首页 > 最新文献

Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences最新文献

英文 中文
Automated polynomial formal verification using generalized binary decision diagram patterns. 使用广义二元决策图模式的自动多项式形式验证。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0390
Martha Schnieber, Rolf Drechsler

With the ongoing digitization, digital circuits have become increasingly present in everyday life. However, as circuits can be faulty, their verification poses a challenging but essential challenge. In contrast to formal verification techniques, simulation techniques fail to fully guarantee the correctness of a circuit. However, due to the exponential complexity of the verification problem, formal verification can fail due to time or space constraints. To overcome this challenge, recently Polynomial Formal Verification (PFV) has been introduced. Here, it has been shown that several circuits and circuit classes can be formally verified in polynomial time and space. In general, these proofs have to be conducted manually, requiring a lot of time. However, in recent research, a method for automated PFV has been proposed, where a proof engine automatically generates human-readable proofs that show the polynomial size of a Binary Decision Diagram (BDD) for a given function. The engine analyses the BDD and finds a pattern, which is then proven by induction. In this article, we formalize the previously presented BDD patterns and propose algorithms for the pattern detection, establishing new possibilities for the automated proof generation for more complex functions. Furthermore, we show an exemplary proof that can be generated using the presented methods.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

随着数字化的不断发展,数字电路越来越多地出现在人们的日常生活中。然而,由于电路可能存在故障,它们的验证提出了一个具有挑战性但又必不可少的挑战。与形式验证技术相比,仿真技术不能完全保证电路的正确性。然而,由于验证问题的指数复杂度,形式验证可能会由于时间或空间的限制而失败。为了克服这一挑战,最近引入了多项式形式验证(PFV)。在这里,已经证明了几种电路和电路类可以在多项式时间和空间上进行形式化验证。一般来说,这些证明必须手工进行,需要大量的时间。然而,在最近的研究中,已经提出了一种自动化PFV的方法,其中证明引擎自动生成人类可读的证明,显示给定函数的二进制决策图(BDD)的多项式大小。引擎分析BDD并找到一个模式,然后通过归纳证明。在本文中,我们形式化了先前提出的BDD模式,并提出了用于模式检测的算法,为更复杂的函数的自动证明生成建立了新的可能性。此外,我们展示了一个示例性证明,可以使用所提出的方法生成。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Automated polynomial formal verification using generalized binary decision diagram patterns.","authors":"Martha Schnieber, Rolf Drechsler","doi":"10.1098/rsta.2023.0390","DOIUrl":"https://doi.org/10.1098/rsta.2023.0390","url":null,"abstract":"<p><p>With the ongoing digitization, digital circuits have become increasingly present in everyday life. However, as circuits can be faulty, their verification poses a challenging but essential challenge. In contrast to formal verification techniques, simulation techniques fail to fully guarantee the correctness of a circuit. However, due to the exponential complexity of the verification problem, formal verification can fail due to time or space constraints. To overcome this challenge, recently <i>Polynomial Formal Verification</i> (PFV) has been introduced. Here, it has been shown that several circuits and circuit classes can be formally verified in polynomial time and space. In general, these proofs have to be conducted manually, requiring a lot of time. However, in recent research, a method for automated PFV has been proposed, where a proof engine automatically generates human-readable proofs that show the polynomial size of a <i>Binary Decision Diagram</i> (BDD) for a given function. The engine analyses the BDD and finds a pattern, which is then proven by induction. In this article, we formalize the previously presented BDD patterns and propose algorithms for the pattern detection, establishing new possibilities for the automated proof generation for more complex functions. Furthermore, we show an exemplary proof that can be generated using the presented methods.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230390"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memristive ternary Łukasiewicz logic based on reading-based ratioed resistive states (3R). 忆阻三元Łukasiewicz逻辑基于基于读取的比例电阻状态(3R)。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0397
Feng Liu, Leon Brackmann, Xianyue Zhao, Nan Du, Rainer Waser, Stephan Menzel

