首页 > 最新文献

Groups Complex. Cryptol.最新文献

英文 中文
Random equations in free groups 自由群中的随机方程
Pub Date : 1900-01-01 DOI: 10.1515/gcc.2011.010
R. Gilman, A. Myasnikov, V. Roman’kov
Abstract In this paper we study the asymptotic probability that a random equation in a finitely generated free group F is solvable in F. For one-variable equations this probability is zero, but for split equations, i.e., equations of the form v(x 1, . . . , xk ) = g, g ∈ F, the probability is strictly between zero and one if k ≥ rank(F) ≥ 2. As a consequence the endomorphism problem in F has intermediate asymptotic density, and we obtain the first natural algebraic examples of subsets of intermediate density in free groups of rank larger than two.
摘要本文研究了有限生成自由群F中的随机方程在F中可解的渐近概率。对于单变量方程,该概率为零,但对于分裂方程,即形式为v(x1,…)的方程,该概率为零。, xk) = g, g∈F,当k≥rank(F)≥2时,概率严格在0到1之间。由此得到F中的自同态问题具有中间渐近密度,并在秩大于2的自由群中获得了中间密度子集的第一个自然代数例子。
{"title":"Random equations in free groups","authors":"R. Gilman, A. Myasnikov, V. Roman’kov","doi":"10.1515/gcc.2011.010","DOIUrl":"https://doi.org/10.1515/gcc.2011.010","url":null,"abstract":"Abstract In this paper we study the asymptotic probability that a random equation in a finitely generated free group F is solvable in F. For one-variable equations this probability is zero, but for split equations, i.e., equations of the form v(x 1, . . . , xk ) = g, g ∈ F, the probability is strictly between zero and one if k ≥ rank(F) ≥ 2. As a consequence the endomorphism problem in F has intermediate asymptotic density, and we obtain the first natural algebraic examples of subsets of intermediate density in free groups of rank larger than two.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125253857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new algorithm to find apartments in coset geometries 在协集几何中寻找公寓的新算法
Pub Date : 1900-01-01 DOI: 10.1515/gcc-2013-0006
Thomas Connor, D. Leemans
Abstract. We present a new algorithm to find apartments in coset geometries. It permits to obtain some missing results in a paper by Buekenhout and Leemans. We compare the performance of our algorithm to the one given by Buekenhout and Leemans.
摘要我们提出了一种新的在协集几何中寻找公寓的算法。它允许在Buekenhout和Leemans的论文中获得一些缺失的结果。我们将我们的算法的性能与Buekenhout和Leemans给出的算法进行了比较。
{"title":"A new algorithm to find apartments in coset geometries","authors":"Thomas Connor, D. Leemans","doi":"10.1515/gcc-2013-0006","DOIUrl":"https://doi.org/10.1515/gcc-2013-0006","url":null,"abstract":"Abstract. We present a new algorithm to find apartments in coset geometries. It permits to obtain some missing results in a paper by Buekenhout and Leemans. We compare the performance of our algorithm to the one given by Buekenhout and Leemans.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenge response password security using combinatorial group theory 基于组合群理论的挑战响应密码安全
Pub Date : 1900-01-01 DOI: 10.1515/gcc.2010.005
G. Baumslag, Yegor Bryukhov, B. Fine, Douglas R. Troeger
Abstract Challenge response methods are increasingly used to enhance password security. In this paper we present a very secure method for challenge response password verification using combinatorial group theory. This method, which relies on the group randomizer system, a subset of the MAGNUS computer algebra system, handles most of the present problems with challenge response systems. Theoretical security is based on several results in asymptotic group theory.
