首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Packing designs with large block size 大块尺寸的包装设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-05 DOI: 10.1007/s10623-025-01745-2
Andrea C. Burgess, Peter Danziger, Daniel Horsley, Muhammad Tariq Javed
{"title":"Packing designs with large block size","authors":"Andrea C. Burgess, Peter Danziger, Daniel Horsley, Muhammad Tariq Javed","doi":"10.1007/s10623-025-01745-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01745-2","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145902645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved bounds for codes over trees 改进了树上代码的边界
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-05 DOI: 10.1007/s10623-025-01741-6
Yanzhi Li, Wenjie Zhong, Tingting Chen, Xiande Zhang
{"title":"Improved bounds for codes over trees","authors":"Yanzhi Li, Wenjie Zhong, Tingting Chen, Xiande Zhang","doi":"10.1007/s10623-025-01741-6","DOIUrl":"https://doi.org/10.1007/s10623-025-01741-6","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"44 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145903370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On flag-transitive 2-designs with prime block length and projective special linear groups 素数块长和射影特殊线性群的旗子-传递2-设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-05 DOI: 10.1007/s10623-025-01764-z
Mohsen Bayat, Nasrin Soltankhah
{"title":"On flag-transitive 2-designs with prime block length and projective special linear groups","authors":"Mohsen Bayat, Nasrin Soltankhah","doi":"10.1007/s10623-025-01764-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01764-z","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"15 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145902642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of some minihypers in $${{,textrm{PG},}}(r,3)$$ and the nonexistence of some ternary Griesmer codes $${{,textrm{PG},}}(r,3)$$中一些小超码的性质和一些三元Griesmer码的不存在性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-05 DOI: 10.1007/s10623-025-01752-3
Ivan Landjev, Emiliyan Rogachev, Assia Rousseva
{"title":"Characterization of some minihypers in $${{,textrm{PG},}}(r,3)$$ and the nonexistence of some ternary Griesmer codes","authors":"Ivan Landjev, Emiliyan Rogachev, Assia Rousseva","doi":"10.1007/s10623-025-01752-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01752-3","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145902646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal CIS codes, optimal t-CIS codes and their applications in cryptography 最优CIS码、最优t-CIS码及其在密码学中的应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1007/s10623-025-01773-y
Hao Chen, Shengwei Liu, Conghui Xie, Hongwei Liu
{"title":"Optimal CIS codes, optimal t-CIS codes and their applications in cryptography","authors":"Hao Chen, Shengwei Liu, Conghui Xie, Hongwei Liu","doi":"10.1007/s10623-025-01773-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01773-y","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145829853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Eisenstein additive codes over chain rings and linear codes over mixed alphabets 链环上的爱森斯坦加性码和混合字母上的线性码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1007/s10623-025-01740-7
Leijo Jose, Anuradha Sharma
{"title":"On Eisenstein additive codes over chain rings and linear codes over mixed alphabets","authors":"Leijo Jose, Anuradha Sharma","doi":"10.1007/s10623-025-01740-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01740-7","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145829852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information set decoding for ring-linear codes 环线性码的信息集译码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1007/s10623-025-01744-3
Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini
Information set decoding (ISD) algorithms currently offer the most powerful tool to solve the two archetypal problems of coding theory, namely the codeword finding problem and the syndrome decoding problem. Traditionally, ISD have primarily been studied for linear codes over finite fields, equipped with the Hamming metric. However, recently, other possibilities have also been explored. These algorithms have been adapted to different ambient spaces and metrics, such as the rank metric or the Lee metric over $$mathbb {Z}_m$$ Z m . In this paper, we propose a general framework for decoding ring-linear codes that exploits the underlying ring structure to improve traditional approaches. The core idea is to project the decoding instance onto a smaller alphabet, which may enable more efficient decoding algorithms. The framework applies to coordinate-additive metric including Hamming and Lee, and extends to the rank metric, though its effectiveness strongly depends on the chosen metric. We illustrate how this framework can be leveraged to design decoding algorithms for the two aforementioned problems in Hamming, rank, and Lee metrics, along with their range of effectiveness. For each case, we provide the average computational complexity of the resulting algorithms.
