-4069-5_10

Alshoura, W.H.✉, Zainol, Z.✉, Teh, J.S.✉, Alawida, M., Alabdulatif, A., Hybrid SVD-based Image Watermarking Schemes: A Review (2021) IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2021.3060861

Alawida, M.✉, Samsudin, A.✉, Alajarmeh, N., Teh, J.S., Ahmad, M., Alshoura, W.H. A Novel Hash Function based on a Chaotic Sponge and DNA Sequence (2021) IEEE Access. DOI:  https://doi.org/10.1109/ACCESS.2021.3049881 


Yan, J.L.S.✉, Teh, J.S., Kassim, A.M., Kee, C.W., Abdullah, R. Girls2Code: Cultivating interest in programming among young girls in Malaysia by making drawings come to life (2020) STEM Education for Girls and Women: Breaking Barriers and Exploring Gender Inequality in Asia, UNESCO Publications. Link: https://bangkok.unesco.org/content/stem-education-girls-and-women-breaking-barriers-and-exploring-gender-inequality-asia 

Ibrahim, D.R., Abdullah, R., Teh, J.S.✉, An enhanced color visual cryptography scheme based on the binary dragonfly algorithm (2020) International Journal of Computers and Applications. DOI: https://doi.org/10.1080/1206212X.2020.1859244

Ibrahim, D.R., Teh, J.S.✉, Abdullah, R. Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization (2020) Information Security Journal: A Global Perspective. DOI: https://doi.org/10.1080/19393555.2020.1817633

Chen, Z., Chen, J.✉, Meng, W., Teh, J.S., Li, P., Ren, B. Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU (2020) Journal of Information Security and Applications, 55:102565. DOI: https://doi.org/10.1016/j.jisa.2020.102565

Yeoh, WZ., Teh, J.S.✉, Chen, J. Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm (2020). In: Liu J., Cui H. (eds) Information Security and Privacy. ACISP 2020. Lecture Notes in Computer Science, vol 12248. Springer, Cham. https://doi.org/10.1007/978-3-030-55304-3_9

Teh, J.S., Teng, W., Samsudin, A., Chen, J., A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators (2020) Frontiers of Computer Science, 14(6): 146405. DOI: https://doi.org/10.1007/s11704-019-9120-2 (JCR Q3)

Lee, T.R., Teh, J.S., Liew, J.S.Y., Jamil, N. Yeoh, W.-Z. A Machine Learning Approach to Predicting Block Cipher Security (2020) Proceedings of the 7th International Cryptology and Information Security Conference (CRYPTOLOGY2020). Proceedings Link (Scopus)

Alawida, M..✉, Teh, J.S., Oyinloye, D.P., Alshoura, W.H., Ahmad, M., Alkhawaldeh R.S. A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata (2020) IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2020.3002763 (JCR Q1)

Teh, J.S., Alawida, M., Samsudin, A. Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps (2020) Arabian Journal for Science and Engineering. DOI: https://doi.org/10.1007/s13369-020-04552-0 (JCR Q3)

Alshoura, W. H.✉, Zainol, Z., Teh, J.S., Alawida, M. A New Chaotic Image Watermarking Scheme based on SVD and IWT (2020) IEEE Access. DOI: https://doi.org/10.1109/ACCESS.2020.2978186 (JCR Q1)

Teh, J.S. , Alawida, M., Ho, J.J. Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic (2020) Nonlinear Dynamics. DOI: https://doi.org/10.1007/s11071-020-05504-x (JCR Q1)

Alawida, M.✉, Samsudin, A., Teh, J.S.✉ Enhanced digital chaotic maps based on bit reversal with applications in random bit generators (2020) Information Sciences, 512, pp. 1155-1169. DOI: https://doi.org/10.1016/j.ins.2019.10.055 (JCR Q1)

Teh, J.S.✉, Alawida, M., Sii, Y.C. Implementation and practical problems of chaos-based cryptography revisited (2020) Journal of Information Security and Applications, 50, pp. -. DOI: https://doi.org/10.1016/j.jisa.2019.102421 (JCR Q3)

