Kitae Jeong

1.1k total citations
22 papers, 134 citations indexed

About

Kitae Jeong is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Kitae Jeong has authored 22 papers receiving a total of 134 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Artificial Intelligence, 16 papers in Computer Vision and Pattern Recognition and 8 papers in Hardware and Architecture. Recurrent topics in Kitae Jeong's work include Cryptographic Implementations and Security (20 papers), Chaos-based Image/Signal Encryption (16 papers) and Coding theory and cryptography (10 papers). Kitae Jeong is often cited by papers focused on Cryptographic Implementations and Security (20 papers), Chaos-based Image/Signal Encryption (16 papers) and Coding theory and cryptography (10 papers). Kitae Jeong collaborates with scholars based in South Korea, United States and Greece. Kitae Jeong's co-authors include Seokhie Hong, Jaechul Sung, Changhoon Lee, Jong In Lim, Justin Zhan, Stefanos Gritzalis, Sang-Soo Yeo, Jongsung Kim, Kyungho Lee and Naixue Xiong and has published in prestigious journals such as Information Sciences, Mathematical and Computer Modelling and EURASIP Journal on Wireless Communications and Networking.

In The Last Decade

Kitae Jeong

20 papers receiving 131 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kitae Jeong South Korea 8 108 79 42 24 19 22 134
Julia Borghoff Denmark 2 118 1.1× 78 1.0× 43 1.0× 20 0.8× 12 0.6× 4 129
Søren S. Thomsen Denmark 5 143 1.3× 95 1.2× 46 1.1× 27 1.1× 17 0.9× 6 158
Jaechul Sung South Korea 7 124 1.1× 94 1.2× 36 0.9× 22 0.9× 16 0.8× 39 139
Ronny Van Keer Netherlands 6 116 1.1× 80 1.0× 29 0.7× 16 0.7× 18 0.9× 7 142
Kerstin Lemke‐Rust Germany 5 70 0.6× 44 0.6× 45 1.1× 20 0.8× 11 0.6× 14 90
Markku–Juhani O. Saarinen United Kingdom 6 88 0.8× 49 0.6× 25 0.6× 15 0.6× 26 1.4× 18 121
Jie Guan China 8 174 1.6× 141 1.8× 38 0.9× 14 0.6× 10 0.5× 56 199
Norbert Pramstaller Austria 8 101 0.9× 84 1.1× 40 1.0× 14 0.6× 20 1.1× 15 130
Toru Akishita Denmark 4 96 0.9× 70 0.9× 20 0.5× 12 0.5× 15 0.8× 7 114
Elif Bilge Kavun Germany 5 158 1.5× 103 1.3× 89 2.1× 35 1.5× 27 1.4× 25 213

Countries citing papers authored by Kitae Jeong

Since Specialization
Citations

This map shows the geographic impact of Kitae Jeong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kitae Jeong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kitae Jeong more than expected).

Fields of papers citing papers by Kitae Jeong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kitae Jeong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kitae Jeong. The network helps show where Kitae Jeong may publish in the future.

Co-authorship network of co-authors of Kitae Jeong

This figure shows the co-authorship network connecting the top 25 collaborators of Kitae Jeong. A scholar is included among the top collaborators of Kitae Jeong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kitae Jeong. Kitae Jeong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jeong, Kitae, et al.. (2014). Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing. International Journal of Distributed Sensor Networks. 10(1). 389476–389476. 7 indexed citations
2.
Jeong, Kitae & Sang-Soo Yeo. (2013). Security Analysis of Block Cipher LED. 網際網路技術學刊. 14(2). 281–287. 1 indexed citations
3.
Jeong, Kitae, Changhoon Lee, & Jong In Lim. (2013). Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking. 2013(1). 9 indexed citations
4.
Jeong, Kitae, et al.. (2013). Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Journal of Applied Mathematics. 2013. 1–10. 3 indexed citations
5.
Jeong, Kitae, et al.. (2013). Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks. Sensor Letters. 11(9). 1765–1770. 2 indexed citations
6.
Jeong, Kitae. (2013). Security analysis of block cipher Piccolo suitable for wireless sensor networks. Peer-to-Peer Networking and Applications. 7(4). 636–644. 4 indexed citations
7.
Wu, Chunxue, Junhui Du, Yi Liu, et al.. (2013). An Energy Balancing Routing Algorithm for Mobile Sensor Networks. Sensor Letters. 11(9). 1783–1791. 3 indexed citations
8.
Jeong, Kitae, Jaechul Sung, Seokhie Hong, & Changhoon Lee. (2013). A new approach of differential fault analysis on block ciphers with S-box. 16. 1915–1928. 3 indexed citations
9.
Jeong, Kitae, et al.. (2013). Security Analysis of HMAC/NMAC by Using Fault Injection. Journal of Applied Mathematics. 2013. 1–6. 8 indexed citations
10.
Jeong, Kitae, et al.. (2013). Improved differential fault analysis on PRESENT-80/128. International Journal of Computer Mathematics. 90(12). 2553–2563. 18 indexed citations
11.
Jeong, Kitae. (2013). Cryptanalysis of block cipher Piccolo suitable for cloud computing. The Journal of Supercomputing. 66(2). 829–840. 6 indexed citations
12.
Gritzalis, Stefanos, Justin Zhan, & Kitae Jeong. (2013). IT convergence and security. Electronic Commerce Research. 13(3). 237–241. 12 indexed citations
13.
Park, Sehyun, et al.. (2012). Improved Differential Fault Analysis on Block Cipher PRESENT-80/128. Information Security and Cryptology. 22(1). 33–41. 1 indexed citations
14.
Jeong, Kitae. (2012). Security Analysis of Block Cipher LED-64 Suitable for Wireless Sensor Network Environments. The Journal of Advanced Navigation Technology. 16(1). 70–75. 1 indexed citations
15.
Jeong, Kitae & Changhoon Lee. (2012). Differential Fault Analysis on Lightweight Block Cipher LBlock. The Journal of Advanced Navigation Technology. 16(5). 871–878. 1 indexed citations
16.
Jeong, Kitae. (2012). Differential Fault Analysis on Block Cipher Piccolo-80. The Journal of Advanced Navigation Technology. 16(3). 510–517. 7 indexed citations
17.
Park, Sehyun, et al.. (2011). Differential Fault Analysis on Block Cipher ARIA-128. Information Security and Cryptology. 21(5). 15–25.
18.
Jeong, Kitae, et al.. (2011). Differential fault analysis on block cipher SEED. Mathematical and Computer Modelling. 55(1-2). 26–34. 27 indexed citations
19.
Jeong, Kitae, et al.. (2011). Fault Injection Attack on A5/3. 300–303. 3 indexed citations
20.
Jeong, Kitae, Changhoon Lee, Jongsung Kim, & Seokhie Hong. (2009). Security analysis of the SCO-family using key schedules☆. Information Sciences. 179(24). 4232–4242. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026