首页 > 最新文献

Cryptography and Communications最新文献

英文 中文
Probabilistic estimation of the algebraic degree of Boolean functions 布尔函数代数度的概率估计
Pub Date : 2023-08-12 DOI: 10.1007/s12095-023-00660-4
Ana Sălăgean, Percy Reyes-Paredes
Abstract The algebraic degree is an important parameter of Boolean functions used in cryptography. When a function in a large number of variables is not given explicitly in algebraic normal form, it is usually not feasible to compute its degree, so we need to estimate it. We propose a probabilistic test for deciding whether the algebraic degree of a Boolean function f is below a certain value k . If the degree is indeed below k , then f will always pass the test, otherwise f will fail each instance of the test with a probability $$textrm{dt}_k(f)$$ dt k ( f ) , which is closely related to the average number of monomials of degree k of the polynomials which are affine equivalent to f . The test has a good accuracy only if this probability $$textrm{dt}_k(f)$$ dt k ( f ) of failing the test is not too small. We initiate the study of $$textrm{dt}_k(f)$$ dt k ( f ) by showing that in the particular case when the degree of f is actually equal to k , the probability will be in the interval (0.288788, 0.5], and therefore a small number of runs of the test will be sufficient to give, with very high probability, the correct answer. Exact values of $$textrm{dt}_k(f)$$ dt k ( f ) for all the polynomials in 8 variables were computed using the representatives listed by Hou and by Langevin and Leander.
代数度是密码学中布尔函数的一个重要参数。当含有大量变量的函数没有以代数范式显式给出时,通常无法计算其次数,因此需要对其进行估计。我们提出了一个判别布尔函数f的代数度是否低于某一值k的概率检验。如果阶数确实低于k,则f总能通过测试,否则f每次测试失败的概率为$$textrm{dt}_k(f)$$ dt k (f),这与f的仿射等价多项式的k阶单项式的平均个数密切相关。只有当测试失败的概率$$textrm{dt}_k(f)$$ dt k (f)不太小时,测试才具有良好的准确性。我们开始研究$$textrm{dt}_k(f)$$ dt k (f),通过表明在f的度实际上等于k的特殊情况下,概率将在(0.288788,0.5)区间内,因此少量的测试运行将足以以非常高的概率给出正确答案。使用Hou和Langevin和Leander列出的代表,计算8个变量中所有多项式的精确值$$textrm{dt}_k(f)$$ dt k (f)。
{"title":"Probabilistic estimation of the algebraic degree of Boolean functions","authors":"Ana Sălăgean, Percy Reyes-Paredes","doi":"10.1007/s12095-023-00660-4","DOIUrl":"https://doi.org/10.1007/s12095-023-00660-4","url":null,"abstract":"Abstract The algebraic degree is an important parameter of Boolean functions used in cryptography. When a function in a large number of variables is not given explicitly in algebraic normal form, it is usually not feasible to compute its degree, so we need to estimate it. We propose a probabilistic test for deciding whether the algebraic degree of a Boolean function f is below a certain value k . If the degree is indeed below k , then f will always pass the test, otherwise f will fail each instance of the test with a probability $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> , which is closely related to the average number of monomials of degree k of the polynomials which are affine equivalent to f . The test has a good accuracy only if this probability $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> of failing the test is not too small. We initiate the study of $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> by showing that in the particular case when the degree of f is actually equal to k , the probability will be in the interval (0.288788, 0.5], and therefore a small number of runs of the test will be sufficient to give, with very high probability, the correct answer. Exact values of $$textrm{dt}_k(f)$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:msub> <mml:mtext>dt</mml:mtext> <mml:mi>k</mml:mi> </mml:msub> <mml:mrow> <mml:mo>(</mml:mo> <mml:mi>f</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:mrow> </mml:math> for all the polynomials in 8 variables were computed using the representatives listed by Hou and by Langevin and Leander.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134977707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions 密码学布尔函数设计的元启发式算法综述
Pub Date : 2023-07-29 DOI: 10.1007/s12095-023-00662-2
Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
Abstract Boolean functions are mathematical objects used in diverse domains and have been actively researched for several decades already. One domain where Boolean functions play an important role is cryptography. There, the plethora of settings one should consider and cryptographic properties that need to be fulfilled makes the search for new Boolean functions still a very active domain. There are several options to construct appropriate Boolean functions: algebraic constructions, random search, and metaheuristics. In this work, we concentrate on metaheuristic approaches and examine the related works appearing in the last 25 years. To the best of our knowledge, this is the first survey work on this topic. Additionally, we provide a new taxonomy of related works and discuss the results obtained. Finally, we finish this survey with potential future research directions.
