Yongjin Yeom

435 total citations
30 papers, 97 citations indexed

About

Yongjin Yeom is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Yongjin Yeom has authored 30 papers receiving a total of 97 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Artificial Intelligence, 17 papers in Computer Vision and Pattern Recognition and 4 papers in Computer Networks and Communications. Recurrent topics in Yongjin Yeom's work include Chaos-based Image/Signal Encryption (17 papers), Cryptographic Implementations and Security (12 papers) and Coding theory and cryptography (6 papers). Yongjin Yeom is often cited by papers focused on Chaos-based Image/Signal Encryption (17 papers), Cryptographic Implementations and Security (12 papers) and Coding theory and cryptography (6 papers). Yongjin Yeom collaborates with scholars based in South Korea and United States. Yongjin Yeom's co-authors include Ju-Sung Kang, Jooyoung Lee, Chang-Ock Lee, Moti Yung, Jongwoo Lee, Dongwoo Sheen, Sang-Wook Han, Sung Moon, Yong‐Su Kim and Changhui Ye and has published in prestigious journals such as IEEE Access, Computer Methods in Applied Mechanics and Engineering and Discrete Applied Mathematics.

In The Last Decade

Yongjin Yeom

21 papers receiving 87 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yongjin Yeom South Korea 6 44 37 31 21 19 30 97
Jakob Wenzel Germany 4 18 0.4× 29 0.8× 31 1.0× 8 0.4× 12 0.6× 12 87
Ju-Sung Kang South Korea 5 70 1.6× 45 1.2× 24 0.8× 24 1.1× 61 3.2× 22 121
Michael Walter Germany 7 66 1.5× 63 1.7× 25 0.8× 10 0.5× 28 1.5× 17 123
Junji Shikata Japan 6 70 1.6× 40 1.1× 21 0.7× 29 1.4× 38 2.0× 49 125
Ibrahim Alabdulmohsin Saudi Arabia 7 73 1.7× 37 1.0× 27 0.9× 11 0.5× 30 1.6× 16 137
Davide Cavagnino Italy 11 54 1.2× 178 4.8× 20 0.6× 26 1.2× 45 2.4× 36 249
Preetum Nakkiran United States 6 112 2.5× 22 0.6× 64 2.1× 26 1.2× 95 5.0× 9 222
Yoshitaka Morikawa Japan 8 95 2.2× 44 1.2× 25 0.8× 62 3.0× 13 0.7× 57 157
Rudy Bunel United Kingdom 5 145 3.3× 52 1.4× 14 0.5× 9 0.4× 7 0.4× 13 175
Jean-Philippe Aumasson Switzerland 6 136 3.1× 65 1.8× 29 0.9× 32 1.5× 27 1.4× 11 168

Countries citing papers authored by Yongjin Yeom

Since Specialization
Citations

This map shows the geographic impact of Yongjin Yeom's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yongjin Yeom with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yongjin Yeom more than expected).

Fields of papers citing papers by Yongjin Yeom

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yongjin Yeom. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yongjin Yeom. The network helps show where Yongjin Yeom may publish in the future.

Co-authorship network of co-authors of Yongjin Yeom

This figure shows the co-authorship network connecting the top 25 collaborators of Yongjin Yeom. A scholar is included among the top collaborators of Yongjin Yeom based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yongjin Yeom. Yongjin Yeom is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yoon, Seungtai, et al.. (2024). IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph. IEEE Access. 12. 4575–4596.
2.
Kang, Ju-Sung, et al.. (2023). End-to-End PQC Encryption Protocol for GPKI-Based Video Conferencing Systems. 16. 24–29. 1 indexed citations
3.
Yeom, Yongjin, et al.. (2023). Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources. Entropy. 25(7). 1056–1056. 1 indexed citations
4.
Kang, Min-Sung, et al.. (2023). Mutual entity authentication of quantum key distribution network system using authentication qubits. EPJ Quantum Technology. 10(1). 1 indexed citations
5.
Yeom, Yongjin, et al.. (2021). Accelerated Implementation of NTRU on GPU for Efficient Key Exchange in Multi-Client Environment. Information Security and Cryptology. 31(3). 481–496. 2 indexed citations
6.
Yeom, Yongjin, et al.. (2020). Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography. Science China Information Sciences. 63(3).
7.
Yeom, Yongjin, et al.. (2019). A Lightweight BCH Code Corrector of TRNG with Measurable Dependence. Security and Communication Networks. 2019. 1–11.
8.
Kim, Yong‐Su, Ju-Sung Kang, Yongjin Yeom, et al.. (2019). Practical True Random Number Generator Using CMOS Image Sensor Dark Noise. IEEE Access. 7. 91407–91413. 16 indexed citations
9.
Kang, Ju-Sung, et al.. (2017). Recoverable Random Numbers in an Internet of Things Operating System. Entropy. 19(3). 113–113. 9 indexed citations
10.
Kang, Ju-Sung, et al.. (2017). Dynamic ransomware protection using deterministic random bit generator. 15 indexed citations
11.
Kang, Ju-Sung, et al.. (2016). Probabilistic Analysis of AIS.31 Statistical Tests for TRNGs and Their Applications to Security Evaluations. Journal of the Korea Institute of Information Security and Cryptology. 26(1). 49–67. 4 indexed citations
12.
Yeom, Yongjin & Ju-Sung Kang. (2016). Probability distributions for the Linux entropy estimator. Discrete Applied Mathematics. 241. 87–99.
13.
Kim, Nayoung, Ju-Sung Kang, & Yongjin Yeom. (2015). Provable Security of PRF-based Key Derivation Functions according to Input Types of Counters. Journal of the Korea Institute of Information Security and Cryptology. 25(3). 547–557.
14.
Kim, Sangpil, et al.. (2014). A Study of the Parallelization of Hybrid SAT Solver using CUDA. Advanced science and technology letters. 19–24. 4 indexed citations
15.
Yeom, Yongjin, et al.. (2011). Related-Key Boomerang Attack on Block Cipher SQUARE. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E94-A(1). 3–9. 3 indexed citations
16.
Yeom, Yongjin, et al.. (2008). High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library. Information Security and Cryptology. 18(3). 23–32. 1 indexed citations
17.
Yeom, Yongjin, et al.. (2008). High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. 271–275. 8 indexed citations
18.
Yeom, Yongjin, et al.. (2002). On the security of Camellia against the square attack. 1 indexed citations
19.
Chung, Soon‐Yeong & Yongjin Yeom. (1999). An Integral Transformation and its Applications to Harmonic Analysis on the Space of Solutions of the Heat Equation. Publications of the Research Institute for Mathematical Sciences. 35(5). 737–755. 2 indexed citations
20.
Lee, Chang-Ock, Jongwoo Lee, Dongwoo Sheen, & Yongjin Yeom. (1999). A frequency-domain parallel method for the numerical approximation of parabolic problems. Computer Methods in Applied Mechanics and Engineering. 169(1-2). 19–29. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026