首页 > 最新文献

IACR Transactions on Symmetric Cryptology最新文献

英文 中文
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks 比较SNOW 2.0和SNOW 3G的大单位和位线性逼近及相关攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/TOSC.V2021.I2.71-103
Xinxin Gong, Bin Zhang
In this paper, we study and compare the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G, and present a fast correlation attack on SNOW 3G by using our newly found bitwise linear approximations. On one side, we reconsider the relation between the large-unit linear approximation and the smallerunit/ bitwise ones derived from the large-unit one, showing that approximations on large-unit alphabets have advantages over all the smaller-unit/bitwise ones in linear attacks. But then on the other side, by comparing the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G respectively, we have found many concrete examples of 8-bit linear approximations whose certain 1-dimensional/bitwise linear approximations have almost the same SEI (Squared Euclidean Imbalance) as that of the original 8-bit ones. That is, each of these byte-wise linear approximations is dominated by a single bitwise approximation, and thus the whole SEI is not essentially larger than the SEI of the dominating single bitwise approximation. Since correlation attacks can be more efficiently implemented using bitwise approximations rather than large-unit approximations, improvements over the large-unit linear approximation attacks are possible for SNOW 2.0 and SNOW 3G. For SNOW 3G, we make a careful search of the bitwise masks for the linear approximations of the FSM and obtain many mask tuples which yield high correlations. By using these bitwise linear approximations, we mount a fast correlation attack to recover the initial state of the LFSR with the time/memory/data/pre-computation complexities all upper bounded by 2174.16, improving slightly the previous best one which used an 8-bit (vectorized) linear approximation in a correlation attack with all the complexities upper bounded by 2176.56. Though not a significant improvement, our research results illustrate that we have an opportunity to achieve improvement over the large-unit attacks by using bitwise linear approximations in a linear approximation attack, and provide a newinsight on the relation between large-unit and bitwise linear approximations.
在本文中,我们研究和比较了snow2.0和snow3g的字节线性近似和位线性近似,并利用我们新发现的位线性近似提出了对snow3g的快速相关攻击。一方面,我们重新考虑了大单位线性近似和由大单位近似衍生的小单位/位近似之间的关系,表明在线性攻击中,大单位字母近似比所有小单位/位近似具有优势。但另一方面,通过分别比较SNOW 2.0和SNOW 3G的字节线性近似和位线性近似,我们发现了许多8位线性近似的具体例子,其某些一维/位线性近似与原始8位近似具有几乎相同的SEI(平方欧几里得不平衡)。也就是说,每一个字节线性近似都由单个位近似控制,因此整个SEI本质上并不大于占主导地位的单个位近似的SEI。由于使用位逼近而不是大单位逼近可以更有效地实现相关攻击,因此在SNOW 2.0和SNOW 3G中可以对大单位线性逼近攻击进行改进。对于SNOW 3G,我们对FSM的线性逼近进行了仔细的位掩码搜索,得到了许多具有高相关性的掩码元组。通过使用这些位线性近似,我们安装了一个快速相关攻击来恢复LFSR的初始状态,时间/内存/数据/预计算复杂性的上界为2174.16,略微改进了之前使用8位(矢量化)线性近似的相关攻击,所有复杂性的上界为2176.56。虽然没有显著的改进,但我们的研究结果表明,我们有机会通过在线性近似攻击中使用位线性近似来实现对大单位攻击的改进,并为大单位和位线性近似之间的关系提供了新的视角。
{"title":"Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks","authors":"Xinxin Gong, Bin Zhang","doi":"10.46586/TOSC.V2021.I2.71-103","DOIUrl":"https://doi.org/10.46586/TOSC.V2021.I2.71-103","url":null,"abstract":"In this paper, we study and compare the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G, and present a fast correlation attack on SNOW 3G by using our newly found bitwise linear approximations. On one side, we reconsider the relation between the large-unit linear approximation and the smallerunit/ bitwise ones derived from the large-unit one, showing that approximations on large-unit alphabets have advantages over all the smaller-unit/bitwise ones in linear attacks. But then on the other side, by comparing the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G respectively, we have found many concrete examples of 8-bit linear approximations whose certain 1-dimensional/bitwise linear approximations have almost the