Yeoh, W.-Z., Teh, J.S.✉, Sazali, M.I.S.B.M. µ2: A Lightweight Block Cipher (2020) Lecture Notes in Electrical Engineering, 603, pp. 281-290. DOI: https://doi.org/10.1007/978-981-15-0058-9_27 (Scopus)


Alawida, M.✉, Samsudin, A., Teh, J.S.✉, Alshoura, W.H. Digital Chaotic Cosine Map for Cryptographic Applications (2019) IEEE Access 7, pp. 150609-150622. DOI: https://doi.org/10.1109/ACCESS.2019.2947561 (JCR Q1)

Alawida, M.✉, Samsudin, A., Teh, J.S., Alshoura, W.H. Deterministic chaotic finite-state automata (2019) Nonlinear Dynamics, 98 (3), pp. 2403-2421. DOI: https://doi.org/10.1007/s11071-019-05311-z (JCR Q1)

Alawida, M.✉, Teh, J.S., Samsudin, A., Alshoura, W.H. An image encryption scheme based on hybridizing digital chaos and finite state machine (2019) Signal Processing, 164, pp. 249-266. DOI: https://doi.org/10.1016/j.sigpro.2019.06.013 (JCR Q1)

Alawida, M., Samsudin, A., Teh, J.S.✉, Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption (2019) Signal Processing, 160, pp. 45-58. DOI: https://doi.org/10.1016/j.sigpro.2019.02.016 (JCR Q1)

Alawida, M., Samsudin, A., Teh, J.S.✉ Enhancing unimodal digital chaotic maps through hybridisation (2019) Nonlinear Dynamics, 96 (1), pp. 601-613. DOI: https://doi.org/10.1007/s11071-019-04809-w (JCR Q1)

Yeoh, W.-Z., Teh, J.S.✉, Chern, H.R. A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform (2019) Multimedia Tools and Applications, 78 (12), pp. 15929-15949. DOI: https://doi.org/10.1007/s11042-018-7015-0  (JCR Q2)

Teh, J.S.✉, Tan, K., Alawida, M. A chaos-based keyed hash function based on fixed point representation (2019) Cluster Computing, 22 (2), pp. 649-660. DOI: https://doi.org/10.1007/s10586-018-2870-z (JCR Q1)

Zhang, Y., Chen, J.✉, Chen, K., Xu, R., Teh, J., Zhang, S. Network traffic identification of several open source secure proxy protocols (2019) International Journal of Network Management, , pp. -. DOI: https://doi.org/10.1002/nem.2090 (JCR Q4)

Ibrahim, D.R., Abdullah, R., Teh, J.S.✉, Alsalibi, B. Authentication for ID cards based on colour visual cryptography and facial recognition (2019) ACM International Conference Proceeding Series, , pp. 164-167. DOI: https://doi.org/10.1145/3309074.3309077 (ISI)


Chen, J. ✉, Teh, J. , Liu, Z. ✉, Su, C. ✉, Samsudin, A. ✉, Xiang, Y. ✉ Towards accurate statistical analysis of security margins: New searching strategies for differential attacks (2017) IEEE Transactions on Computers, 66 (10), pp. 1763-1777. DOI: https://doi.org/10.1109/TC.2017.2699190 (JCR Q1)

Teh, J.S., Samsudin, A.✉ A chaos-based authenticated cipher with associated data (2017) Security and Communication Networks, 2017, pp. -. DOI: https://doi.org/10.1155/2017/9040518 (JCR Q3)

Teh, J.S., Samsudin, A.✉ A Stream Cipher based on Spatiotemporal Chaos and True Random Synchronization (2017) IETE Journal of Research, 63 (3), pp. 346-357. DOI: https://doi.org/10.1080/03772063.2017.1284617 (JCR Q4)