The thirst for more efficient computational paradigms has reignited interest in computation in memory (CIM), a burgeoning topic that pivots on the strengths of more versatile logic systems. Surging ahead in this innovative milieu, multi-valued logic systems have been identified as possessing the potential to amplify storage density and computation efficacy. Notably, ternary logic has attracted widespread research owing to its relatively lower computational and storage complexity, offering a promising alternative to the traditional binary logic computation. This study provides insight into the feasibility of ternary logic in the CIM domain using resistive random-access memory (ReRAM) devices. Its multi-level programming capability making it an ideal conduit for the integration of ternary logic. We focus on ternary Łukasiewicz logic because its computational characteristics are highly suitable for mapping logic values with input and output signals. This approach is characterized by voltage-reading-based output for ease of subsequent utilization and computation and validated in 1T1R crossbar arrays in an integrated ReRAM chip (Memory Advanced Demonstrator 200 mm). In addition, the effect of variability of memristive devices on logical computation and the potential for parallel operation are also investigated.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

对更高效的计算范式的渴求重新点燃了人们对内存计算(CIM)的兴趣,这是一个新兴的主题,它以更通用的逻辑系统的优势为中心。在这个创新的环境中,多值逻辑系统已经被确定为具有扩大存储密度和计算效率的潜力。值得注意的是,三元逻辑由于其相对较低的计算和存储复杂度而引起了广泛的研究,为传统的二进制逻辑计算提供了一个有希望的替代方案。本研究提供了在CIM领域中使用电阻随机存取存储器(ReRAM)器件的三元逻辑的可行性。它的多级编程能力使它成为三元逻辑集成的理想渠道。我们专注于三元Łukasiewicz逻辑,因为它的计算特性非常适合将逻辑值与输入和输出信号进行映射。该方法的特点是基于电压读取的输出,便于后续使用和计算,并在集成ReRAM芯片(Memory Advanced Demonstrator 200mm)中的1T1R横条阵列中得到验证。此外,还研究了忆阻器件的可变性对逻辑计算和并行运算的影响。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Memristive ternary Łukasiewicz logic based on reading-based ratioed resistive states (3R).","authors":"Feng Liu, Leon Brackmann, Xianyue Zhao, Nan Du, Rainer Waser, Stephan Menzel","doi":"10.1098/rsta.2023.0397","DOIUrl":"https://doi.org/10.1098/rsta.2023.0397","url":null,"abstract":"<p><p>The thirst for more efficient computational paradigms has reignited interest in computation in memory (CIM), a burgeoning topic that pivots on the strengths of more versatile logic systems. Surging ahead in this innovative milieu, multi-valued logic systems have been identified as possessing the potential to amplify storage density and computation efficacy. Notably, ternary logic has attracted widespread research owing to its relatively lower computational and storage complexity, offering a promising alternative to the traditional binary logic computation. This study provides insight into the feasibility of ternary logic in the CIM domain using resistive random-access memory (ReRAM) devices. Its multi-level programming capability making it an ideal conduit for the integration of ternary logic. We focus on ternary Łukasiewicz logic because its computational characteristics are highly suitable for mapping logic values with input and output signals. This approach is characterized by voltage-reading-based output for ease of subsequent utilization and computation and validated in 1T1R crossbar arrays in an integrated ReRAM chip (Memory Advanced Demonstrator 200 mm). In addition, the effect of variability of memristive devices on logical computation and the potential for parallel operation are also investigated.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230397"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11736464/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure artificial intelligence at the edge. 确保边缘的人工智能安全。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0398
Nader Sehatbakhsh, Sudhakar Pamarti, Vwani Roychowdhary, Subramanian Iyer

Sensors for the perception of multimodal stimuli-ranging from the five senses humans possess and beyond-have reached an unprecedented level of sophistication and miniaturization, raising the prospect of making man-made large-scale complex systems that can rival nature a reality. Artificial intelligence (AI) at the edge aims to integrate such sensors with real-time cognitive abilities enabled by recent advances in AI. Such AI progress has only been achieved by using massive computing power which, however, would not be available in most distributed systems of interest. Nature has solved this problem by integrating computing, memory and sensing functionalities in the same hardware so that each part can learn its environment in real time and take local actions that lead to stable global functionalities. While this is a challenging task by itself, it would raise a new set of security challenges when implemented. As in nature, malicious agents can attack and commandeer the system to perform their own tasks. This article aims to define the types of systemic attacks that would emerge, and introduces a multiscale framework for combatting them. A primary thesis is that edge AI systems have to deal with unknown attack strategies that can only be countered in real time using low-touch adaptive learning systems.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

