Deukjo Hong

1.5k total citations
19 papers, 57 citations indexed

About

Deukjo Hong is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Electrical and Electronic Engineering. According to data from OpenAlex, Deukjo Hong has authored 19 papers receiving a total of 57 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 15 papers in Computer Vision and Pattern Recognition and 5 papers in Electrical and Electronic Engineering. Recurrent topics in Deukjo Hong's work include Cryptographic Implementations and Security (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (10 papers). Deukjo Hong is often cited by papers focused on Cryptographic Implementations and Security (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (10 papers). Deukjo Hong collaborates with scholars based in South Korea, India and United States. Deukjo Hong's co-authors include Seokhie Hong, Jooyoung Lee, Jaechul Sung, Daesung Kwon, Young-Ho Park, Donghoon Chang, Meltem Sönmez Turan, Jongsung Kim, Hyunwoo Kim and HyungChul Kang and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and IEEE Internet of Things Journal.

In The Last Decade

Deukjo Hong

16 papers receiving 55 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Deukjo Hong South Korea 5 51 34 13 10 7 19 57
Patrick Derbez France 6 77 1.5× 53 1.6× 10 0.8× 13 1.3× 6 0.9× 19 85
Valentin Suder France 5 69 1.4× 32 0.9× 27 2.1× 7 0.7× 4 0.6× 8 72
Jorge Nakahara Belgium 5 67 1.3× 39 1.1× 18 1.4× 5 0.5× 6 0.9× 11 74
Paul Stankovski Sweden 6 60 1.2× 19 0.6× 13 1.0× 7 0.7× 13 1.9× 18 68
Itai Dinur Israel 6 49 1.0× 29 0.9× 6 0.5× 10 1.0× 10 1.4× 17 63
Aleksei Udovenko Luxembourg 5 48 0.9× 33 1.0× 12 0.9× 8 0.8× 8 1.1× 15 59
Seiya Tokui Japan 2 33 0.6× 30 0.9× 6 0.5× 6 0.6× 10 1.4× 2 70
Steve Babbage 1 56 1.1× 32 0.9× 6 0.5× 11 1.1× 5 0.7× 3 61
Virginie Lallemand France 3 63 1.2× 49 1.4× 4 0.3× 12 1.2× 5 0.7× 10 69
Xavier Bonnetain France 3 83 1.6× 30 0.9× 7 0.5× 5 0.5× 6 0.9× 8 93

Countries citing papers authored by Deukjo Hong

Since Specialization
Citations

This map shows the geographic impact of Deukjo Hong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Deukjo Hong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Deukjo Hong more than expected).

Fields of papers citing papers by Deukjo Hong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Deukjo Hong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Deukjo Hong. The network helps show where Deukjo Hong may publish in the future.

Co-authorship network of co-authors of Deukjo Hong

This figure shows the co-authorship network connecting the top 25 collaborators of Deukjo Hong. A scholar is included among the top collaborators of Deukjo Hong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Deukjo Hong. Deukjo Hong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Shin, Moo Whan, et al.. (2025). SAECHAM: Secure and Efficient Lightweight Block Cipher CHAM Variant. IEEE Internet of Things Journal. 12(15). 29989–30002. 1 indexed citations
2.
Hong, Deukjo, et al.. (2024). Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E107.A(8). 1212–1228.
4.
Hong, Deukjo, et al.. (2022). Integral Cryptanalysis of Lightweight Block Cipher PIPO. IEEE Access. 10. 110195–110204. 3 indexed citations
5.
Chang, Donghoon, et al.. (2022). Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. IEEE Access. 11. 4501–4516. 8 indexed citations
6.
Hong, Deukjo, et al.. (2021). Improved Ciphertext-Only Attack on GMR-1. IEEE Access. 10. 1979–1989. 2 indexed citations
7.
Lee, Seung Joon, et al.. (2019). New Approach to Constructing Noise Source Based on Race Conditions. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E102.A(9). 1272–1284.
8.
Kang, HyungChul, et al.. (2018). Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver. Information Security and Cryptology. 28(1). 15–24. 1 indexed citations
9.
Kim, Hyunwoo, et al.. (2018). Improved Differential-Linear Cryptanalysis Using DLCT. Information Security and Cryptology. 28(6). 1379–1392. 3 indexed citations
10.
Hong, Deukjo, et al.. (2017). Known-Key Attack on SM4 Block Cipher. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E100.A(12). 2985–2990. 1 indexed citations
11.
Kang, HyungChul, et al.. (2016). Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. Journal of the Korea Institute of Information Security and Cryptology. 26(6). 1421–1430. 1 indexed citations
12.
Hong, Deukjo, et al.. (2015). Improved preimage attacks on hash modes of 8-round AES-256. Multimedia Tools and Applications. 75(22). 14525–14539. 4 indexed citations
13.
Hong, Deukjo & Daesung Kwon. (2014). Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E97.A(8). 1747–1753. 2 indexed citations
14.
Kang, HyungChul, et al.. (2012). Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E95.A(9). 1550–1560. 4 indexed citations
15.
Hong, Deukjo, et al.. (2012). Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E95.A(8). 1379–1389. 2 indexed citations
16.
Hong, Deukjo, et al.. (2012). Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E95-A(1). 372–380. 3 indexed citations
17.
Lee, Jooyoung & Deukjo Hong. (2011). Collision Resistance of the JH Hash Function. IEEE Transactions on Information Theory. 58(3). 1992–1995. 10 indexed citations
18.
Sung, Jaechul, Deukjo Hong, & Seokhie Hong. (2007). Cryptanalysis of an involutional block cipher using cellular automata. Information Processing Letters. 104(5). 183–185. 4 indexed citations
19.
Park, Young-Ho, et al.. (2004). ON THE LINEAR COMPLEXITY OF SOME GENERALIZED CYCLOTOMIC SEQUENCES. International Journal of Algebra and Computation. 14(4). 431–439. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026