首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated Storage 基于图和多图的复制存储上PIR的新容量界限
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-11 DOI: 10.1109/TIT.2025.3631441
Xiangliang Kong;Shreya Meel;Thomas Jacob Maranzatto;Itzhak Tamo;Sennur Ulukus
In this paper, we study the problem of private information retrieval (PIR) in both graph-based and multigraph-based replication systems, where each file is stored on exactly two servers, and any pair of servers shares at most r files. We derive upper bounds on the PIR capacity for such systems and construct PIR schemes that approach these bounds. For graph-based systems, we determine the exact PIR capacity for path graphs and improve upon existing results for complete bipartite graphs and complete graphs. For multigraph-based systems, we propose a PIR scheme that leverages the symmetry of the underlying graph-based construction, yielding a capacity lower bound for such multigraphs. Furthermore, we establish several general upper and lower bounds on the PIR capacity of multigraphs, which are tight in certain cases.
在本文中,我们研究了基于图和基于多图的复制系统中的私有信息检索(PIR)问题,其中每个文件存储在两个服务器上,任意一对服务器最多共享r个文件。我们给出了这类系统的PIR容量的上界,并构造了逼近这些上界的PIR格式。对于基于图的系统,我们确定了路径图的精确PIR容量,并改进了完全二部图和完全图的现有结果。对于基于多图的系统,我们提出了一种PIR方案,该方案利用了底层基于图的构造的对称性,从而产生了这种多图的容量下界。此外,我们建立了多重图PIR容量的几个一般上界和下界,它们在某些情况下是紧的。
{"title":"New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated Storage","authors":"Xiangliang Kong;Shreya Meel;Thomas Jacob Maranzatto;Itzhak Tamo;Sennur Ulukus","doi":"10.1109/TIT.2025.3631441","DOIUrl":"https://doi.org/10.1109/TIT.2025.3631441","url":null,"abstract":"In this paper, we study the problem of private information retrieval (PIR) in both graph-based and multigraph-based replication systems, where each file is stored on exactly two servers, and any pair of servers shares at most <italic>r</i> files. We derive upper bounds on the PIR capacity for such systems and construct PIR schemes that approach these bounds. For graph-based systems, we determine the exact PIR capacity for path graphs and improve upon existing results for complete bipartite graphs and complete graphs. For multigraph-based systems, we propose a PIR scheme that leverages the symmetry of the underlying graph-based construction, yielding a capacity lower bound for such multigraphs. Furthermore, we establish several general upper and lower bounds on the PIR capacity of multigraphs, which are tight in certain cases.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"691-709"},"PeriodicalIF":2.9,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Variant of the Bravyi–Terhal Bound for Arbitrary Boundary Conditions 任意边界条件下Bravyi-Terhal界的一种变体
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-06 DOI: 10.1109/TIT.2025.3629670
François Arnault;Philippe Gaborit;Wouter Rozendaal;Nicolas Saussay;Gilles Zémor
We present a modified version of the Bravyi-Terhal bound that applies to quantum codes defined by local parity-check constraints on a D-dimensional lattice quotient. Specifically, we consider a quotient $mathbb {Z}^{D}/Lambda $ of $mathbb {Z}^{D}$ of cardinality $ell $ , where $Lambda $ is some D-dimensional sublattice of $mathbb {Z}^{D}$ : we suppose that every vertex of this quotient indexes m qubits of a stabilizer code $mathcal {C}$ , which therefore has length $n = m ell $ . We prove that if all stabilizer generators act on qubits whose indices lie within a ball of radius $rho $ , then the minimum distance d of the code satisfies $d leq msqrt {gamma _{D}}(sqrt {D} + 4rho)ell ^{frac {D-1}{D}}$ , where $gamma _{D}$ is the D-dimensional Hermite constant. We then apply this bound to derive an upper bound on the minimum distance of Abelian Two-Block Group Algebra (2BGA) codes whose parity-check matrices have the form $[mathbf {A} {,}vert {,}mathbf {B}]$ with each submatrix representing an element of a group algebra over a finite abelian group.