用于感知多模态刺激的传感器——从人类拥有的五种感官到其他感官——已经达到了前所未有的精密程度和小型化程度,这提高了制造可与自然相媲美的人造大规模复杂系统的前景。边缘人工智能(AI)的目标是将这些传感器与人工智能最新进展带来的实时认知能力相结合。这样的人工智能进步只能通过使用大量的计算能力来实现,然而,在大多数感兴趣的分布式系统中,这是不可用的。Nature通过在同一硬件中集成计算、记忆和传感功能解决了这个问题,这样每个部分都可以实时了解其环境,并采取局部行动,从而实现稳定的全局功能。虽然这本身就是一项具有挑战性的任务,但它在实施时将引发一系列新的安全挑战。从本质上讲,恶意代理可以攻击并命令系统执行它们自己的任务。本文旨在定义可能出现的系统攻击的类型,并介绍用于对抗它们的多尺度框架。一个主要论点是,边缘人工智能系统必须处理未知的攻击策略,这些攻击策略只能通过低接触自适应学习系统实时应对。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Secure artificial intelligence at the edge.","authors":"Nader Sehatbakhsh, Sudhakar Pamarti, Vwani Roychowdhary, Subramanian Iyer","doi":"10.1098/rsta.2023.0398","DOIUrl":"https://doi.org/10.1098/rsta.2023.0398","url":null,"abstract":"<p><p>Sensors for the perception of multimodal stimuli-ranging from the five senses humans possess and beyond-have reached an unprecedented level of sophistication and miniaturization, raising the prospect of making man-made large-scale complex systems that can rival nature a reality. Artificial intelligence (AI) at the edge aims to integrate such sensors with real-time cognitive abilities enabled by recent advances in AI. Such AI progress has only been achieved by using massive computing power which, however, would not be available in most distributed systems of interest. Nature has solved this problem by integrating computing, memory and sensing functionalities in the same hardware so that each part can learn its environment in real time and take local actions that lead to stable global functionalities. While this is a challenging task by itself, it would raise a new set of security challenges when implemented. As in nature, malicious agents can attack and commandeer the system to perform their own tasks. This article aims to define the types of systemic attacks that would emerge, and introduces a multiscale framework for combatting them. A primary thesis is that edge AI systems have to deal with unknown attack strategies that can only be countered in real time using low-touch adaptive learning systems.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230398"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction. 利用锁:利用MiG-V的逻辑锁来提取秘密数据。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0388
Lennart M Reimann, Yadu Madhukumar Variyar, Lennet Huelser, Chiara Ghinami, Dominik Germek, Rainer Leupers

The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context, logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic-locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic-locking key-recovery attacks.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

MiG-V专为高安全性应用而设计,是市场上第一款商用逻辑锁定RISC-V处理器。在这种情况下,逻辑锁定被用于在不可信的制造过程中保护RISC-V处理器设计,通过使用键驱动的逻辑门来混淆原始设计。尽管这种方法可以防止恶意修改,例如硬件木马,但逻辑锁定对运行时期间RISC-V处理器数据机密性的影响还没有得到彻底的研究。在本研究中,我们评估了逻辑锁定对数据机密性的影响。通过在运行SSL加密算法时更改MiG-V的逻辑锁定密钥,我们可以识别由于利用逻辑锁定硬件而导致的数据泄漏。我们证明,更改逻辑锁定密钥的单个比特可以暴露100%的加密加密密钥。这项研究揭示了逻辑锁定中的一个关键安全缺陷,强调了在逻辑锁定密钥恢复攻击之外进行全面安全评估的必要性。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.","authors":"Lennart M Reimann, Yadu Madhukumar Variyar, Lennet Huelser, Chiara Ghinami, Dominik Germek, Rainer Leupers","doi":"10.1098/rsta.2023.0388","DOIUrl":"https://doi.org/10.1098/rsta.2023.0388","url":null,"abstract":"<p><p>The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context, logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic-locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic-locking key-recovery attacks.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230388"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: new Editor-in-Chief and the 360th anniversary of Philosophical Transactions. 社论:新主编与《哲学学报》360周年纪念。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2024.0557
C Richard A Catlow
{"title":"Editorial: new Editor-in-Chief and the 360th anniversary of <i>Philosophical Transactions</i>.","authors":"C Richard A Catlow","doi":"10.1098/rsta.2024.0557","DOIUrl":"https://doi.org/10.1098/rsta.2024.0557","url":null,"abstract":"","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20240557"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11736463/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural in-memory checksums: an error detection and correction technique for safe in-memory inference. 神经内存校验和:一种用于安全内存推理的错误检测和纠正技术。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0399
Luca Parrini, Taha Soliman, Benjamin Hettwer, Cecilia De La Parra, Jan Micha Borrmann, Simranjeet Singh, Ankit Bende, Vikas Rana, Farhad Merchant, Norbert Wehn