挑战响应方法越来越多地用于提高密码安全性。本文利用组合群理论提出了一种非常安全的挑战响应密码验证方法。该方法依赖于MAGNUS计算机代数系统的子集群随机系统,可以处理当前挑战响应系统的大多数问题。理论安全性建立在渐近群理论的几个结果的基础上。
{"title":"Challenge response password security using combinatorial group theory","authors":"G. Baumslag, Yegor Bryukhov, B. Fine, Douglas R. Troeger","doi":"10.1515/gcc.2010.005","DOIUrl":"https://doi.org/10.1515/gcc.2010.005","url":null,"abstract":"Abstract Challenge response methods are increasingly used to enhance password security. In this paper we present a very secure method for challenge response password verification using combinatorial group theory. This method, which relies on the group randomizer system, a subset of the MAGNUS computer algebra system, handles most of the present problems with challenge response systems. Theoretical security is based on several results in asymptotic group theory.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"45 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Algebraic Attacks Galore! 大量的代数攻击!
Pub Date : 1900-01-01 DOI: 10.1515/GCC.2009.231
M. Kreuzer
This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases.
这是当前代数密码分析技术的两部分调查中的第一部分。在介绍了代数攻击的基本设置并讨论了对称密码系统、公钥密码系统和流密码的几种攻击场景之后,我们讨论了一些单独的方法。XL、XSL和MutantXL攻击基于多元多项式系统的线性化技术。然后我们看看Gröbner基和边界基方法。在最后一节中,我们介绍了基于整数规划技术的攻击,并在一些具体案例中进行了尝试。
{"title":"Algebraic Attacks Galore!","authors":"M. Kreuzer","doi":"10.1515/GCC.2009.231","DOIUrl":"https://doi.org/10.1515/GCC.2009.231","url":null,"abstract":"This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Generic Subgroups of Group Amalgams 群汞合金的一般子群
Pub Date : 1900-01-01 DOI: 10.1515/GCC.2009.51
B. Fine, A. Myasnikov, G. Rosenberger
Abstract For many groups the structure of finitely generated subgroups is generically simple. That is with asymptotic density equal to one a randomly chosen finitely generated subgroup has a particular well-known and easily analyzed structure. For example a result of D. B. A. Epstein says that a finitely generated subgroup of GL(n, ℝ) is generically a free group. We say that a group G has the generic free group property if any finitely generated subgroup is generically a free group. Further G has the strong generic free group property if given randomly chosen elements g 1, . . . , gn in G then generically they are a free basis for the free subgroup they generate. In this paper we show that for any arbitrary free product of finitely generated infinite groups satisfies the strong generic free group property. There are also extensions to more general amalgams - free products with amalgamation and HNN groups. These results have implications in cryptography. In particular several cryptosystems use random choices of subgroups as hard cryptographic problems. In groups with the generic free group property any such cryptosystem may be attackable by a length based attack.
摘要对于许多群,有限生成子群的结构一般是简单的。也就是说,当密度渐近等于1时,随机选择的有限生成的子群具有特定的众所周知的易于分析的结构。例如,D. B. a . Epstein的一个结果说,GL(n, l)的有限生成子群一般是一个自由群。如果任何有限生成的子群是一般自由群,则群G具有一般自由群的性质。若给定随机选取的元素g1,…,则G具有强一般自由群性质。, gn在G中,那么一般来说它们是它们生成的自由子群的自由基。本文证明了有限生成无限群的任意自由积满足强一般自由群的性质。也有扩展到更一般的无汞合金产品与合并和HNN组。这些结果对密码学有影响。特别是一些密码系统使用子群的随机选择作为硬密码问题。在具有一般自由群属性的群中,任何这样的密码系统都可以被基于长度的攻击攻击。
{"title":"Generic Subgroups of Group Amalgams","authors":"B. Fine, A. Myasnikov, G. Rosenberger","doi":"10.1515/GCC.2009.51","DOIUrl":"https://doi.org/10.1515/GCC.2009.51","url":null,"abstract":"Abstract For many groups the structure of finitely generated subgroups is generically simple. That is with asymptotic density equal to one a randomly chosen finitely generated subgroup has a particular well-known and easily analyzed structure. For example a result of D. B. A. Epstein says that a finitely generated subgroup of GL(n, ℝ) is generically a free group. We say that a group G has the generic free group property if any finitely generated subgroup is generically a free group. Further G has the strong generic free group property if given