This map shows the geographic impact of SangJae Moon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by SangJae Moon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites SangJae Moon more than expected).
This network shows the impact of papers produced by SangJae Moon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by SangJae Moon. The network helps show where SangJae Moon may publish in the future.
Co-authorship network of co-authors of SangJae Moon
This figure shows the co-authorship network connecting the top 25 collaborators of SangJae Moon.
A scholar is included among the top collaborators of SangJae Moon based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with SangJae Moon. SangJae Moon is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Moon, SangJae, et al.. (2012). Differential fault analysis on AES by round reduction. 607–612.5 indexed citations
4.
Moon, SangJae, et al.. (2012). A practical analysis of fault attack countermeasure on AES using data masking. 508–513.3 indexed citations
5.
Ha, Jaecheol, et al.. (2011). Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System. Information Security and Cryptology. 21(3). 11–25.
6.
Moon, SangJae, et al.. (2011). A Round Reduction Attack on Triple DES Using Fault Injection. Information Security and Cryptology. 21(2). 91–100.
Moon, SangJae, et al.. (2010). A Fault Injection Attack on the For Statement in AES Implementation. Information Security and Cryptology. 20(6). 59–65.
9.
Lee, Hoon Jae, et al.. (2009). CCC-NSG : A Security Enhancement of the Bluetooth $E_0$Cipher using a Circular-Clock-Controlled Nonlinear Algorithm. The Journal of Korean Institute of Communications and Information Sciences. 34(7). 640–648.1 indexed citations
10.
Moon, SangJae, et al.. (2009). Experimental Analysis of Optical Fault Injection Attack for CRT-RSA Cryptosystem. Information Security and Cryptology. 19(3). 51–59.
11.
Ha, Jaecheol, et al.. (2008). Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System. Information Security and Cryptology. 18(1). 77–87.2 indexed citations
12.
Liu, Zhihong, Jianfeng Ma, Qiping Huang, & SangJae Moon. (2008). Keying Material Based Key Pre-distribution Scheme for Sensor Networks.. Ad Hoc & Sensor Wireless Networks. 6. 67–89.2 indexed citations
Moon, SangJae, et al.. (2006). A Secure ARIA implementation resistant to Differential Power Attack using Random Masking Method. Information Security and Cryptology. 16(2). 129–139.
18.
Lee, Sang-Gon, Yvonne Hitchcock, Young-Ho Park, & SangJae Moon. (2006). Provably secure tripartite password protected key exchange protocol based on elliptic curves. Lecture notes in computer science. 205–220.
19.
Moon, SangJae, et al.. (2006). A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack. Information Security and Cryptology. 16(3). 143–155.1 indexed citations
20.
Moon, SangJae, et al.. (2006). An Uniform Routing Mechanism with Low Energy Consumption over Wireless Sensor Network. The Journal of Korean Institute of Communications and Information Sciences. 31. 80–86.2 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.