The advent of in-memory computing has introduced a new paradigm of computation, which offers significant improvements in terms of latency and power consumption for emerging embedded AI accelerators. Nevertheless, the effect of the hardware variations and non-idealities of the emerging memory technologies may significantly compromise the accuracy of inferred neural networks and result in malfunctions in safety-critical applications. This article addresses the issue from three different perspectives. First, we describe the technology-related sources of these variations. Then, we propose an architectural-level mitigation strategy that involves the coordinated action of two checksum codes designed to detect and correct errors at runtime. Finally, we optimize the area and latency overhead of the proposed solution by using two accuracy-aware hardware-software co-design techniques. The results demonstrate higher efficiency in mitigating the accuracy degradation of multiple AI algorithms in the context of different technologies compared with state-of-the-art solutions and traditional techniques such as triple modular redundancy. Several configurations of our implementation recover more than 95% of the original accuracy with less than 40% of the area and less than 30% of latency overhead.This article is part of the themed issue 'Emerging technologies for future secure computing platforms'.

内存计算的出现引入了一种新的计算范式,它为新兴的嵌入式AI加速器在延迟和功耗方面提供了显著的改进。然而,硬件变化和新兴存储技术的非理想性的影响可能会显著损害推断神经网络的准确性,并导致安全关键应用中的故障。本文从三个不同的角度来解决这个问题。首先,我们描述了这些变化的技术相关来源。然后,我们提出了一种架构级缓解策略,该策略涉及两个校验和代码的协调动作,旨在在运行时检测和纠正错误。最后,我们通过使用两种精度感知的硬件软件协同设计技术来优化所提出的解决方案的面积和延迟开销。结果表明,与最先进的解决方案和传统技术(如三模冗余)相比,在不同技术背景下,多种人工智能算法在减轻精度下降方面效率更高。我们实现的几种配置以不到40%的面积和不到30%的延迟开销恢复了95%以上的原始精度。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Neural in-memory checksums: an error detection and correction technique for safe in-memory inference.","authors":"Luca Parrini, Taha Soliman, Benjamin Hettwer, Cecilia De La Parra, Jan Micha Borrmann, Simranjeet Singh, Ankit Bende, Vikas Rana, Farhad Merchant, Norbert Wehn","doi":"10.1098/rsta.2023.0399","DOIUrl":"https://doi.org/10.1098/rsta.2023.0399","url":null,"abstract":"<p><p>The advent of in-memory computing has introduced a new paradigm of computation, which offers significant improvements in terms of latency and power consumption for emerging embedded AI accelerators. Nevertheless, the effect of the hardware variations and non-idealities of the emerging memory technologies may significantly compromise the accuracy of inferred neural networks and result in malfunctions in safety-critical applications. This article addresses the issue from three different perspectives. First, we describe the technology-related sources of these variations. Then, we propose an architectural-level mitigation strategy that involves the coordinated action of two checksum codes designed to detect and correct errors at runtime. Finally, we optimize the area and latency overhead of the proposed solution by using two accuracy-aware hardware-software co-design techniques. The results demonstrate higher efficiency in mitigating the accuracy degradation of multiple AI algorithms in the context of different technologies compared with state-of-the-art solutions and traditional techniques such as triple modular redundancy. Several configurations of our implementation recover more than 95% of the original accuracy with less than 40% of the area and less than 30% of latency overhead.This article is part of the themed issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230399"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protected memristive implementations of cryptographic functions. 加密函数的受保护记忆实现。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0389
Ziang Chen, Li-Wei Chen, Xianyue Zhao, Kefeng Li, Heidemarie Schmidt, Ilia Polian, Nan Du