我们提出了一个改进版本的Bravyi-Terhal界,它适用于由d维格商上的局部奇偶校验约束定义的量子码。具体来说,我们考虑一个基数为$ell $的$mathbb {Z}^{D}$的商$mathbb {Z}^{D}/Lambda $,其中$Lambda $是$mathbb {Z}^{D}$的某个d维子格:我们假设这个商的每个顶点索引稳定器代码$mathcal {C}$的m个量子位,因此长度为$n = m ell $。我们证明了如果所有的稳定器生成器作用于指标位于半径为$rho $的球内的量子位,则编码的最小距离d满足$d leq msqrt {gamma _{D}}(sqrt {D} + 4rho)ell ^{frac {D-1}{D}}$,其中$gamma _{D}$为d维埃尔米常数。然后,我们应用这个界导出了阿贝尔二块群代数(2BGA)码的最小距离的上界,这些码的奇偶校验矩阵的形式为$[mathbf {A} {,}vert {,}mathbf {B}]$,每个子矩阵表示有限阿贝尔群上的群代数的一个元素。
{"title":"A Variant of the Bravyi–Terhal Bound for Arbitrary Boundary Conditions","authors":"François Arnault;Philippe Gaborit;Wouter Rozendaal;Nicolas Saussay;Gilles Zémor","doi":"10.1109/TIT.2025.3629670","DOIUrl":"https://doi.org/10.1109/TIT.2025.3629670","url":null,"abstract":"We present a modified version of the Bravyi-Terhal bound that applies to quantum codes defined by local parity-check constraints on a <italic>D</i>-dimensional lattice quotient. Specifically, we consider a quotient <inline-formula> <tex-math>$mathbb {Z}^{D}/Lambda $ </tex-math></inline-formula> of <inline-formula> <tex-math>$mathbb {Z}^{D}$ </tex-math></inline-formula> of cardinality <inline-formula> <tex-math>$ell $ </tex-math></inline-formula>, where <inline-formula> <tex-math>$Lambda $ </tex-math></inline-formula> is some <italic>D</i>-dimensional sublattice of <inline-formula> <tex-math>$mathbb {Z}^{D}$ </tex-math></inline-formula>: we suppose that every vertex of this quotient indexes <italic>m</i> qubits of a stabilizer code <inline-formula> <tex-math>$mathcal {C}$ </tex-math></inline-formula>, which therefore has length <inline-formula> <tex-math>$n = m ell $ </tex-math></inline-formula>. We prove that if all stabilizer generators act on qubits whose indices lie within a ball of radius <inline-formula> <tex-math>$rho $ </tex-math></inline-formula>, then the minimum distance <italic>d</i> of the code satisfies <inline-formula> <tex-math>$d leq msqrt {gamma _{D}}(sqrt {D} + 4rho)ell ^{frac {D-1}{D}}$ </tex-math></inline-formula>, where <inline-formula> <tex-math>$gamma _{D}$ </tex-math></inline-formula> is the <italic>D</i>-dimensional Hermite constant. We then apply this bound to derive an upper bound on the minimum distance of Abelian Two-Block Group Algebra (2BGA) codes whose parity-check matrices have the form <inline-formula> <tex-math>$[mathbf {A} {,}vert {,}mathbf {B}]$ </tex-math></inline-formula> with each submatrix representing an element of a group algebra over a finite abelian group.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"437-446"},"PeriodicalIF":2.9,"publicationDate":"2025-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisit the Propagation of States: New Construction Theory and Search Method for Impossible Differentials and Impossible Polytopic Transitions 再论状态的传播:不可能微分与不可能多面体转换的新构造理论与搜索方法
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-03 DOI: 10.1109/TIT.2025.3627983
Xichao Hu;Lin Jiao;Yongqiang Li;Shizhu Tian;Zhengbin Liu;Mingsheng Wang;Dengguo Feng
Impossible differential cryptanalysis and impossible polytopic cryptanalysis are among the most effective techniques for evaluating the security of block ciphers. However, previous automatic search methods for their distinguishers—impossible differentials and impossible polytopic transitions—neither account for the influence of the key schedule in single-key settings nor are applicable to block ciphers that feature large S-boxes, variable rotations, or key-dependent permutations. Furthermore, existing approaches fail to search for clusters of impossible differentials when all details of a block cipher are considered. In contrast to previous methods that focus solely on the propagation of differences or <italic>s</i>-difference, we redefine impossible differentials and impossible <inline-formula> <tex-math>$(s+1)$ </tex-math></inline-formula>-polytopic transitions based on state propagation. This redefinition enables us to overcome the limitations inherent in earlier methodologies. Theoretically, we demonstrate that traditional definitions of impossible differentials and impossible <inline-formula> <tex-math>$(s+1)$ </tex-math></inline-formula>-polytopic transitions correspond to subsets of our redefined concepts, which offer broader analytical perspectives. Technically, we reformulate the automatic search model and develop an SAT-based tool to efficiently evaluate our redefined impossible differentials and impossible <inline-formula> <tex-math>$(s+1)$ </tex-math></inline-formula>-polytopic transitions. Building upon this foundational search method, we construct a comprehensive framework for detecting clusters of impossible differentials and impossible <inline-formula> <tex-math>$(s+1)$ </tex-math></inline-formula>-polytopic transitions. This framework not only fully incorporates the details and differential properties of block ciphers but is also applicable to those employing large S-boxes while considering the full linear layer. As a result, we derive new impossible differentials for <monospace>GIFT64</monospace>, <monospace>PRINTcipher</monospace>, <monospace>MISTY1</monospace>, <monospace>RC5-32/64/128</monospace> and <monospace>SPECK</monospace>, as well as new clusters of impossible differentials for <monospace>SPECK</monospace>, <monospace>DES</monospace> and <monospace>ARIA</monospace>. In assessing resistance against impossible differentials, we apply our method to evaluate the security of <monospace>GIFT64</monospace>, <monospace>PRINTcipher</monospace>, <monospace>MISTY1</monospace>, <monospace>SPECK</monospace>, <monospace>SIMON</monospace>, and <monospace>DES</monospace> while accounting for all details of the block ciphers. Moreover, we propose acceleration strategies and apply them to evaluate the security of <monospace>MISTY1</monospace> and <monospace>AES-128</monospace>. Notably, we prove that no 5-round impossible differentials exist for <monospace>AES-128</monospace> when considering one active input byte and one active output
不可能差分密码分析和不可能多址密码分析是评估分组密码安全性的最有效技术。然而,以前的自动搜索它们的区分符的方法——不可能的微分和不可能的多向转换——既不能考虑单键设置中密钥调度的影响,也不适用于具有大s盒、可变旋转或密钥依赖排列的分组密码。此外,当考虑分组密码的所有细节时,现有的方法无法搜索不可能微分的聚类。与以往只关注差分或s-差分传播的方法不同,我们基于状态传播重新定义了不可能微分和不可能$(s+1)$ -多面体转移。这种重新定义使我们能够克服早期方法中固有的局限性。从理论上讲,我们证明了不可能微分和不可能$(s+1)$ -多晶体转换的传统定义对应于我们重新定义的概念的子集,这提供了更广泛的分析视角。从技术上讲,我们重新制定了自动搜索模型,并开发了一个基于sat的工具来有效地评估我们重新定义的不可能微分和不可能$(s+1)$ -多面体转换。在此基础上,我们构建了一个全面的框架来检测不可能微分和不可能$(s+1)$ -多面体转换的聚类。该框架不仅充分融合了分组密码的细节和差分特性,而且在考虑全线性层的情况下,也适用于使用大s盒的分组密码。因此,我们得出了GIFT64、PRINTcipher、MISTY1、RC5-32/64/128和SPECK的新的不可能微分,以及SPECK、DES和ARIA的新的不可能微分簇。在评估对不可能差分的抵抗力时,我们应用我们的方法来评估GIFT64、PRINTcipher、MISTY1、SPECK、SIMON和DES的安全性,同时考虑了分组密码的所有细节。此外,我们提出了加速策略,并将其应用于MISTY1和AES-128的安全性评估。值得注意的是,我们证明了在考虑一个活动输入字节和一个活动输出字节时,AES-128不存在5轮不可能差异,即使考虑到三个连续轮密钥之间的依赖关系。最后,在探索新的不可能$(s+1)$ -多晶体转换时,我们将我们的方法应用于PRINTcipher48, GIFT64, RC5-32/64和SIMON32-64,首次成功地产生了相应的区分符。
{"title":"Revisit the Propagation of States: New Construction Theory and Search Method for Impossible Differentials and Impossible Polytopic Transitions","authors":"Xichao Hu;Lin Jiao;Yongqiang Li;Shizhu Tian;Zhengbin Liu;Mingsheng Wang;Dengguo Feng","doi":"10.1109/TIT.2025.3627983","DOIUrl":"https://doi.org/10.1109/TIT.2025.3627983","url":null,"abstract":"Impossible differential cryptanalysis and impossible polytopic cryptanalysis are among the most effective techniques for evaluating the security of block ciphers. However, previous automatic search methods for their distinguishers—impossible differentials and impossible polytopic transitions—neither account for the influence of the key schedule in single-key settings nor are applicable to block ciphers that feature large S-boxes, variable rotations, or key-dependent permutations. Furthermore, existing approaches fail to search for clusters of impossible differentials when all details of a block cipher are considered. In contrast to previous methods that focus solely on the propagation of differences or &lt;italic&gt;s&lt;/i&gt;-difference, we redefine impossible differentials and impossible &lt;inline-formula&gt; &lt;tex-math&gt;$(s+1)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;-polytopic transitions based on state propagation. This redefinition enables us to overcome the limitations inherent in earlier methodologies. Theoretically, we demonstrate that traditional definitions of impossible differentials and impossible &lt;inline-formula&gt; &lt;tex-math&gt;$(s+1)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;-polytopic transitions correspond to subsets of our redefined concepts, which offer broader analytical perspectives. Technically, we reformulate the automatic search model and develop an SAT-based tool to efficiently evaluate our redefined impossible differentials and impossible &lt;inline-formula&gt; &lt;tex-math&gt;$(s+1)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;-polytopic transitions. Building upon this foundational search method, we construct a comprehensive