Teh, J.S., Teng, W., Samsudin, A. A true random number generator based on hyperchaos and digital sound (2016) 2016 3rd International Conference on Computer and Information Sciences, ICCOINS 2016 - Proceedings, , pp. 264-269. DOI: https://doi.org/10.1109/ICCOINS.2016.7783225 (ISI)

Chen, J.✉, Miyaji, A., Su, C., Teh, J. Improved Differential Characteristic Searching Methods (2016) Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, , pp. 500-508. DOI: https://doi.org/10.1109/CSCloud.2015.42 (ISI)

Chen, J.✉, Miyaji, A., Su, C., Teh, J.S. Accurate estimation of the full differential distribution for general Feistel structures (2016) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9589, pp. 108-124. DOI: https://doi.org/10.1007/978-3-319-38898-4_7 (ISI)

Chen, J.✉, Teh, J.S.✉, Su, C., Samsudin, A., Fang, J. Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9723, pp. 333-346. DOI: https://doi.org/10.1007/978-3-319-40367-0_21 (ISI)


Teh, J.S., Samsudin, A.✉, Al-Mazrooie, M., Akhavan, A. GPUs and chaos: a new true random number generator (2015) Nonlinear Dynamics, 82 (4), pp. 1913-1922. DOI: https://doi.org/10.1007/s11071-015-2287-7 (JCR Q1)

Teh, J.S., Samsudin, A.✉, Akhavan, A. Parallel chaotic hash function based on the shuffle-exchange network (2015) Nonlinear Dynamics, 81 (3), pp. 1067-1079. DOI: https://doi.org/10.1007/s11071-015-2049-6 (JCR Q1)



Abubakar Abba (Ongoing)
Mohamed Fadul Iedres Fadul (Ongoing)
Teng Wei Jian (Ongoing)
Damilare Peter Oyinloye (Ongoing)
Li Hui (Ongoing)

Wafa' Hamdan Alshoura (Completed)
Dyala Ibrahim (Graduated)
Moatsum Alawida (Graduated)


Chan Yen Yee (Ongoing)
Steven Khoo (Ongoing)
Khor Cher Yin (Ongoing)
Loke Soo Voon (Graduated)

Ho Jia Jie (Graduated)
Lee Ting Rong (Graduated)
Yeoh Wei Zhu (Graduated)
Ho Jia Jie (Graduated)



CPT212 - Design and Analysis of Algorithms
CMT221/CMM222 - Database Organisation and Design
CCS523/CCS528 - Information Security and Cryptography

Recognition & Leadership

Fellowship/Visiting Scholar

APLICA Project, Cryptolux, University of Luxembourg (Nov 2021-May 2022)

Editorial Board

Security and Communication Networks


Peer Review

Verified list available at Publons.
Q1 - Scientific Reports, Signal Processing, Optics & Laser Technology
Q2 - IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Journal of Information Security and Applications, IEEE Access, PLOS One
Q3 - IET Image Processing
Q4 - Wireless Personal Communications, KSII Transactions on Internet and Information Systems, Scientia Iranica
Scopus - Recent Patents on Computer Science, Indonesian Journal of Electrical Engineering and Computer Science, Digital Communications and Networks, Engineering Science and Technology
IACR: Eurocrypt 2021


Certified Professional Trainer, Human Resources Development Fund (HRDF), Ministry of Human Resources Malaysia (Credential ID: TTT/23896)
Certified Ethereum Administrator, iExploTech (Credential ID: IEXCEA191217#355275#004)


Evaluation Panel - National Trusted Cryptographic Algorithm List (MySEAL) Project, CyberSecurity Malaysia
Cryptographic Algorithm Security Analyst - Threat Modelling Platform for Industrial Control Systems and Internet of Everything, UNITEN R&D Sdn. Bhd.


  • Hits: 3446

School of Computer Sciences, Universiti Sains Malaysia, 11800 USM Penang, Malaysia
Tel: +604-653 3647 / 2158 / 2155  |  Fax: +604-653 3684  | Email: This email address is being protected from spambots. You need JavaScript enabled to view it.  |  icon admin