Memristive technology mitigates the memory wall issue in von Neumann architectures by enabling in-memory data processing. Unlike traditional complementary metal-oxide semiconductor (CMOS) technology, memristors provide a new paradigm for implementing cryptographic functions and security considerations. While prior research explores memristors for cryptographic functions and side-channel attack vulnerabilities, our study uniquely addresses memristor-oriented countermeasures. We review different memristive crossbar configurations, implement a four-bit S-box cryptographic function, and analyse memristor-oriented hiding and masking techniques using a self-rectifying passive crossbar. Our findings confirm the efficacy of memristor-oriented hiding techniques but highlight limitations in memristor-oriented masked dual-rail pre-charge logic (MDPL) masking methods. Effective MDPL masking depends on specific power consumption conditions, i.e. the power profile of input data '01' and '10' are not clearly distinguishable from '00' and '11', which, however, are not satisfied across various memristive logic families. Despite passing t-tests, xor4Sbox with CRS-based MDPL masking failed stochastic approaches owing to power consumption differences. Our study prioritizes memristor-oriented countermeasures, advancing the understanding of challenges and opportunities in memristive technology for cryptographic functions.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

记忆技术通过实现内存中的数据处理,缓解了冯·诺伊曼架构中的内存墙问题。与传统的互补金属氧化物半导体(CMOS)技术不同,忆阻器为实现加密功能和安全考虑提供了一种新的范例。虽然先前的研究探索了用于加密功能和侧信道攻击漏洞的忆阻器,但我们的研究独特地解决了面向忆阻器的对策。我们回顾了不同的忆阻交叉棒配置,实现了一个4位s盒加密功能,并分析了使用自整流无源交叉棒的面向忆阻器的隐藏和屏蔽技术。我们的研究结果证实了面向忆阻器的隐藏技术的有效性,但突出了面向忆阻器的屏蔽双轨预充电逻辑(MDPL)屏蔽方法的局限性。有效的MDPL屏蔽取决于特定的功耗条件,即输入数据“01”和“10”与“00”和“11”的功率分布不能明显区分,然而,在各种记忆逻辑家族中都不能满足这一点。尽管通过了t检验,但由于功耗差异,带有基于crs的MDPL掩蔽的xor4Sbox未能通过随机方法。我们的研究优先考虑以忆阻器为导向的对策,促进对密码功能忆阻技术的挑战和机遇的理解。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"Protected memristive implementations of cryptographic functions.","authors":"Ziang Chen, Li-Wei Chen, Xianyue Zhao, Kefeng Li, Heidemarie Schmidt, Ilia Polian, Nan Du","doi":"10.1098/rsta.2023.0389","DOIUrl":"https://doi.org/10.1098/rsta.2023.0389","url":null,"abstract":"<p><p>Memristive technology mitigates the memory wall issue in von Neumann architectures by enabling in-memory data processing. Unlike traditional complementary metal-oxide semiconductor (CMOS) technology, memristors provide a new paradigm for implementing cryptographic functions and security considerations. While prior research explores memristors for cryptographic functions and side-channel attack vulnerabilities, our study uniquely addresses memristor-oriented countermeasures. We review different memristive crossbar configurations, implement a four-bit S-box cryptographic function, and analyse memristor-oriented hiding and masking techniques using a self-rectifying passive crossbar. Our findings confirm the efficacy of memristor-oriented hiding techniques but highlight limitations in memristor-oriented masked dual-rail pre-charge logic (MDPL) masking methods. Effective MDPL masking depends on specific power consumption conditions, i.e. the power profile of input data '01' and '10' are not clearly distinguishable from '00' and '11', which, however, are not satisfied across various memristive logic families. Despite passing <i>t</i>-tests, xor4Sbox with CRS-based MDPL masking failed stochastic approaches owing to power consumption differences. Our study prioritizes memristor-oriented countermeasures, advancing the understanding of challenges and opportunities in memristive technology for cryptographic functions.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230389"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The show must go on: a reliability assessment platform for resistive random access memory crossbars. 一个电阻式随机存取存储器横条的可靠性评估平台必须继续下去。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0387
Rebecca Pelke, Felix Staudigl, Niklas Thomas, Mohammed Hossein, Nils Bosbach, José Cubero-Cascante, Rainer Leupers, Jan Moritz Joseph