framework for detecting clusters of impossible differentials and impossible &lt;inline-formula&gt; &lt;tex-math&gt;$(s+1)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;-polytopic transitions. This framework not only fully incorporates the details and differential properties of block ciphers but is also applicable to those employing large S-boxes while considering the full linear layer. As a result, we derive new impossible differentials for &lt;monospace&gt;GIFT64&lt;/monospace&gt;, &lt;monospace&gt;PRINTcipher&lt;/monospace&gt;, &lt;monospace&gt;MISTY1&lt;/monospace&gt;, &lt;monospace&gt;RC5-32/64/128&lt;/monospace&gt; and &lt;monospace&gt;SPECK&lt;/monospace&gt;, as well as new clusters of impossible differentials for &lt;monospace&gt;SPECK&lt;/monospace&gt;, &lt;monospace&gt;DES&lt;/monospace&gt; and &lt;monospace&gt;ARIA&lt;/monospace&gt;. In assessing resistance against impossible differentials, we apply our method to evaluate the security of &lt;monospace&gt;GIFT64&lt;/monospace&gt;, &lt;monospace&gt;PRINTcipher&lt;/monospace&gt;, &lt;monospace&gt;MISTY1&lt;/monospace&gt;, &lt;monospace&gt;SPECK&lt;/monospace&gt;, &lt;monospace&gt;SIMON&lt;/monospace&gt;, and &lt;monospace&gt;DES&lt;/monospace&gt; while accounting for all details of the block ciphers. Moreover, we propose acceleration strategies and apply them to evaluate the security of &lt;monospace&gt;MISTY1&lt;/monospace&gt; and &lt;monospace&gt;AES-128&lt;/monospace&gt;. Notably, we prove that no 5-round impossible differentials exist for &lt;monospace&gt;AES-128&lt;/monospace&gt; when considering one active input byte and one active output ","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"742-764"},"PeriodicalIF":2.9,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarially Robust Clustering With Optimality Guarantees 具有最优性保证的对抗鲁棒聚类
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-03 DOI: 10.1109/TIT.2025.3628160
Soham Jana;Kun Yang;Sanjeev Kulkarni
We consider the problem of clustering data points coming from sub-Gaussian mixtures. Existing methods that provably achieve the optimal mislabeling error, such as the Lloyd algorithm, are usually vulnerable to outliers. In contrast, clustering methods seemingly robust to adversarial perturbations are not known to satisfy the optimal statistical guarantees. We propose a simple robust algorithm based on the coordinatewise median that obtains the optimal mislabeling rate even when we allow adversarial outliers to be present. Our algorithm achieves the optimal error rate in constant iterations when a weak initialization condition is satisfied. In the absence of outliers, in fixed dimensions, our theoretical guarantees are similar to that of the Lloyd algorithm. Extensive experiments on various simulated and public datasets are conducted to support the theoretical guarantees of our method.
我们考虑了来自亚高斯混合数据点的聚类问题。现有的可证明实现最优误标注误差的方法,如Lloyd算法,通常容易受到异常值的影响。相比之下,聚类方法似乎对对抗性扰动具有鲁棒性,但却无法满足最优的统计保证。我们提出了一种基于坐标中位数的简单鲁棒算法,即使我们允许存在对抗性异常值,该算法也能获得最佳错误标记率。该算法在满足弱初始化条件的情况下,实现了恒迭代的最优错误率。在没有异常值的情况下,在固定维度下,我们的理论保证与Lloyd算法相似。在各种模拟和公共数据集上进行了大量实验,以支持我们方法的理论保证。
{"title":"Adversarially Robust Clustering With Optimality Guarantees","authors":"Soham Jana;Kun Yang;Sanjeev Kulkarni","doi":"10.1109/TIT.2025.3628160","DOIUrl":"https://doi.org/10.1109/TIT.2025.3628160","url":null,"abstract":"We consider the problem of clustering data points coming from sub-Gaussian mixtures. Existing methods that provably achieve the optimal mislabeling error, such as the Lloyd algorithm, are usually vulnerable to outliers. In contrast, clustering methods seemingly robust to adversarial perturbations are not known to satisfy the optimal statistical guarantees. We propose a simple robust algorithm based on the coordinatewise median that obtains the optimal mislabeling rate even when we allow adversarial outliers to be present. Our algorithm achieves the optimal error rate in constant iterations when a weak initialization condition is satisfied. In the absence of outliers, in fixed dimensions, our theoretical guarantees are similar to that of the Lloyd algorithm. Extensive experiments on various simulated and public datasets are conducted to support the theoretical guarantees of our method.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"478-500"},"PeriodicalIF":2.9,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TechRxiv: Share Your Preprint Research with the World! techxiv:与世界分享你的预印本研究!