same SEI (Squared Euclidean Imbalance) as that of the original 8-bit ones. That is, each of these byte-wise linear approximations is dominated by a single bitwise approximation, and thus the whole SEI is not essentially larger than the SEI of the dominating single bitwise approximation. Since correlation attacks can be more efficiently implemented using bitwise approximations rather than large-unit approximations, improvements over the large-unit linear approximation attacks are possible for SNOW 2.0 and SNOW 3G. For SNOW 3G, we make a careful search of the bitwise masks for the linear approximations of the FSM and obtain many mask tuples which yield high correlations. By using these bitwise linear approximations, we mount a fast correlation attack to recover the initial state of the LFSR with the time/memory/data/pre-computation complexities all upper bounded by 2174.16, improving slightly the previous best one which used an 8-bit (vectorized) linear approximation in a correlation attack with all the complexities upper bounded by 2176.56. Though not a significant improvement, our research results illustrate that we have an opportunity to achieve improvement over the large-unit attacks by using bitwise linear approximations in a linear approximation attack, and provide a newinsight on the relation between large-unit and bitwise linear approximations.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"40 12","pages":"71-103"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72467456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resistance of SNOW-V against Fast Correlation Attacks SNOW-V对快速相关攻击的抵抗力
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-03-19 DOI: 10.46586/tosc.v2021.i1.378-410
Xinxin Gong, Bin Zhang
SNOW-V is a new member in the SNOW family of stream ciphers, hoping to be competitive in the 5G mobile communication system. In this paper, we study the resistance of SNOW-V against bitwise fast correlation attacks by constructing bitwise linear approximations. First, we propose and summarize some efficient algorithms using the slice-like techniques to compute the bitwise linear approximations of certain types of composition functions composed of basic operations like ⊞, ⊕, Permutation, and S-box, which have been widely used in word-oriented stream ciphers such as SNOW-like ciphers. Then, using these algorithms, we find a number of stronger linear approximations for the FSM of the two variants of SNOW-V given in the design document, i.e., SNOW-V σ0 and SNOW-V⊞8, ⊞8. For SNOW-V σ0, where there is no byte-wise permutation, we find some bitwise linear approximations of the FSM with the SEI (Squared Euclidean Imbalance) around 2−37.34 and mount a bitwise fast correlation attack with the time complexity 2251.93 and memory complexity 2244, given 2103.83 keystream outputs, which improves greatly the results in the design document. For SNOW-V⊞8, ⊞8, where both of the two 32-bit adders in the FSM are replaced by 8-bit adders, we find our best bitwise linear approximations of the FSM with the SEI 2−174.14, while the best byte-wise linear approximation in the design document of SNOW-V has the SEI 2−214.80. Finally, we study the security of a closer variant of SNOW-V, denoted by SNOW-V⊞32, ⊞8, where only the 32-bit adder used for updating the first register is replaced by the 8-bit adder, while everything else remains identical. For SNOW-V⊞32, ⊞8, we derive many mask tuples yielding the bitwise linear approximations of the FSM with the SEI larger than 2−184. Using these linear approximations, we mount a fast correlation attack with the time complexity 2377.01 and a memory complexity 2363, given 2253.73 keystream outputs. Note that neither of our attack threatens the security of SNOW-V. We hope our research could further help in understanding bitwise linear approximation attacks and also the structure of SNOW-like stream ciphers.