Resistive random access memory (ReRAM) holds promise for building computing-in-memory (CIM) architectures to execute machine learning (ML) applications. However, existing ReRAM technology faces challenges such as cell and cycle variability, read-disturb and limited endurance, necessitating improvements in devices, algorithms and applications. Understanding the behaviour of ReRAM technologies is crucial for advancement. Existing platforms can either only characterize single cells and do not support CIM operations, or lack a comprehensive software stack for simple system integration. This article introduces NeuroBreakoutBoard (NBB), a versatile, integrable and portable instrumentation platform for ReRAM crossbars. The platform features a software stack enabling experiments via Python from a host PC. In a case study, we demonstrate the capabilities of NBB by conducting diverse experiments on TiN/Ti/HfO2/TiN cells. Our results show that NBB can characterize individual cells and perform CIM operations with a relative measurement error below 2%.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

电阻式随机存取存储器(ReRAM)有望构建内存中计算(CIM)架构,以执行机器学习(ML)应用程序。然而,现有的ReRAM技术面临着诸如细胞和周期可变性、读取干扰和有限的耐用性等挑战,需要对设备、算法和应用进行改进。了解ReRAM技术的行为对技术进步至关重要。现有的平台要么只能描述单个单元,不支持CIM操作,要么缺乏用于简单系统集成的全面软件堆栈。本文介绍了NeuroBreakoutBoard (NBB),这是一种多功能,可集成和便携式的ReRAM横梁仪器平台。该平台的特点是一个软件栈,可以在主机PC上通过Python进行实验。在一个案例研究中,我们通过在TiN/Ti/HfO2/TiN电池上进行各种实验来证明NBB的能力。我们的研究结果表明,NBB可以表征单个电池并在相对测量误差低于2%的情况下执行CIM操作。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"The show must go on: a reliability assessment platform for resistive random access memory crossbars.","authors":"Rebecca Pelke, Felix Staudigl, Niklas Thomas, Mohammed Hossein, Nils Bosbach, José Cubero-Cascante, Rainer Leupers, Jan Moritz Joseph","doi":"10.1098/rsta.2023.0387","DOIUrl":"https://doi.org/10.1098/rsta.2023.0387","url":null,"abstract":"<p><p>Resistive random access memory (ReRAM) holds promise for building computing-in-memory (CIM) architectures to execute machine learning (ML) applications. However, existing ReRAM technology faces challenges such as cell and cycle variability, read-disturb and limited endurance, necessitating improvements in devices, algorithms and applications. Understanding the behaviour of ReRAM technologies is crucial for advancement. Existing platforms can either only characterize single cells and do not support CIM operations, or lack a comprehensive software stack for simple system integration. This article introduces NeuroBreakoutBoard (NBB), a versatile, integrable and portable instrumentation platform for ReRAM crossbars. The platform features a software stack enabling experiments via Python from a host PC. In a case study, we demonstrate the capabilities of NBB by conducting diverse experiments on TiN/Ti/HfO<sub>2</sub>/TiN cells. Our results show that NBB can characterize individual cells and perform CIM operations with a relative measurement error below 2%.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230387"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-memory encryption using the advanced encryption standard. 使用高级加密标准的内存加密。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0396
Tobias Kovats, Navaneeth Rameshan, Kumudu Geethan Karunaratne, Iason Giannopoulos, Abu Sebastian

Encryption and decryption of data with very low latency and high energy efficiency is desirable in almost every application that deals with sensitive data. The advanced encryption standard (AES) is a widely adopted algorithm in symmetric key cryptography with numerous efficient implementations. Nonetheless, in scenarios involving extensive data processing, the primary limitations on performance and efficiency arise from data movement between memory and the processor, rather than data processing itself. In this article, we present a novel in-memory computing (IMC) approach for AES encryption and key-expansion, and experimentally validate it on an IMC prototype chip based on phase-change memory (PCM) technology. We leverage operators stored in PCM crossbar arrays to achieve the flexibility to tune performance at runtime based on the amount of free storage available in the memory system. In addition, we introduce a method for parallel in-memory polynomial modular multiplication and evaluate the potential of intrinsic stochastic properties of PCM devices for random key generation. We show how to further improve efficiency with minimal additional auxiliary circuitry. To evaluate the performance within a custom-built large-scale in-memory AES system, we design and implement a cycle-accurate simulator that integrates parameters from Spice simulations for detailed latency and energy consumption analysis of the AES algorithm. Our evaluations indicate that our IMC-based AES approach outperforms state-of-the-art methods, achieving speed factor improvements of up to 19.7 at equivalent energy efficiency.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