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-28 DOI: 10.1109/TIT.2025.3618164
{"title":"TechRxiv: Share Your Preprint Research with the World!","authors":"","doi":"10.1109/TIT.2025.3618164","DOIUrl":"https://doi.org/10.1109/TIT.2025.3618164","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 11","pages":"9134-9134"},"PeriodicalIF":2.9,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11220201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145374728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-28 DOI: 10.1109/TIT.2025.3618138
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2025.3618138","DOIUrl":"https://doi.org/10.1109/TIT.2025.3618138","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 11","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11220202","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145374727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
List-Recovery of Random Linear Codes Over Small Fields 小域上随机线性码的列表恢复
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-27 DOI: 10.1109/TIT.2025.3625861
Dean Doron;Jonathan Mosheiff;Nicolas Resch;João Ribeiro
We study list-recoverability of random linear codes over small fields, both from errors and from erasures. We consider codes of rate $varepsilon $ -close to capacity, and aim to bound the dependence of the output list size $L$ on $varepsilon $ , the input list size $ell $ , and the alphabet size $q$ . Prior to our work, the best upper bound was $L = q^{O(ell /varepsilon)}$ (Zyablov and Pinsker, Prob. Per. Inf. 1981). Previous work has identified cases in which linear codes provably perform worse than non-linear codes with respect to list-recovery. While there exist non-linear codes that achieve $L=O(ell /varepsilon)$ , we know that $L ge ell ^{Omega (1/varepsilon)}$ is necessary for list recovery from erasures over fields of small characteristic, and for list recovery from errors over large alphabets. We show that in other relevant regimes there is no significant price to pay for linearity, in the sense that we get the correct dependence on the gap-to-capacity $varepsilon $ and go beyond the Zyablov–Pinsker bound for the first time. Specifically, when $q$ is constant and $varepsilon $ approaches zero: 1) for list-recovery from erasures over prime fields, we show that $L leq C_{1}/varepsilon $ . By prior work, such a result cannot be obtained for low-characteristic fields and 2) for list-recovery from errors over arbitrary fields, we prove that $L leq C_{2}/varepsilon $ . Above, $C_{1}$ and $C_{2}$ depend on the decoding radius, input list size, and field size. We provide concrete bounds on the constants above, and the upper bounds on $L$ improve upon the Zyablov–Pinsker bound whenever $qleq 2^{(1/varepsilon)^{c}}$ for some small universal constant $cgt 0$ .
研究了小域上随机线性码的列表可恢复性,包括错误和擦除。我们考虑比率$varepsilon $ -接近容量的代码,并旨在约束输出列表大小$L$对$varepsilon $、输入列表大小$ell $和字母大小$q$的依赖关系。在我们的工作之前,最好的上界是$L = q^{O(ell /varepsilon)}$ (Zyablov和Pinsker, Prob。Per。(1981)。以前的工作已经确定了线性代码在列表恢复方面可以证明比非线性代码表现更差的情况。虽然存在实现$L=O(ell /varepsilon)$的非线性代码,但我们知道$L ge ell ^{Omega (1/varepsilon)}$对于从小特征字段的擦除中恢复列表以及从大字母的错误中恢复列表是必要的。我们表明,在其他相关的情况下,线性没有显著的代价,从某种意义上说,我们得到了对间隙-容量$varepsilon $的正确依赖,并首次超越了Zyablov-Pinsker界。具体地说,当$q$是常数并且$varepsilon $趋近于0:1)时,对于从素数域上擦除的列表恢复,我们表明$L leq C_{1}/varepsilon $。通过之前的工作,对于低特征字段和2)对于任意字段上的错误列表恢复,我们证明了$L leq C_{2}/varepsilon $。上面,$C_{1}$和$C_{2}$取决于解码半径、输入列表大小和字段大小。我们给出了上述常数的具体界,并且$L$上的上界改进了Zyablov-Pinsker界每当$qleq 2^{(1/varepsilon)^{c}}$时对于某些小的通用常数$cgt 0$的上界。
{"title":"List-Recovery of Random Linear Codes Over Small Fields","authors":"Dean Doron;Jonathan Mosheiff;Nicolas Resch;João Ribeiro","doi":"10.1109/TIT.2025.3625861","DOIUrl":"https://doi.org/10.1109/TIT.2025.3625861","url":null,"abstract":"We study list-recoverability of random linear codes over small fields, both from errors and from erasures. We consider codes of rate <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>-close to capacity, and aim to bound the dependence of the output list size <inline-formula> <tex-math>$L$ </tex-math></inline-formula> on <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula>, the input list size <inline-formula> <tex-math>$ell $ </tex-math></inline-formula>, and the alphabet size <inline-formula> <tex-math>$q$ </tex-math></inline-formula>. Prior to our work, the best upper bound was <inline-formula> <tex-math>$L = q^{O(ell /varepsilon)}$ </tex-math></inline-formula> (Zyablov and Pinsker, Prob. Per. Inf. 1981). Previous work has identified cases in which <italic>linear</i> codes provably perform worse than non-linear codes with respect to list-recovery. While there exist non-linear codes that achieve <inline-formula> <tex-math>$L=O(ell /varepsilon)$ </tex-math></inline-formula>, we know that <inline-formula> <tex-math>$L ge ell ^{Omega (1/varepsilon)}$ </tex-math></inline-formula> is necessary for list recovery from erasures over fields of small characteristic, and for list recovery from errors over large alphabets. We show that in other relevant regimes there is no significant price to pay for linearity, in the sense that we get the correct dependence on the gap-to-capacity <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula> and go beyond the Zyablov–Pinsker bound for the first time. Specifically, when <inline-formula> <tex-math>$q$ </tex-math></inline-formula> is constant and <inline-formula> <tex-math>$varepsilon $ </tex-math></inline-formula> approaches zero: 1) for list-recovery from erasures over <italic>prime fields</i>, we show that <inline-formula> <tex-math>$L leq C_{1}/varepsilon $ </tex-math></inline-formula>. By prior work, such a result cannot be obtained for low-characteristic fields and 2) for list-recovery from errors over <italic>arbitrary fields</i>, we prove that <inline-formula> <tex-math>$L leq C_{2}/varepsilon $ </tex-math></inline-formula>. Above, <inline-formula> <tex-math>$C_{1}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$C_{2}$ </tex-math></inline-formula> depend on the decoding radius, input list size, and field size. We provide concrete bounds on the constants above, and the upper bounds on <inline-formula> <tex-math>$L$ </tex-math></inline-formula> improve upon the Zyablov–Pinsker bound whenever <inline-formula> <tex-math>$qleq 2^{(1/varepsilon)^{c}}$ </tex-math></inline-formula> for some small universal constant <inline-formula> <tex-math>$cgt 0$ </tex-math></inline-formula>.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 12","pages":"9548-9562"},"PeriodicalIF":2.9,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental Tradeoff of Bistatic ISAC Under Gaussian Fading Channels at Finite Blocklength 有限块长高斯衰落信道下双基地ISAC的基本权衡
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-20 DOI: 10.1109/TIT.2025.3623189
Xiao Shen;Ziping Lu;Na Zhao;Hanying Zhao;Yuan Shen
The paradigm of integrated sensing and communication (ISAC) is envisioned as a key enabler for the evolution of 6G, leveraging inherent similarities of dual functions in hardware architectures and signal processing to sense the environment and send messages via a shared waveform. In this paper, we establish a theoretical framework to evaluate the sensing and communication (S&C) performance of bistatic ISAC systems under Gaussian fading channels at finite blocklength, where a primary focus lies in uncovering the fundamental tradeoff between dual functions due to limited resources. In particular, we first formulate the joint S&C problem in bistatic single-input and single-output (SISO) ISAC systems, and define the rate-error tradeoff to quantify the performance balance between S&C. Then we derive the achievability and converse bounds for the rate-error tradeoff, providing a deep comprehension of the interplay between S&C functions. Finally, we discuss the extensions of our framework involving infinite blocklength regime, general parameter estimation and multiple-input and multiple-output (MIMO) channel.
集成传感和通信(ISAC)范式被设想为6G发展的关键推动因素,利用硬件架构和信号处理中双重功能的固有相似性来感知环境并通过共享波形发送消息。在本文中,我们建立了一个理论框架来评估有限块长高斯衰落信道下双基地ISAC系统的感知和通信(S&C)性能,其中的主要重点在于揭示由于资源有限而导致的双重功能之间的基本权衡。特别是,我们首先提出了双稳态单输入单输出(SISO) ISAC系统中的联合S&C问题,并定义了误差率权衡来量化S&C之间的性能平衡。然后,我们推导了错误率权衡的可实现性和逆界,提供了S&C函数之间相互作用的深刻理解。最后,我们讨论了我们的框架的扩展,包括无限块长度制度,一般参数估计和多输入多输出(MIMO)信道。
{"title":"Fundamental Tradeoff of Bistatic ISAC Under Gaussian Fading Channels at Finite Blocklength","authors":"Xiao Shen;Ziping Lu;Na Zhao;Hanying Zhao;Yuan Shen","doi":"10.1109/TIT.2025.3623189","DOIUrl":"https://doi.org/10.1109/TIT.2025.3623189","url":null,"abstract":"The paradigm of integrated sensing and communication (ISAC) is envisioned as a key enabler for the evolution of 6G, leveraging inherent similarities of dual functions in hardware architectures and signal processing to sense the environment and send messages via a shared waveform. In this paper, we establish a theoretical framework to evaluate the sensing and communication (S&C) performance of bistatic ISAC systems under Gaussian fading channels at finite blocklength, where a primary focus lies in uncovering the fundamental tradeoff between dual functions due to limited resources. In particular, we first formulate the joint S&C problem in bistatic single-input and single-output (SISO) ISAC systems, and define the rate-error tradeoff to quantify the performance balance between S&C. Then we derive the achievability and converse bounds for the rate-error tradeoff, providing a deep comprehension of the interplay between S&C functions. Finally, we discuss the extensions of our framework involving infinite blocklength regime, general parameter estimation and multiple-input and multiple-output (MIMO) channel.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1176-1200"},"PeriodicalIF":2.9,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Key Collision on AES and Kiasu-BC AES和Kiasu-BC的实际密钥碰撞
