Jaecheol Ha

585 total citations
48 papers, 115 citations indexed

About

Jaecheol Ha is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Information Systems. According to data from OpenAlex, Jaecheol Ha has authored 48 papers receiving a total of 115 indexed citations (citations by other indexed papers that have themselves been cited), including 35 papers in Artificial Intelligence, 16 papers in Computer Vision and Pattern Recognition and 14 papers in Information Systems. Recurrent topics in Jaecheol Ha's work include Cryptographic Implementations and Security (28 papers), Chaos-based Image/Signal Encryption (16 papers) and Coding theory and cryptography (11 papers). Jaecheol Ha is often cited by papers focused on Cryptographic Implementations and Security (28 papers), Chaos-based Image/Signal Encryption (16 papers) and Coding theory and cryptography (11 papers). Jaecheol Ha collaborates with scholars based in South Korea and United Kingdom. Jaecheol Ha's co-authors include SangJae Moon, Dooho Choi, Hoon Jae Lee, Jeong‐Soo Park, Dong‐Guk Han, Seokhie Hong, Hwankoo Kım, Junseong Park, Hee Seok Kim and Sangwon Lee and has published in prestigious journals such as Sensors, Information Processing Letters and ACM Transactions on Embedded Computing Systems.

In The Last Decade

Jaecheol Ha

31 papers receiving 104 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jaecheol Ha South Korea 6 98 58 32 20 20 48 115
Christine van Vredendaal Netherlands 6 77 0.8× 26 0.4× 30 0.9× 11 0.6× 20 1.0× 10 94
Emilia Käsper United States 5 124 1.3× 48 0.8× 29 0.9× 36 1.8× 10 0.5× 6 145
Stefan Kölbl Japan 6 168 1.7× 40 0.7× 77 2.4× 25 1.3× 20 1.0× 13 206
Ekawat Homsirikamol United States 7 98 1.0× 26 0.4× 46 1.4× 16 0.8× 53 2.6× 11 128
Donald Donglong Chen Hong Kong 4 127 1.3× 89 1.5× 23 0.7× 10 0.5× 8 0.4× 6 147
Nina Bindel Germany 7 86 0.9× 33 0.6× 19 0.6× 16 0.8× 10 0.5× 11 105
Vesselin Velichkov Belgium 4 53 0.5× 23 0.4× 27 0.8× 35 1.8× 11 0.6× 9 78
Erich Wenger Austria 6 91 0.9× 28 0.5× 45 1.4× 13 0.7× 48 2.4× 12 122
Keita Xagawa Japan 7 141 1.4× 41 0.7× 33 1.0× 32 1.6× 16 0.8× 19 154
Martijn Stam United Kingdom 7 123 1.3× 65 1.1× 38 1.2× 6 0.3× 11 0.6× 15 128

Countries citing papers authored by Jaecheol Ha

Since Specialization
Citations

This map shows the geographic impact of Jaecheol Ha's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jaecheol Ha with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jaecheol Ha more than expected).

Fields of papers citing papers by Jaecheol Ha

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jaecheol Ha. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jaecheol Ha. The network helps show where Jaecheol Ha may publish in the future.

Co-authorship network of co-authors of Jaecheol Ha

This figure shows the co-authorship network connecting the top 25 collaborators of Jaecheol Ha. A scholar is included among the top collaborators of Jaecheol Ha based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jaecheol Ha. Jaecheol Ha is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lee, Seungyeol, et al.. (2023). Anomaly Detection in Vehicle Network Using Semi-Supervised Learning Model. Journal of the Korea Academia-Industrial cooperation Society. 24(2). 11–20.
2.
Ha, Jaecheol, et al.. (2020). Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure. Information Security and Cryptology. 30(1). 39–49. 1 indexed citations
3.
Ha, Jaecheol, et al.. (2020). Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA. Information Security and Cryptology. 30(6). 1207–1216. 1 indexed citations
4.
Park, Eunsoo, Soohyun Oh, & Jaecheol Ha. (2017). Masking-Based Block Cipher LEA Resistant to Side Channel Attacks. Information Security and Cryptology. 27(5). 1023–1032. 1 indexed citations
5.
Choi, Dooho, et al.. (2012). A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection. Information Security and Cryptology. 22(3). 439–445. 2 indexed citations
6.
Moon, SangJae, et al.. (2012). Differential fault analysis on AES by round reduction. 607–612. 5 indexed citations
7.
Park, Jeong‐Soo, et al.. (2012). A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output.. 2. 93–109. 2 indexed citations
8.
Moon, SangJae, et al.. (2012). A practical analysis of fault attack countermeasure on AES using data masking. 508–513. 3 indexed citations
9.
Ha, Jaecheol, et al.. (2012). Some remarks on strong Mori domains. Houston journal of mathematics. 38(4). 1051–1059. 3 indexed citations
10.
Ha, Jaecheol, et al.. (2011). Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System. Information Security and Cryptology. 21(3). 11–25.
11.
Moon, SangJae, et al.. (2011). A Round Reduction Attack on Triple DES Using Fault Injection. Information Security and Cryptology. 21(2). 91–100.
12.
Moon, SangJae, et al.. (2010). A Fault Injection Attack on the For Statement in AES Implementation. Information Security and Cryptology. 20(6). 59–65.
13.
Ha, Jaecheol, et al.. (2010). Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method. Information Security and Cryptology. 20(3). 135–140.
14.
Ha, Jaecheol, et al.. (2009). A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity. Journal of Internet Computing and services. 10(6). 229–239. 1 indexed citations
15.
Kım, Hwankoo, et al.. (2009). Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm. Information Security and Cryptology. 19(6). 63–70.
16.
Ha, Jaecheol, et al.. (2008). Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System. Information Security and Cryptology. 18(1). 77–87. 2 indexed citations
17.
Boyd, Colin, Juan González Nieto, Jaecheol Ha, & SangJae Moon. (2007). Low Cost and Strong-Security RFID Authentication Protocol.
18.
Moon, SangJae, et al.. (2006). A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method. Information Security and Cryptology. 16(2). 129–139.
19.
Moon, SangJae, et al.. (2006). A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack. Information Security and Cryptology. 16(3). 143–155. 1 indexed citations
20.
Ha, Jaecheol, et al.. (2000). A Design of Modular Multiplier Based on Multi-precision Carry Save Adder. 99(584). 45–51. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026