几乎所有处理敏感数据的应用程序都希望以极低的延迟和高能效对数据进行加密和解密。高级加密标准(AES)是对称密钥加密中广泛采用的一种算法,有许多有效的实现。尽管如此,在涉及大量数据处理的场景中,性能和效率的主要限制来自内存和处理器之间的数据移动,而不是数据处理本身。本文提出了一种新的用于AES加密和密钥扩展的内存计算(IMC)方法,并在基于相变存储器(PCM)技术的IMC原型芯片上进行了实验验证。我们利用存储在PCM交叉棒阵列中的运算符来实现基于内存系统中可用的空闲存储量在运行时调整性能的灵活性。此外,我们还介绍了一种并行内存多项式模乘法的方法,并评估了PCM器件固有的随机特性在随机密钥生成方面的潜力。我们展示了如何以最小的额外辅助电路进一步提高效率。为了评估定制的大规模内存AES系统的性能,我们设计并实现了一个周期精确的模拟器,该模拟器集成了Spice模拟的参数,用于详细分析AES算法的延迟和能耗。我们的评估表明,我们基于imc的AES方法优于最先进的方法,在同等能源效率下实现了高达19.7的速度因子改进。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"In-memory encryption using the advanced encryption standard.","authors":"Tobias Kovats, Navaneeth Rameshan, Kumudu Geethan Karunaratne, Iason Giannopoulos, Abu Sebastian","doi":"10.1098/rsta.2023.0396","DOIUrl":"https://doi.org/10.1098/rsta.2023.0396","url":null,"abstract":"<p><p>Encryption and decryption of data with very low latency and high energy efficiency is desirable in almost every application that deals with sensitive data. The advanced encryption standard (AES) is a widely adopted algorithm in symmetric key cryptography with numerous efficient implementations. Nonetheless, in scenarios involving extensive data processing, the primary limitations on performance and efficiency arise from data movement between memory and the processor, rather than data processing itself. In this article, we present a novel in-memory computing (IMC) approach for AES encryption and key-expansion, and experimentally validate it on an IMC prototype chip based on phase-change memory (PCM) technology. We leverage operators stored in PCM crossbar arrays to achieve the flexibility to tune performance at runtime based on the amount of free storage available in the memory system. In addition, we introduce a method for parallel in-memory polynomial modular multiplication and evaluate the potential of intrinsic stochastic properties of PCM devices for random key generation. We show how to further improve efficiency with minimal additional auxiliary circuitry. To evaluate the performance within a custom-built large-scale in-memory AES system, we design and implement a cycle-accurate simulator that integrates parameters from Spice simulations for detailed latency and energy consumption analysis of the AES algorithm. Our evaluations indicate that our IMC-based AES approach outperforms state-of-the-art methods, achieving speed factor improvements of up to 19.7 at equivalent energy efficiency.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230396"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPACT: In-Memory ComPuting Architecture based on Y-FlAsh Technology for Coalesced Tsetlin machine inference. 影响:基于Y-FlAsh技术的合并Tsetlin机器推理的内存计算架构。
IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI: 10.1098/rsta.2023.0393
Omar Ghazal, Wei Wang, Shahar Kvatinsky, Farhad Merchant, Alex Yakovlev, Rishad Shafik