信息集译码(ISD)算法是目前解决编码理论的两个原型问题——码字查找问题和证型译码问题的最有力工具。传统上,ISD主要研究有限域上的线性码,并配有汉明度量。然而,最近也探索了其他可能性。这些算法已经适应了不同的环境空间和度量,例如秩度量或$$mathbb {Z}_m$$ Z m上的Lee度量。在本文中,我们提出了一种解码环线性码的通用框架,利用潜在的环结构来改进传统方法。核心思想是将解码实例投影到更小的字母表上,这可能会使解码算法更有效。该框架适用于包括Hamming和Lee在内的坐标加性度量,并扩展到秩度量,尽管其有效性强烈依赖于所选择的度量。我们说明了如何利用这个框架来设计针对上述两个问题的解码算法,包括Hamming、rank和Lee度量,以及它们的有效性范围。对于每种情况,我们提供了结果算法的平均计算复杂度。
{"title":"Information set decoding for ring-linear codes","authors":"Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini","doi":"10.1007/s10623-025-01744-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01744-3","url":null,"abstract":"Information set decoding (ISD) algorithms currently offer the most powerful tool to solve the two archetypal problems of coding theory, namely the codeword finding problem and the syndrome decoding problem. Traditionally, ISD have primarily been studied for linear codes over finite fields, equipped with the Hamming metric. However, recently, other possibilities have also been explored. These algorithms have been adapted to different ambient spaces and metrics, such as the rank metric or the Lee metric over <jats:inline-formula> <jats:alternatives> <jats:tex-math>$$mathbb {Z}_m$$</jats:tex-math> <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:msub> <mml:mi>Z</mml:mi> <mml:mi>m</mml:mi> </mml:msub> </mml:math> </jats:alternatives> </jats:inline-formula> . In this paper, we propose a general framework for decoding ring-linear codes that exploits the underlying ring structure to improve traditional approaches. The core idea is to project the decoding instance onto a smaller alphabet, which may enable more efficient decoding algorithms. The framework applies to coordinate-additive metric including Hamming and Lee, and extends to the rank metric, though its effectiveness strongly depends on the chosen metric. We illustrate how this framework can be leveraged to design decoding algorithms for the two aforementioned problems in Hamming, rank, and Lee metrics, along with their range of effectiveness. For each case, we provide the average computational complexity of the resulting algorithms.","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145829884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New construction of non-expandable (1, k)-overlap-free codes 不可扩展(1,k)-无重叠代码的新结构
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1007/s10623-025-01737-2
Chunyan Qin, Gaojun Luo, Bocong Chen
{"title":"New construction of non-expandable (1, k)-overlap-free codes","authors":"Chunyan Qin, Gaojun Luo, Bocong Chen","doi":"10.1007/s10623-025-01737-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01737-2","url":null,"abstract":"","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145829851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sneaking up the ranks: Partial key exposure attacks on rank-based schemes 潜入级别:针对基于级别的方案的部分密钥暴露攻击
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-24 DOI: 10.1007/s10623-025-01738-1
Giuseppe D’Alconzo, Andre Esser, Andrea Gangemi, Carlo Sanna
A partial key exposure attack is a key recovery attack where an adversary obtains a priori partial knowledge of the secret key, e.g., through side-channel leakage. While for a long time post-quantum cryptosystems, unlike RSA, have been believed to be resistant to such attacks, recent results by Esser, May, Verbel, and Wen (CRYPTO ’22), and by Kirshanova and May (SCN ’22), have refuted this belief. In this work, we focus on partial key exposure attacks in the context of rank-metric-based schemes, particularly targeting the RYDE, MIRA, and MiRitH digital signatures schemes, which are active candidates in the NIST post-quantum cryptography standardization process. We demonstrate that, similar to the RSA case, the secret key in RYDE can be recovered from a constant fraction of its bits. Specifically, for NIST category I parameters, our attacks remain efficient even when less than 25% of the key material is leaked. Interestingly, our attacks lead to a natural improvement of the best generic attack on RYDE without partial knowledge , reducing security levels by up to 9 bits. For MIRA and MiRitH our attacks remain efficient as long as roughly 57–60% of the secret key material is leaked. Additionally, we initiate the study of partial exposure of the witness in constructions following the popular MPCitH (MPC-in-the-Head) paradigm. We show a generic reduction from recovering RYDE and MIRA’s witness to the MinRank problem, which again leads to efficient key recovery from constant fractions of the secret witness in both cases.
