This map shows the geographic impact of Jaecheol Ha's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jaecheol Ha with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jaecheol Ha more than expected).
This network shows the impact of papers produced by Jaecheol Ha. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jaecheol Ha. The network helps show where Jaecheol Ha may publish in the future.
Co-authorship network of co-authors of Jaecheol Ha
This figure shows the co-authorship network connecting the top 25 collaborators of Jaecheol Ha.
A scholar is included among the top collaborators of Jaecheol Ha based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Jaecheol Ha. Jaecheol Ha is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Choi, Dooho, et al.. (2012). A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection. Information Security and Cryptology. 22(3). 439–445.2 indexed citations
6.
Moon, SangJae, et al.. (2012). Differential fault analysis on AES by round reduction. 607–612.5 indexed citations
7.
Park, Jeong‐Soo, et al.. (2012). A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output.. 2. 93–109.2 indexed citations
8.
Moon, SangJae, et al.. (2012). A practical analysis of fault attack countermeasure on AES using data masking. 508–513.3 indexed citations
9.
Ha, Jaecheol, et al.. (2012). Some remarks on strong Mori domains. Houston journal of mathematics. 38(4). 1051–1059.3 indexed citations
10.
Ha, Jaecheol, et al.. (2011). Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System. Information Security and Cryptology. 21(3). 11–25.
11.
Moon, SangJae, et al.. (2011). A Round Reduction Attack on Triple DES Using Fault Injection. Information Security and Cryptology. 21(2). 91–100.
12.
Moon, SangJae, et al.. (2010). A Fault Injection Attack on the For Statement in AES Implementation. Information Security and Cryptology. 20(6). 59–65.
13.
Ha, Jaecheol, et al.. (2010). Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method. Information Security and Cryptology. 20(3). 135–140.
14.
Ha, Jaecheol, et al.. (2009). A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity. Journal of Internet Computing and services. 10(6). 229–239.1 indexed citations
15.
Kım, Hwankoo, et al.. (2009). Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm. Information Security and Cryptology. 19(6). 63–70.
16.
Ha, Jaecheol, et al.. (2008). Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System. Information Security and Cryptology. 18(1). 77–87.2 indexed citations
17.
Boyd, Colin, Juan González Nieto, Jaecheol Ha, & SangJae Moon. (2007). Low Cost and Strong-Security RFID Authentication Protocol.
18.
Moon, SangJae, et al.. (2006). A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method. Information Security and Cryptology. 16(2). 129–139.
19.
Moon, SangJae, et al.. (2006). A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack. Information Security and Cryptology. 16(3). 143–155.1 indexed citations
20.
Ha, Jaecheol, et al.. (2000). A Design of Modular Multiplier Based on Multi-precision Carry Save Adder. 99(584). 45–51.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.