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-20 DOI: 10.1109/TIT.2025.3623726
Jianqiang Ni;Yingxin Li;Fukang Liu;Gaoli Wang
The key collision attack was proposed as an open problem in key-committing security in Authenticated Encryption (AE) schemes like AES-GCM and ChaCha20Poly1305. In ASIACRYPT 2024, Taiyama et al. introduce a novel type of key collision—target-plaintext key collision (TPKC) for AES. Depending on whether the plaintext is fixed, TPKC can be divided into fixed-TPKC and free-TPKC, which can be directly converted into collision attacks and semi-free-start collision attacks on the Davies-Meyer (DM) hashing mode. In this paper, we propose a new rebound attack framework leveraging a time-memory tradeoff strategy, enabling practical key collision attacks with optimized complexity. We also present an improved automatic method for finding rebound-friendly differential characteristics by controlling the probabilities in the inbound and outbound phases, allowing the identified characteristics to be directly used in rebound-based key collision attacks. Our analysis reveals that the 2-round AES-128 fixed-TPKC attack proposed by Taiyama et al. is, in fact, a free-TPKC attack. This distinction is significant, as fixed-TPKC attacks are substantially more difficult than their free-TPKC counterparts. By integrating our improved automatic method with a new rebound attack framework, we successfully identify a new differential characteristic for the 2-round AES-128 fixed-TPKC attack and develope the first practical fixed-TPKC attack against 2-round AES-128. Additionally, we present practical fixed-TPKC attacks against 5-round AES-192 and 3-round Kiasu-BC, along with a practical free-TPKC attack against 6-round Kiasu-BC. Furthermore, we reduce time complexities for free-TPKC and fixed-TPKC attacks on other AES variants.
密钥冲突攻击是AES-GCM和ChaCha20Poly1305等认证加密(AE)方案中密钥提交安全中的一个开放性问题。在ASIACRYPT 2024中,Taiyama等人为AES引入了一种新型的密钥碰撞-目标明文密钥碰撞(TPKC)。根据明文是否固定,TPKC可以分为固定TPKC和自由TPKC,后者可以直接转换为DM (Davies-Meyer)哈希模式下的冲突攻击和半自由启动的冲突攻击。在本文中,我们提出了一种新的利用时间-内存权衡策略的反弹攻击框架,使实际的密钥冲突攻击具有优化的复杂性。我们还提出了一种改进的自动方法,通过控制入站和出站阶段的概率来寻找对反弹友好的差分特征,允许识别的特征直接用于基于反弹的密钥碰撞攻击。我们的分析表明,Taiyama等人提出的2轮AES-128固定tpkc攻击实际上是一种自由tpkc攻击。这种区别很重要,因为固定tpkc攻击比自由tpkc攻击要困难得多。通过将改进的自动攻击方法与新的反弹攻击框架相结合,我们成功地识别了2轮AES-128固定tpkc攻击的新差分特征,并开发了第一个针对2轮AES-128的实际固定tpkc攻击。此外,我们提出了针对5轮AES-192和3轮Kiasu-BC的实际固定tpkc攻击,以及针对6轮Kiasu-BC的实际自由tpkc攻击。此外,我们减少了对其他AES变体的自由tpkc和固定tpkc攻击的时间复杂性。
{"title":"Practical Key Collision on AES and Kiasu-BC","authors":"Jianqiang Ni;Yingxin Li;Fukang Liu;Gaoli Wang","doi":"10.1109/TIT.2025.3623726","DOIUrl":"https://doi.org/10.1109/TIT.2025.3623726","url":null,"abstract":"The key collision attack was proposed as an open problem in key-committing security in Authenticated Encryption (AE) schemes like <monospace>AES-GCM</monospace> and <monospace>ChaCha20Poly1305</monospace>. In ASIACRYPT 2024, Taiyama et al. introduce a novel type of key collision—target-plaintext key collision (<monospace>TPKC</monospace>) for <monospace>AES</monospace>. Depending on whether the plaintext is fixed, <monospace>TPKC</monospace> can be divided into <monospace>fixed-TPKC</monospace> and <monospace>free-TPKC</monospace>, which can be directly converted into collision attacks and semi-free-start collision attacks on the Davies-Meyer (<monospace>DM</monospace>) hashing mode. In this paper, we propose a new rebound attack framework leveraging a time-memory tradeoff strategy, enabling practical key collision attacks with optimized complexity. We also present an improved automatic method for finding <italic>rebound-friendly</i> differential characteristics by controlling the probabilities in the inbound and outbound phases, allowing the identified characteristics to be directly used in <italic>rebound-based</i> key collision attacks. Our analysis reveals that the 2-round <monospace>AES-128 fixed-TPKC</monospace> attack proposed by Taiyama et al. is, in fact, a <monospace>free-TPKC</monospace> attack. This distinction is significant, as <monospace>fixed-TPKC</monospace> attacks are substantially more difficult than their <monospace>free-TPKC</monospace> counterparts. By integrating our improved automatic method with a new rebound attack framework, we successfully identify a new differential characteristic for the 2-round <monospace>AES-128 fixed-TPKC</monospace> attack and develope the first practical <monospace>fixed-TPKC</monospace> attack against 2-round <monospace>AES-128</monospace>. Additionally, we present practical <monospace>fixed-TPKC</monospace> attacks against 5-round <monospace>AES-192</monospace> and 3-round <monospace>Kiasu-BC</monospace>, along with a practical <monospace>free-TPKC</monospace> attack against 6-round <monospace>Kiasu-BC</monospace>. Furthermore, we reduce time complexities for <monospace>free-TPKC</monospace> and <monospace>fixed-TPKC</monospace> attacks on other <monospace>AES</monospace> variants.