部分密钥暴露攻击是一种密钥恢复攻击,攻击者获得秘密密钥的先验部分知识,例如,通过侧通道泄漏。虽然很长一段时间后量子密码系统,不像RSA,被认为可以抵抗这种攻击,但Esser, May, Verbel和Wen (CRYPTO ' 22)以及Kirshanova和May (SCN ' 22)最近的研究结果驳斥了这种观点。在这项工作中,我们专注于基于排名指标的方案背景下的部分密钥暴露攻击,特别是针对RYDE, MIRA和MiRitH数字签名方案,这些方案是NIST后量子加密标准化过程中的活跃候选方案。我们证明,与RSA情况类似,RYDE中的密钥可以从其位数的恒定部分中恢复。具体来说,对于NIST的I类参数,即使只有不到25%的关键材料泄露,我们的攻击仍然有效。有趣的是,我们的攻击导致在没有部分知识的情况下对RYDE进行最佳通用攻击的自然改进,将安全级别降低了多达9位。对于MIRA和MiRitH,只要大约57-60%的密钥材料被泄露,我们的攻击就仍然有效。此外,我们开始研究部分暴露的证人在结构遵循流行的MPCitH (MPC-in-the-Head)范式。我们展示了从恢复RYDE和MIRA的见证到MinRank问题的通用减少,这再次导致在两种情况下从秘密见证的恒定分数中有效地恢复密钥。
{"title":"Sneaking up the ranks: Partial key exposure attacks on rank-based schemes","authors":"Giuseppe D’Alconzo, Andre Esser, Andrea Gangemi, Carlo Sanna","doi":"10.1007/s10623-025-01738-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01738-1","url":null,"abstract":"A partial key exposure attack is a key recovery attack where an adversary obtains a priori partial knowledge of the secret key, e.g., through side-channel leakage. While for a long time post-quantum cryptosystems, unlike RSA, have been believed to be resistant to such attacks, recent results by Esser, May, Verbel, and Wen (CRYPTO ’22), and by Kirshanova and May (SCN ’22), have refuted this belief. In this work, we focus on partial key exposure attacks in the context of rank-metric-based schemes, particularly targeting the RYDE, MIRA, and MiRitH digital signatures schemes, which are active candidates in the NIST post-quantum cryptography standardization process. We demonstrate that, similar to the RSA case, the secret key in RYDE can be recovered from a constant fraction of its bits. Specifically, for NIST category I parameters, our attacks remain efficient even when less than 25% of the key material is leaked. Interestingly, our attacks lead to a natural improvement of the best generic attack on RYDE <jats:italic>without partial knowledge</jats:italic> , reducing security levels by up to 9 bits. For MIRA and MiRitH our attacks remain efficient as long as roughly 57–60% of the secret key material is leaked. Additionally, we initiate the study of partial exposure of the witness in constructions following the popular MPCitH (MPC-in-the-Head) paradigm. We show a generic reduction from recovering RYDE and MIRA’s witness to the MinRank problem, which again leads to efficient key recovery from constant fractions of the secret witness in both cases.","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145829850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MDS stabilizer poset codes MDS稳定器偏置码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-20 DOI: 10.1007/s10623-025-01743-4
Mahir Bilen Can
Poset metrics in the context of stabilizer codes are investigated. We establish a Singleton-type bound for stabilizer poset codes and introduce the notion of MDS stabilizer poset codes. Several characterizations of these codes are obtained, including criteria in terms of additive codes and perfect codes. We also prove existence results for large families of examples, thereby extending classical results on MDS poset codes to the quantum setting.
研究了稳定器规范中的偏集度量。建立了稳定序集码的单态界,引入了MDS稳定序集码的概念。给出了这些码的几种特征,包括加性码和完全码的判据。我们还证明了大族例子的存在性结果,从而将MDS偏置码的经典结果推广到量子集。
{"title":"MDS stabilizer poset codes","authors":"Mahir Bilen Can","doi":"10.1007/s10623-025-01743-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01743-4","url":null,"abstract":"Poset metrics in the context of stabilizer codes are investigated. We establish a Singleton-type bound for stabilizer poset codes and introduce the notion of MDS stabilizer poset codes. Several characterizations of these codes are obtained, including criteria in terms of additive codes and perfect codes. We also prove existence results for large families of examples, thereby extending classical results on MDS poset codes to the quantum setting.","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145796149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1