摘要布尔函数是一种应用于各个领域的数学对象,几十年来一直受到人们的积极研究。密码学是布尔函数发挥重要作用的一个领域。在那里,需要考虑的设置和需要实现的加密属性的过多使得搜索新的布尔函数仍然是一个非常活跃的领域。有几种方法可以构造合适的布尔函数:代数构造、随机搜索和元启发式。在这项工作中,我们专注于元启发式方法,并检查在过去25年出现的相关工作。据我们所知,这是关于这个主题的第一次调查工作。此外,我们提供了一种新的相关工作分类,并讨论了所获得的结果。最后,对本研究进行了总结,并提出了未来的研究方向。
{"title":"A survey of metaheuristic algorithms for the design of cryptographic Boolean functions","authors":"Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek","doi":"10.1007/s12095-023-00662-2","DOIUrl":"https://doi.org/10.1007/s12095-023-00662-2","url":null,"abstract":"Abstract Boolean functions are mathematical objects used in diverse domains and have been actively researched for several decades already. One domain where Boolean functions play an important role is cryptography. There, the plethora of settings one should consider and cryptographic properties that need to be fulfilled makes the search for new Boolean functions still a very active domain. There are several options to construct appropriate Boolean functions: algebraic constructions, random search, and metaheuristics. In this work, we concentrate on metaheuristic approaches and examine the related works appearing in the last 25 years. To the best of our knowledge, this is the first survey work on this topic. Additionally, we provide a new taxonomy of related works and discuss the results obtained. Finally, we finish this survey with potential future research directions.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135444409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bounds on the differential uniformity of the Wan-Lidl polynomials Wan-Lidl多项式微分均匀性的界
Pub Date : 2023-03-18 DOI: 10.1007/s12095-023-00634-6
Li-An Chen, Robert S. Coulter
We study the differential uniformity of the Wan-Lidl polynomials over finite fields. A general upper bound, independent of the order of the field, is established. Additional bounds are established in settings where one of the parameters is restricted. In particular, we establish a class of permutation polynomials which have differential uniformity at most 5 over fields of order 3 mod 4, irrespective of the field size. Computational results are also given.
研究了有限域上Wan-Lidl多项式的微分均匀性。建立了一个与场阶无关的一般上界。在其中一个参数受到限制的设置中建立附加界限。特别地,我们建立了一类与域大小无关,在3阶mod 4的域上微分均匀性最多为5的置换多项式。并给出了计算结果。
{"title":"Bounds on the differential uniformity of the Wan-Lidl polynomials","authors":"Li-An Chen, Robert S. Coulter","doi":"10.1007/s12095-023-00634-6","DOIUrl":"https://doi.org/10.1007/s12095-023-00634-6","url":null,"abstract":"We study the differential uniformity of the Wan-Lidl polynomials over finite fields. A general upper bound, independent of the order of the field, is established. Additional bounds are established in settings where one of the parameters is restricted. In particular, we establish a class of permutation polynomials which have differential uniformity at most 5 over fields of order 3 mod 4, irrespective of the field size. Computational results are also given.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135244738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On recovering block cipher secret keys in the cold boot attack setting 在冷启动攻击设置下恢复分组密码密钥的研究
Pub Date : 2023-02-13 DOI: 10.1007/s12095-022-00625-z
Gustavo Banegas, Ricardo Villanueva-Polanco
Abstract This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover’s quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40 % of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.