The increasing demand for processing large volumes of data for machine learning (ML) models has pushed data bandwidth requirements beyond the capability of traditional von Neumann architecture. In-memory computing (IMC) has recently emerged as a promising solution to address this gap by enabling distributed data storage and processing at the micro-architectural level, significantly reducing both latency and energy. In this article, we present In-Memory comPuting architecture based on Y-FlAsh technology for Coalesced Tsetlin machine inference (IMPACT), underpinned on a cutting-edge memory device, Y-Flash, fabricated on a 180 nm complementary metal oxide semiconductor (CMOS) process. Y-Flash devices have recently been demonstrated for digital and analogue memory applications; they offer high yield, non-volatility and low power consumption. IMPACT leverages the Y-Flash array to implement the inference of a novel ML algorithm: coalesced Tsetlin machine (CoTM) based on propositional logic. CoTM utilizes Tsetlin automata (TA) to create Boolean feature selections stochastically across parallel clauses. IMPACT is organized into two computational crossbars for storing the TA and weights. Through validation on the MNIST dataset, IMPACT achieved [Formula: see text] accuracy. IMPACT demonstrated improvements in energy efficiency, e.g. factors of 2.23 over CNN-based ReRAM, 2.46 over neuromorphic using NOR-Flash and 2.06 over DNN-based phase-change memory (PCM), suited for modern ML inference applications.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

机器学习(ML)模型对处理大量数据的需求日益增长,使得数据带宽需求超出了传统冯·诺依曼架构的能力。内存计算(IMC)最近作为一种很有前途的解决方案出现,通过在微体系结构级别启用分布式数据存储和处理,显著降低了延迟和能耗,从而解决了这一差距。在本文中,我们提出了基于Y-FlAsh技术的内存计算架构,用于Coalesced Tsetlin机器推理(IMPACT),该架构基于采用180 nm互补金属氧化物半导体(CMOS)工艺制造的尖端存储器件Y-FlAsh。Y-Flash设备最近已被证明用于数字和模拟存储器应用;它们提供高产量,无波动性和低功耗。IMPACT利用Y-Flash阵列实现了一种新的ML算法的推理:基于命题逻辑的coalesced Tsetlin machine (CoTM)。CoTM利用Tsetlin自动机(TA)在并行子句之间随机创建布尔特征选择。IMPACT被组织成两个计算横条,用于存储TA和权重。通过在MNIST数据集上的验证,IMPACT达到了[公式:见文本]的准确率。IMPACT展示了能源效率的提高,例如,比基于cnn的ReRAM提高2.23倍,使用NOR-Flash比神经形态提高2.46倍,比基于dnn的相变存储器(PCM)提高2.06倍,适用于现代ML推理应用。本文是“未来安全计算平台的新兴技术”主题的一部分。
{"title":"IMPACT: In-Memory ComPuting Architecture based on Y-FlAsh Technology for Coalesced Tsetlin machine inference.","authors":"Omar Ghazal, Wei Wang, Shahar Kvatinsky, Farhad Merchant, Alex Yakovlev, Rishad Shafik","doi":"10.1098/rsta.2023.0393","DOIUrl":"https://doi.org/10.1098/rsta.2023.0393","url":null,"abstract":"<p><p>The increasing demand for processing large volumes of data for machine learning (ML) models has pushed data bandwidth requirements beyond the capability of traditional von Neumann architecture. In-memory computing (IMC) has recently emerged as a promising solution to address this gap by enabling distributed data storage and processing at the micro-architectural level, significantly reducing both latency and energy. In this article, we present In-Memory comPuting architecture based on Y-FlAsh technology for Coalesced Tsetlin machine inference (IMPACT), underpinned on a cutting-edge memory device, Y-Flash, fabricated on a 180 nm complementary metal oxide semiconductor (CMOS) process. Y-Flash devices have recently been demonstrated for digital and analogue memory applications; they offer high yield, non-volatility and low power consumption. IMPACT leverages the Y-Flash array to implement the inference of a novel ML algorithm: coalesced Tsetlin machine (CoTM) based on propositional logic. CoTM utilizes Tsetlin automata (TA) to create Boolean feature selections stochastically across parallel clauses. IMPACT is organized into two computational crossbars for storing the TA and weights. Through validation on the MNIST dataset, IMPACT achieved [Formula: see text] accuracy. IMPACT demonstrated improvements in energy efficiency, e.g. factors of 2.23 over CNN-based ReRAM, 2.46 over neuromorphic using NOR-Flash and 2.06 over DNN-based phase-change memory (PCM), suited for modern ML inference applications.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230393"},"PeriodicalIF":4.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11736465/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143009572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1