randomly chosen elements g 1, . . . , gn in G then generically they are a free basis for the free subgroup they generate. In this paper we show that for any arbitrary free product of finitely generated infinite groups satisfies the strong generic free group property. There are also extensions to more general amalgams - free products with amalgamation and HNN groups. These results have implications in cryptography. In particular several cryptosystems use random choices of subgroups as hard cryptographic problems. In groups with the generic free group property any such cryptosystem may be attackable by a length based attack.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121982697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An introduction to computable model theory on groups and fields 群与场的可计算模型理论简介
Pub Date : 1900-01-01 DOI: 10.1515/gcc.2011.002
Russell G. Miller
Abstract We introduce the standard computable-model-theoretic concepts of a computable group and a computable field, and use them to illustrate the sorts of questions about groups and fields which computability theorists investigate. This article is intended for group theorists with some background in algorithmic questions, such as the undecidability of the word problem and the conjugacy problem for finitely presented groups.
摘要引入了可计算群和可计算域的标准可计算模型理论概念,并用它们来说明可计算理论家研究的关于群和域的各种问题。本文旨在为具有算法问题背景的群理论家提供一些帮助,例如单词问题的不可判定性和有限呈现群的共轭问题。
{"title":"An introduction to computable model theory on groups and fields","authors":"Russell G. Miller","doi":"10.1515/gcc.2011.002","DOIUrl":"https://doi.org/10.1515/gcc.2011.002","url":null,"abstract":"Abstract We introduce the standard computable-model-theoretic concepts of a computable group and a computable field, and use them to illustrate the sorts of questions about groups and fields which computability theorists investigate. This article is intended for group theorists with some background in algorithmic questions, such as the undecidability of the word problem and the conjugacy problem for finitely presented groups.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Another look at non-uniformity 再看一下非均匀性
Pub Date : 1900-01-01 DOI: 10.1515/gcc-2013-0008
N. Koblitz, A. Menezes
Abstract. We argue that it is unnatural and undesirable to use the non-uniform model of complexity for practice-oriented security reductions in cryptography.
摘要我们认为,在密码学中使用非统一的复杂性模型来降低面向实践的安全性是不自然和不可取的。
{"title":"Another look at non-uniformity","authors":"N. Koblitz, A. Menezes","doi":"10.1515/gcc-2013-0008","DOIUrl":"https://doi.org/10.1515/gcc-2013-0008","url":null,"abstract":"Abstract. We argue that it is unnatural and undesirable to use the non-uniform model of complexity for practice-oriented security reductions in cryptography.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography 群中多重共轭搜索问题的进化算法及其在密码学中的应用
Pub Date : 1900-01-01 DOI: 10.1515/gcc-2012-0002
M. J. Craven, H. C. Jimbo
Abstract. We consider the multiple conjugacy search problem over a subclass of partially commutative groups and experimentally attack it with a genetic algorithm hybridised with a “length attack”. We detail symbolic computation of words over the groups, constructing functions which measure certain statistics of those words. By experimentation, the hybrid algorithm is shown to be effective, showing that the standard conjugacy search problem is harder than the multiple conjugacy search problem for our groups. Moreover, some intuitive methods of increasing problem difficulty are overcome by the algorithm, and in fact make the problem easier to solve. We show our algorithm is efficient, comparing well with traditional approaches in groups that are statistically similar. Finally, via “approximation” of braid groups by our subclass, we consider implications of the attack on certain cryptosystems, pointing to further work in the discipline of group-theoretic cryptography.