摘要本文提出了一种在冷启动攻击环境下恢复分组密码密钥的通用策略。更准确地说,我们提出了一种密钥恢复方法,该方法结合了密钥枚举算法和Grover量子算法,在攻击者通过冷启动攻击获得噪声版本后恢复分组密码密钥。我们还展示了如何为几个分组密码(如AES、PRESENT和GIFT以及LowMC)实现我们算法的量子组件。此外,由于评估美国国家标准与技术研究院(NIST)后量子标准化过程中针对不同攻击向量的第三轮后量子候选算法对其整体评估非常重要,因此我们展示了在野餐上执行混合攻击的可行性,野餐是NIST后量子标准化竞赛的替代候选算法。根据我们的结果,我们的方法可以恢复所有Picnic参数集的Picnic私钥,对某些参数集容忍高达40%的噪声。此外,我们通过给出资源成本、运行时间和各种枚举的成功率,对我们的方法进行了详细的分析。
{"title":"On recovering block cipher secret keys in the cold boot attack setting","authors":"Gustavo Banegas, Ricardo Villanueva-Polanco","doi":"10.1007/s12095-022-00625-z","DOIUrl":"https://doi.org/10.1007/s12095-022-00625-z","url":null,"abstract":"Abstract This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover’s quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40 % of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135906260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
G-codes, self-dual G-codes and reversible G-codes over the ring Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m g码,环上自对偶g码和可逆g码Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amssyb} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m
Pub Date : 2021-05-03 DOI: 10.1007/s12095-021-00487-x
S. Dougherty, J. Gildea, Adrian Korban, S. Șahinkaya
{"title":"G-codes, self-dual G-codes and reversible G-codes over the ring Bj,kdocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}${m","authors":"S. Dougherty, J. Gildea, Adrian Korban, S. Șahinkaya","doi":"10.1007/s12095-021-00487-x","DOIUrl":"https://doi.org/10.1007/s12095-021-00487-x","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"23 1","pages":"601 - 616"},"PeriodicalIF":0.0,"publicationDate":"2021-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86158811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The c-differential behavior of the inverse function under the EA-equivalence 反函数在 EA 等价性下的 c 微分行为
Pub Date : 2021-01-07 DOI: 10.1007/s12095-020-00466-8
P. Stănică, Aaron Geary
{"title":"The c-differential behavior of the inverse function under the EA-equivalence","authors":"P. Stănică, Aaron Geary","doi":"10.1007/s12095-020-00466-8","DOIUrl":"https://doi.org/10.1007/s12095-020-00466-8","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"3 1","pages":"295 - 306"},"PeriodicalIF":0.0,"publicationDate":"2021-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141201918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Self-dual codes over F2×(F2+vF2)documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times 更正:自对偶代码超过f2x (F2+vF2)documentclass[12pt]{minimal} uspackage {amsmath} uspackage {wasysym} uspackage {amsfonts} uspackage {amssymb} uspackage {amssyb} uspackage {mathrsfs} uspackage {upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times
Pub Date : 2020-12-22 DOI: 10.1007/s12095-020-00464-w
Refia Aksoy, Fatma Çalışkan
{"title":"Correction to: Self-dual codes over F2×(F2+vF2)documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$ {mathbbm{F}}_2times ","authors":"Refia Aksoy, Fatma Çalışkan","doi":"10.1007/s12095-020-00464-w","DOIUrl":"https://doi.org/10.1007/s12095-020-00464-w","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"274 1","pages":"361 - 362"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75780846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the EA-classes of known APN functions in small dimensions 关于小维度中已知 APN 函数的 EA 类
Pub Date : 2020-04-06 DOI: 10.1007/s12095-020-00427-1
Marco Calderini
{"title":"On the EA-classes of known APN functions in small dimensions","authors":"Marco Calderini","doi":"10.1007/s12095-020-00427-1","DOIUrl":"https://doi.org/10.1007/s12095-020-00427-1","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":"821 - 840"},"PeriodicalIF":0.0,"publicationDate":"2020-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The subfield codes of several classes of linear codes 几类线性码的子字段码
Pub Date : 2020-04-04 DOI: 10.1007/s12095-020-00432-4
Xiaoqiang Wang, Dabin Zheng
{"title":"The subfield codes of several classes of linear codes","authors":"Xiaoqiang Wang, Dabin Zheng","doi":"10.1007/s12095-020-00432-4","DOIUrl":"https://doi.org/10.1007/s12095-020-00432-4","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"124 21","pages":"1111 - 1131"},"PeriodicalIF":0.0,"publicationDate":"2020-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The subfield codes of several classes of linear codes 几类线性码的子字段码
Pub Date : 2020-04-04 DOI: 10.1007/s12095-020-00432-4
Xiaoqiang Wang, Dabin Zheng
{"title":"The subfield codes of several classes of linear codes","authors":"Xiaoqiang Wang, Dabin Zheng","doi":"10.1007/s12095-020-00432-4","DOIUrl":"https://doi.org/10.1007/s12095-020-00432-4","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"124 17","pages":"1111 - 1131"},"PeriodicalIF":0.0,"publicationDate":"2020-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141216626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Cryptography and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1