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 12","pages":"9732-9752"},"PeriodicalIF":2.9,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145595136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Many-User Multiple Access With Random User Activity: Achievability Bounds and Efficient Schemes 随机用户活动的多用户多访问:可达性界限和有效方案
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-17 DOI: 10.1109/TIT.2025.3622969
Xiaoqi Liu;Pablo Pascual Cobo;Ramji Venkataramanan
We study the Gaussian multiple access channel with random user activity, in the regime where the number of users is proportional to the code length. The receiver may know some statistics about the number of active users, but does not know the exact number nor the identities of the active users. We derive two achievability bounds on the probabilities of missed detection, false alarm, and active user error, and propose an efficient CDMA-type scheme whose performance can be compared against these bounds. The first bound is a finite-length result based on Gaussian random codebooks and maximum-likelihood decoding. The second is an asymptotic bound, established using spatially coupled Gaussian codebooks and approximate message passing (AMP) decoding. These bounds can be used to compute an achievable tradeoff between the active user density and energy-per-bit, for a fixed user payload and target error rate. The efficient CDMA scheme uses a spatially coupled signature matrix and AMP decoding, and we give rigorous asymptotic guarantees on its error performance. Our analysis provides the first state evolution result for spatially coupled AMP with matrix-valued iterates, which may be of independent interest. Numerical experiments demonstrate the promising error performance of the CDMA scheme for both small and large user payloads, when compared with the two achievability bounds.
我们研究了随机用户活动的高斯多址信道,其中用户数量与码长成正比。接收方可能知道一些关于活动用户数量的统计信息,但不知道活动用户的确切数量和身份。我们推导了漏检概率、虚警概率和活跃用户错误概率的两个可实现性界限,并提出了一种高效的cdma类型方案,其性能可以与这些界限进行比较。第一个边界是基于高斯随机码本和最大似然解码的有限长度结果。第二个是渐近界,使用空间耦合高斯码本和近似消息传递(AMP)解码建立。对于固定的用户负载和目标错误率,这些边界可用于计算活跃用户密度和每比特能量之间可实现的权衡。高效的CDMA方案采用空间耦合签名矩阵和AMP解码,并对其误差性能给出了严格的渐近保证。我们的分析提供了具有矩阵值迭代的空间耦合AMP的第一个状态演化结果,这可能是独立的兴趣。数值实验表明,该方案在小用户和大用户载荷情况下都具有良好的误差性能。
{"title":"Many-User Multiple Access With Random User Activity: Achievability Bounds and Efficient Schemes","authors":"Xiaoqi Liu;Pablo Pascual Cobo;Ramji Venkataramanan","doi":"10.1109/TIT.2025.3622969","DOIUrl":"https://doi.org/10.1109/TIT.2025.3622969","url":null,"abstract":"We study the Gaussian multiple access channel with random user activity, in the regime where the number of users is proportional to the code length. The receiver may know some statistics about the number of active users, but does not know the exact number nor the identities of the active users. We derive two achievability bounds on the probabilities of missed detection, false alarm, and active user error, and propose an efficient CDMA-type scheme whose performance can be compared against these bounds. The first bound is a finite-length result based on Gaussian random codebooks and maximum-likelihood decoding. The second is an asymptotic bound, established using spatially coupled Gaussian codebooks and approximate message passing (AMP) decoding. These bounds can be used to compute an achievable tradeoff between the active user density and energy-per-bit, for a fixed user payload and target error rate. The efficient CDMA scheme uses a spatially coupled signature matrix and AMP decoding, and we give rigorous asymptotic guarantees on its error performance. Our analysis provides the first state evolution result for spatially coupled AMP with matrix-valued iterates, which may be of independent interest. Numerical experiments demonstrate the promising error performance of the CDMA scheme for both small and large user payloads, when compared with the two achievability bounds.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"383-414"},"PeriodicalIF":2.9,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1