Chi‐Sung Laih

1.5k total citations
76 papers, 929 citations indexed

About

Chi‐Sung Laih is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Chi‐Sung Laih has authored 76 papers receiving a total of 929 indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 33 papers in Information Systems and 29 papers in Computer Networks and Communications. Recurrent topics in Chi‐Sung Laih's work include Cryptography and Data Security (28 papers), Chaos-based Image/Signal Encryption (20 papers) and Cryptography and Residue Arithmetic (18 papers). Chi‐Sung Laih is often cited by papers focused on Cryptography and Data Security (28 papers), Chaos-based Image/Signal Encryption (20 papers) and Cryptography and Residue Arithmetic (18 papers). Chi‐Sung Laih collaborates with scholars based in Taiwan, United States and France. Chi‐Sung Laih's co-authors include Sung‐Ming Yen, Ching‐Nung Yang, Hung‐Yu Chien, Chia-Mei Chen, Wen‐Chung Kuo, Tsuhan Chen, Chin‐Feng Lee, Lein Harn, Jau‐Yien Lee and Arjen K. Lenstra and has published in prestigious journals such as Communications of the ACM, Expert Systems with Applications and IEEE Journal on Selected Areas in Communications.

In The Last Decade

Chi‐Sung Laih

73 papers receiving 833 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chi‐Sung Laih Taiwan 17 491 433 401 254 156 76 929
Serge Vaudenay Switzerland 18 600 1.2× 293 0.7× 296 0.7× 237 0.9× 70 0.4× 97 864
Xuhua Ding Singapore 17 797 1.6× 518 1.2× 344 0.9× 111 0.4× 390 2.5× 57 1.1k
Atsuko Miyaji Japan 14 881 1.8× 570 1.3× 296 0.7× 138 0.5× 75 0.5× 162 1.1k
Zhengan Huang China 13 863 1.8× 541 1.2× 419 1.0× 198 0.8× 109 0.7× 29 1.3k
Dowon Hong South Korea 14 528 1.1× 261 0.6× 242 0.6× 138 0.5× 130 0.8× 72 737
Niels Ferguson Netherlands 6 456 0.9× 199 0.5× 269 0.7× 309 1.2× 111 0.7× 11 808
Sourav Mukhopadhyay India 19 398 0.8× 820 1.9× 894 2.2× 145 0.6× 247 1.6× 59 1.1k
Jack Brassil United States 13 188 0.4× 209 0.5× 288 0.7× 707 2.8× 86 0.6× 53 1.1k
Rasool Jalili Iran 13 482 1.0× 291 0.7× 319 0.8× 115 0.5× 100 0.6× 85 721
Cas Cremers Switzerland 22 783 1.6× 865 2.0× 1.0k 2.5× 67 0.3× 141 0.9× 69 1.4k

Countries citing papers authored by Chi‐Sung Laih

Since Specialization
Citations

This map shows the geographic impact of Chi‐Sung Laih's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chi‐Sung Laih with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chi‐Sung Laih more than expected).

Fields of papers citing papers by Chi‐Sung Laih

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chi‐Sung Laih. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chi‐Sung Laih. The network helps show where Chi‐Sung Laih may publish in the future.

Co-authorship network of co-authors of Chi‐Sung Laih

This figure shows the co-authorship network connecting the top 25 collaborators of Chi‐Sung Laih. A scholar is included among the top collaborators of Chi‐Sung Laih based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chi‐Sung Laih. Chi‐Sung Laih is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Ching‐Nung, et al.. (2013). Natural language letter based visual cryptography scheme. Journal of Visual Communication and Image Representation. 24(3). 318–331. 10 indexed citations
2.
Laih, Chi‐Sung, et al.. (2009). Adaptive key pre-distribution model for distributed sensor networks. IET Communications. 3(5). 723–732. 5 indexed citations
3.
Chen, Chih‐Hao, et al.. (2008). A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. 1252–1257. 15 indexed citations
4.
Laih, Chi‐Sung, et al.. (2006). Design a Secure and Practical Metering Scheme.. International Conference on Internet Computing. 443–447. 2 indexed citations
5.
Laih, Chi‐Sung, et al.. (2003). New Audio Secret Sharing Schemes with Time Division Technique. Journal of information science and engineering. 19(4). 605–614. 7 indexed citations
6.
Sun, Hung–Min, et al.. (2002). On the design of RSA with short secret exponent. Journal of information science and engineering. 18(1). 1–18. 4 indexed citations
7.
Laih, Chi‐Sung & Sung‐Ming Yen. (2002). On the design of conference key distribution systems for the broadcasting networks. 1406–1413. 2 indexed citations
8.
Lin, Cheng‐Han & Chi‐Sung Laih. (2000). Cryptanalysis of Nyberg-Rueppel's message recovery scheme. IEEE Communications Letters. 4(7). 231–232. 7 indexed citations
9.
Laih, Chi‐Sung & Wen‐Chung Kuo. (1997). New Signature Schemes Based on Factoring and Discrete Logarithms (Special Section on Cryptography and Information Security). IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 80(1). 46–53. 16 indexed citations
10.
Yang, Ching‐Nung & Chi‐Sung Laih. (1997). Generating Functions for Asymmetric/Unidirectional Error Correcting and Detecting Codes. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 80(6). 1135–1142. 1 indexed citations
11.
Laih, Chi‐Sung, et al.. (1997). V-fairness (t, n) secret sharing scheme. IEE Proceedings - Computers and Digital Techniques. 144(4). 245–245. 8 indexed citations
12.
Laih, Chi‐Sung & Wen‐Chung Kuo. (1997). Speeding up the computations of elliptic curves cryptoschemes. Computers & Mathematics with Applications. 33(5). 29–36. 4 indexed citations
13.
Laih, Chi‐Sung & Sung‐Ming Yen. (1996). Multi-Signature for Specified Group of Verifiers.. Journal of information science and engineering. 12. 143–152. 10 indexed citations
14.
Laih, Chi‐Sung & Ching‐Nung Yang. (1996). Design of efficient balanced codes with minimum distance 4. IEE Proceedings - Communications. 143(4). 177–177. 1 indexed citations
15.
Yen, Sung‐Ming & Chi‐Sung Laih. (1995). Fast algorithms for LUC digital signature computation. IEE Proceedings - Computers and Digital Techniques. 142(2). 165–165. 26 indexed citations
16.
Laih, Chi‐Sung. (1992). Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle.. Journal of information science and engineering. 8. 633–640. 1 indexed citations
17.
Yen, Sung‐Ming & Chi‐Sung Laih. (1992). More about the active attack on the server-aided secret computation protocol. Electronics Letters. 28(24). 2250–2250. 6 indexed citations
18.
Laih, Chi‐Sung, et al.. (1990). Efficient probabilistic public-key cryptosystem based on the diffie-hellman problem. Electronics Letters. 26(5). 326–327. 2 indexed citations
19.
Laih, Chi‐Sung, et al.. (1989). A new scheme for ID-based cryptosystem and signature. 84. 998–1002 vol.3. 2 indexed citations
20.
Harn, Lein, Daren Huang, & Chi‐Sung Laih. (1989). Password authentication using public-key cryptography. Computers & Mathematics with Applications. 18(12). 1001–1017. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026