Chih-Pin Su

416 total citations
14 papers, 308 citations indexed

About

Chih-Pin Su is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Chih-Pin Su has authored 14 papers receiving a total of 308 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Artificial Intelligence, 9 papers in Computer Vision and Pattern Recognition and 4 papers in Hardware and Architecture. Recurrent topics in Chih-Pin Su's work include Cryptographic Implementations and Security (10 papers), Coding theory and cryptography (10 papers) and Chaos-based Image/Signal Encryption (9 papers). Chih-Pin Su is often cited by papers focused on Cryptographic Implementations and Security (10 papers), Coding theory and cryptography (10 papers) and Chaos-based Image/Signal Encryption (9 papers). Chih-Pin Su collaborates with scholars based in Taiwan. Chih-Pin Su's co-authors include Cheng‐Wen Wu, Chih-Tsun Huang and Kuo-Liang Cheng and has published in prestigious journals such as IEEE Communications Magazine, IEEE Transactions on Very Large Scale Integration (VLSI) Systems and IEEE Micro.

In The Last Decade

Chih-Pin Su

14 papers receiving 278 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chih-Pin Su Taiwan 10 220 163 109 69 45 14 308
Martin Schläffer Austria 5 284 1.3× 164 1.0× 147 1.3× 39 0.6× 42 0.9× 13 347
Wai-Yeung Yip United States 4 288 1.3× 235 1.4× 86 0.8× 72 1.0× 39 0.9× 10 381
Ventzislav Nikov Belgium 9 281 1.3× 140 0.9× 127 1.2× 63 0.9× 48 1.1× 25 327
Stefano Di Matteo Italy 12 168 0.8× 105 0.6× 101 0.9× 52 0.8× 35 0.8× 20 277
Konrad J. Kulikowski United States 9 253 1.1× 77 0.5× 184 1.7× 76 1.1× 36 0.8× 13 298
Luca Henzen Switzerland 7 210 1.0× 120 0.7× 64 0.6× 31 0.4× 56 1.2× 12 272
Sumio Morioka Japan 7 265 1.2× 178 1.1× 98 0.9× 63 0.9× 53 1.2× 20 330
Edward Roback United States 4 217 1.0× 169 1.0× 44 0.4× 34 0.5× 79 1.8× 6 327
Gaurav Bansod India 10 231 1.1× 218 1.3× 47 0.4× 36 0.5× 52 1.2× 19 303
Alexander Maximov Sweden 10 297 1.4× 177 1.1× 36 0.3× 68 1.0× 39 0.9× 18 333

Countries citing papers authored by Chih-Pin Su

Since Specialization
Citations

This map shows the geographic impact of Chih-Pin Su's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chih-Pin Su with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chih-Pin Su more than expected).

Fields of papers citing papers by Chih-Pin Su

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chih-Pin Su. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chih-Pin Su. The network helps show where Chih-Pin Su may publish in the future.

Co-authorship network of co-authors of Chih-Pin Su

This figure shows the co-authorship network connecting the top 25 collaborators of Chih-Pin Su. A scholar is included among the top collaborators of Chih-Pin Su based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chih-Pin Su. Chih-Pin Su is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
Su, Chih-Pin, et al.. (2009). Single- and Multi-core Configurable AES Architectures for Flexible Security. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 18(4). 541–552. 51 indexed citations
2.
Su, Chih-Pin, et al.. (2005). A configurable AES processor for enhanced security. 1. 361–366. 6 indexed citations
3.
Su, Chih-Pin, et al.. (2005). A configurable AES processor for enhanced security. 361–361. 12 indexed citations
4.
Su, Chih-Pin, et al.. (2005). Design and test of a scalable security processor. 1. 372–375. 2 indexed citations
5.
Su, Chih-Pin, et al.. (2005). Design and test of a scalable security processor. 372–372. 6 indexed citations
6.
Su, Chih-Pin, et al.. (2004). An HMAC processor with integrated SHA-1 and MD5 algorithms. Asia and South Pacific Design Automation Conference. 456–458. 38 indexed citations
7.
Su, Chih-Pin, et al.. (2004). An HMAC processor with integrated SHA-1 and MD5 algorithms. 456–458. 21 indexed citations
8.
Su, Chih-Pin, et al.. (2004). A word-based RSA crypto-processor with enhanced pipeline performance. 218–221. 10 indexed citations
9.
Su, Chih-Pin, et al.. (2003). A high-throughput low-cost AES cipher chip. 85–88. 31 indexed citations
10.
Su, Chih-Pin & Cheng‐Wen Wu. (2003). A Graph-Based Approach to Power-Constrained SOC Test Scheduling. Journal of Electronic Testing. 20(1). 45–60. 26 indexed citations
11.
Su, Chih-Pin, et al.. (2003). Design of a scalable RSA and ECC crypto-processor. 495–495. 10 indexed citations
12.
Su, Chih-Pin, et al.. (2003). A highly efficient AES cipher chip. 561–561. 7 indexed citations
13.
Su, Chih-Pin, et al.. (2003). A high-throughput low-cost aes processor. IEEE Communications Magazine. 41(12). 86–91. 75 indexed citations
14.
Su, Chih-Pin, et al.. (2002). A hierarchical test methodology for systems on chip. IEEE Micro. 22(5). 69–81. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026