Daesung Kwon

1.1k total citations
21 papers, 312 citations indexed

About

Daesung Kwon is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Daesung Kwon has authored 21 papers receiving a total of 312 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Artificial Intelligence, 7 papers in Computer Vision and Pattern Recognition and 3 papers in Computer Networks and Communications. Recurrent topics in Daesung Kwon's work include Cryptographic Implementations and Security (8 papers), Chaos-based Image/Signal Encryption (7 papers) and Coding theory and cryptography (6 papers). Daesung Kwon is often cited by papers focused on Cryptographic Implementations and Security (8 papers), Chaos-based Image/Signal Encryption (7 papers) and Coding theory and cryptography (6 papers). Daesung Kwon collaborates with scholars based in South Korea. Daesung Kwon's co-authors include Minkyu Kim, Je Hong Park, Jino Heo, Yong‐Geun Oh, Donggeon Lee, Howon Kim, Jooyoung Lee, Min-Sung Kang, Taekyoung Kwon and Mun‐Kyu Lee and has published in prestigious journals such as Optics Express, Sensors and IEEE Transactions on Smart Grid.

In The Last Decade

Daesung Kwon

21 papers receiving 293 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Daesung Kwon South Korea 9 217 76 72 69 50 21 312
Wenbao Han China 10 226 1.0× 80 1.1× 39 0.5× 8 0.1× 19 0.4× 39 359
Abdella Battou United States 10 107 0.5× 98 1.3× 26 0.4× 58 0.8× 12 0.2× 46 318
Miralem Mehić Czechia 12 401 1.8× 118 1.6× 66 0.9× 193 2.8× 12 0.2× 57 597
Marcin Niemiec Poland 10 301 1.4× 80 1.1× 46 0.6× 133 1.9× 10 0.2× 40 406
Giovanni Di Crescenzo United States 12 318 1.5× 138 1.8× 526 7.3× 50 0.7× 11 0.2× 65 848
Abdelmalek Azizi Morocco 10 151 0.7× 77 1.0× 33 0.5× 47 0.7× 4 0.1× 96 358
Prakash Murali United States 10 360 1.7× 53 0.7× 32 0.4× 96 1.4× 5 0.1× 21 448
Martin Lukáč Japan 10 228 1.1× 77 1.0× 41 0.6× 18 0.3× 9 0.2× 59 383

Countries citing papers authored by Daesung Kwon

Since Specialization
Citations

This map shows the geographic impact of Daesung Kwon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Daesung Kwon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Daesung Kwon more than expected).

Fields of papers citing papers by Daesung Kwon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Daesung Kwon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Daesung Kwon. The network helps show where Daesung Kwon may publish in the future.

Co-authorship network of co-authors of Daesung Kwon

This figure shows the co-authorship network connecting the top 25 collaborators of Daesung Kwon. A scholar is included among the top collaborators of Daesung Kwon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Daesung Kwon. Daesung Kwon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hong, Changho, et al.. (2020). Generation of two-photon hybrid-entangled W state with photonic qubit and time-bin via cross-Kerr nonlinearities. Physica Scripta. 95(8). 85104–85104. 12 indexed citations
2.
Hong, Changho, et al.. (2019). Photonic scheme of quantum phase estimation for quantum algorithms via cross-Kerr nonlinearities under decoherence effect. Optics Express. 27(21). 31023–31023. 11 indexed citations
3.
Kwon, Daesung, et al.. (2018). Winternitz Signature Scheme Using Nonadjacent Forms. Security and Communication Networks. 2018. 1–12. 1 indexed citations
4.
Heo, Jino, et al.. (2017). Quantum identity authentication with single photon. Quantum Information Processing. 16(10). 59 indexed citations
5.
Hong, Deukjo, et al.. (2015). Improved preimage attacks on hash modes of 8-round AES-256. Multimedia Tools and Applications. 75(22). 14525–14539. 4 indexed citations
6.
Kwon, Daesung, et al.. (2015). Software Implementation of Lightweight Encryption Algorithm Using Single Instruction, Multiple Data Instructions. Advanced Science Letters. 21(3). 571–576. 1 indexed citations
7.
Kwon, Daesung, et al.. (2014). Converting random bits into random numbers. The Journal of Supercomputing. 70(1). 236–246. 1 indexed citations
8.
Hong, Deukjo & Daesung Kwon. (2014). Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E97.A(8). 1747–1753. 2 indexed citations
9.
Lee, Donggeon, et al.. (2014). Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA. Sensors. 14(1). 975–994. 47 indexed citations
10.
Kwon, Taekyoung, Mun‐Kyu Lee, & Daesung Kwon. (2013). Information security and cryptology - ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers. Springer eBooks. 9 indexed citations
11.
Park, Je Hong, Minkyu Kim, & Daesung Kwon. (2013). Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang. IEEE Transactions on Smart Grid. 4(3). 1613–1614. 77 indexed citations
12.
Kang, HyungChul, et al.. (2012). Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E95.A(9). 1550–1560. 4 indexed citations
13.
Hong, Deukjo, et al.. (2012). Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E95.A(8). 1379–1389. 2 indexed citations
14.
Kwon, Taekyoung, Mun‐Kyu Lee, & Daesung Kwon. (2012). Proceedings of the 15th international conference on Information Security and Cryptology. 4 indexed citations
15.
Lee, Jooyoung & Daesung Kwon. (2011). The Security of Abreast-DM in the Ideal Cipher Model. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E94-A(1). 104–109. 11 indexed citations
16.
Kwon, Daesung, et al.. (2008). Tree-based key predistribution for wireless sensor networks. Wireless Networks. 15(8). 1140–1151. 1 indexed citations
17.
Kwon, Daesung, et al.. (2008). Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces. 31(4). 648–652. 34 indexed citations
18.
Kwon, Daesung, Joo‐Young Lee, & Bonwook Koo. (2007). Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP. Information Security and Cryptology. 17(4). 103–113. 1 indexed citations
19.
Hong, Jin, et al.. (2002). Chosen-Ciphertext Attacks on Optimized NTRU. 1 indexed citations
20.
Kwon, Daesung & Yong‐Geun Oh. (2000). Structure of the image of (pseudo)-holomorphic discs with totally real boundary condition. Communications in Analysis and Geometry. 8(1). 31–82. 24 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026