Next follows some partial study of the influence of cryptographers in terms of how much they have been cited. (I have included also non-cryptographers that occassionally write cryptographic papers. Some people whose 10 most cites papers do not include crypto papers have been greyed out. Also people who are mostly femous for writing books have been greyed out.
Disclaimer: All information has been gathered from public sources. If you want to add or delete some information about you, please email me. I do this all from my free time. But I welcome information that will help me in updating this page.
Disclaimer 2. Do not take those numbers too seriously without actually studying how Google collects the citations. Moreover, bear in mind that citations differ significantly in subfields of computer science, with practical areas getting a bulk of the citations. Also, for some of the authors, a majority of citations comes from authored textbooks, or even worse, from self-citations. Thus, be careful.
Note: "cites per #authors" divides the number of citations each paper has got by the number of authors it has. This increases fairness in interdisciplinary comparisons (e.g., papers in biology have 20+ coauthors and thousands of citations, papers in mathematics have 1 author and tens of citations). We note that this parameter is not perfect, since Google Scholar omits some authors in their page, but the same is also true in say the "Publish and Perish" program.
Links to Google citations profiles are fetched automatically when updating the database...
All links are clickable. For example, you can sort people according to Cites, Recent (2005+), H-Index, compare institutions to each other, or see people only from a certain institution.
People with less than 0 citations are not displayed (this can adjusted with url suffix "&cutoff=xxx").
Greyed out persons do only partially belong to this table (for various reasons), or they have namesakes that contribute to majority of their citations.
|Name||Institution||Cites per #authors||Cites per #authors (2005+)||Cites||Recent (2005+)||H-Index (2005+)||Google citations||Birthday||Thesis|
|Jonathan KatzÁ>||USA.Maryland||9690 ( 44%)||3752 ( 38%)||21786||9995||20||20||17258|
|Ca. 1974||Efficient Cryptographic Protocols Preventing "Man-in-the-Middle" Attacks (USA.Columbia, 2002)|
|1.||Ji Sun ShinÁ>||USA.Maryland||383 ( 29%)||383 ( 29%)||1332||1332||20||20||0|
|2.||Helger LipmaaÁ>||Estonia.U Tartu||1325 ( 53%)||718 ( 64%)||2484||1119||20||18||3407||xx.04.1972||Secure and Efficient Time-Stamping Systems (Estonia.Tartu, 1999)|
|3.||Xiao Wang||USA.Maryland||8332 ( 34%)||4160 ( 29%)||24803||14425||20||20||20218|
|4.||Seung Geol Choi||USA.Maryland||162 ( 24%)||158 ( 25%)||662||639||15||14||674|
|5.||Ranjit Kumaresan||USA.Maryland||166 ( 35%)||166 ( 35%)||474||473||13||13||484|