摘要考虑部分可交换群上的多重共轭搜索问题,用混合“长度攻击”的遗传算法进行了实验求解。我们详细介绍了组上单词的符号计算,构建了测量这些单词的某些统计量的函数。通过实验,证明了混合算法的有效性,表明标准共轭搜索问题比多重共轭搜索问题更难。此外,该算法克服了一些直观的增加问题难度的方法,实际上使问题更容易求解。我们证明了我们的算法是有效的,在统计相似的组中与传统方法相比效果很好。最后,通过我们的子类对辫子群的“近似”,我们考虑了对某些密码系统的攻击的含义,指出了在群论密码学学科中的进一步工作。
{"title":"Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography","authors":"M. J. Craven, H. C. Jimbo","doi":"10.1515/gcc-2012-0002","DOIUrl":"https://doi.org/10.1515/gcc-2012-0002","url":null,"abstract":"Abstract. We consider the multiple conjugacy search problem over a subclass of partially commutative groups and experimentally attack it with a genetic algorithm hybridised with a “length attack”. We detail symbolic computation of words over the groups, constructing functions which measure certain statistics of those words. By experimentation, the hybrid algorithm is shown to be effective, showing that the standard conjugacy search problem is harder than the multiple conjugacy search problem for our groups. Moreover, some intuitive methods of increasing problem difficulty are overcome by the algorithm, and in fact make the problem easier to solve. We show our algorithm is efficient, comparing well with traditional approaches in groups that are statistically similar. Finally, via “approximation” of braid groups by our subclass, we consider implications of the attack on certain cryptosystems, pointing to further work in the discipline of group-theoretic cryptography.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"40 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem 基于最接近向量定理的秘密共享方案和对私钥密码系统的改进
Pub Date : 1900-01-01 DOI: 10.1515/gcc-2013-0012
B. Fine, A. Moldenhauer, G. Rosenberger
Abstract. We explain and perform the steps for an (n,t) secret sharing scheme based on the closest vector theorem. We then compare this scheme and its complexity to the secret sharing schemes of both Shamir and Panagopoulos. Finally we modify the (n,t) secret sharing scheme to a private key cryptosystem.
摘要我们解释并执行了基于最接近向量定理的(n,t)秘密共享方案的步骤。然后,我们将该方案及其复杂性与Shamir和Panagopoulos的秘密共享方案进行比较。最后,我们将(n,t)秘密共享方案修改为私钥密码系统。
{"title":"A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem","authors":"B. Fine, A. Moldenhauer, G. Rosenberger","doi":"10.1515/gcc-2013-0012","DOIUrl":"https://doi.org/10.1515/gcc-2013-0012","url":null,"abstract":"Abstract. We explain and perform the steps for an (n,t) secret sharing scheme based on the closest vector theorem. We then compare this scheme and its complexity to the secret sharing schemes of both Shamir and Panagopoulos. Finally we modify the (n,t) secret sharing scheme to a private key cryptosystem.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Continuous hard-to-invert functions and biometric authentication 连续的难以反转的功能和生物识别认证
Pub Date : 1900-01-01 DOI: 10.1515/gcc-2012-0004
D. Grigoriev, S. Nikolenko
Abstract. We consider the problem of constructing continuous cryptographic primitives. We present several candidates for continuous hard-to-invert functions. To formulate these candidates, we introduce constructions based on tropical and supertropical circuits.
摘要考虑构造连续密码原语的问题。我们提出了几个连续难逆函数的候选函数。为了确定这些候选电路,我们介绍了基于热带和超热带电路的结构。
{"title":"Continuous hard-to-invert functions and biometric authentication","authors":"D. Grigoriev, S. Nikolenko","doi":"10.1515/gcc-2012-0004","DOIUrl":"https://doi.org/10.1515/gcc-2012-0004","url":null,"abstract":"Abstract. We consider the problem of constructing continuous cryptographic primitives. We present several candidates for continuous hard-to-invert functions. To formulate these candidates, we introduce constructions based on tropical and supertropical circuits.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Groups Complex. Cryptol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1