SNOW- v是流密码SNOW家族的新成员,希望在5G移动通信系统中具有竞争力。本文通过构造位线性近似,研究了SNOW-V对位快速相关攻击的抵抗能力。首先,我们提出并总结了一些利用类切片技术计算若干种组合函数的位线性逼近的有效算法,这些组合函数由诸如运、⊕、置换、S-box等基本运算组成,在类斯诺密码等面向字的流密码中得到了广泛的应用。然后,利用这些算法,我们找到了设计文档中给出的SNOW-V的两个变量(即SNOW-V σ0和SNOW-V 8, win 8)的若干更强的线性逼近。对于没有字节排列的SNOW-V σ0,我们找到了一些具有SEI(平方欧几里得不平衡)约为2−37.34的FSM的位线性近似,并在给定2103.83个密钥流输出的情况下,进行了时间复杂度为2251.93和内存复杂度为2244的位快速相关攻击,大大改善了设计文档中的结果。在SNOW-V的8、8中,两台32位加法器都被替换为8位加法器,我们发现对FSM的最佳位线性近似为SEI 2−174.14,而在SNOW-V的设计文档中,最佳位线性近似为SEI 2−214.80。最后,我们研究了一个更接近于SNOW-V的变体,即SNOW-V 32、8的安全性,其中只有用于更新第一个寄存器的32位加法器被8位加法器取代,而其他的都保持不变。对于SNOW-V的32、8,我们推导出了许多掩模元,得到了SEI大于2−184的FSM的位线性近似。使用这些线性近似,我们在给定2253.73个密钥流输出的情况下,以时间复杂度2377.01和内存复杂度2363进行了快速相关攻击。请注意,我们的攻击都没有威胁到SNOW-V的安全。我们希望我们的研究能够进一步帮助理解按位线性逼近攻击以及类snow流密码的结构。
{"title":"Resistance of SNOW-V against Fast Correlation Attacks","authors":"Xinxin Gong, Bin Zhang","doi":"10.46586/tosc.v2021.i1.378-410","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.378-410","url":null,"abstract":"SNOW-V is a new member in the SNOW family of stream ciphers, hoping to be competitive in the 5G mobile communication system. In this paper, we study the resistance of SNOW-V against bitwise fast correlation attacks by constructing bitwise linear approximations. First, we propose and summarize some efficient algorithms using the slice-like techniques to compute the bitwise linear approximations of certain types of composition functions composed of basic operations like ⊞, ⊕, Permutation, and S-box, which have been widely used in word-oriented stream ciphers such as SNOW-like ciphers. Then, using these algorithms, we find a number of stronger linear approximations for the FSM of the two variants of SNOW-V given in the design document, i.e., SNOW-V σ0 and SNOW-V⊞8, ⊞8. For SNOW-V σ0, where there is no byte-wise permutation, we find some bitwise linear approximations of the FSM with the SEI (Squared Euclidean Imbalance) around 2−37.34 and mount a bitwise fast correlation attack with the time complexity 2251.93 and memory complexity 2244, given 2103.83 keystream outputs, which improves greatly the results in the design document. For SNOW-V⊞8, ⊞8, where both of the two 32-bit adders in the FSM are replaced by 8-bit adders, we find our best bitwise linear approximations of the FSM with the SEI 2−174.14, while the best byte-wise linear approximation in the design document of SNOW-V has the SEI 2−214.80. Finally, we study the security of a closer variant of SNOW-V, denoted by SNOW-V⊞32, ⊞8, where only the 32-bit adder used for updating the first register is replaced by the 8-bit adder, while everything else remains identical. For SNOW-V⊞32, ⊞8, we derive many mask tuples yielding the bitwise linear approximations of the FSM with the SEI larger than 2−184. Using these linear approximations, we mount a fast correlation attack with the time complexity 2377.01 and a memory complexity 2363, given 2253.73 keystream outputs. Note that neither of our attack threatens the security of SNOW-V. We hope our research could further help in understanding bitwise linear approximation attacks and also the structure of SNOW-like stream ciphers.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"59 1","pages":"378-410"},"PeriodicalIF":3.5,"publicationDate":"2021-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85826267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Algebraic Collision Attacks on Keccak Keccak的代数碰撞攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i1.239-268
Rachelle Heim Boissier, C. Noûs, Yann Rotella
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting properties of the linear part of the round function of Keccak. We present an attack on the Keccak versions that could be used in lightweight cryptography reduced to two rounds. For Keccak[40, 160] (resp. Keccak[72, 128] and Keccak[144, 256]) our attack has a computational complexity of 273 (resp. 252.5 and 2101.5) Keccak calls.
本文分析了宽度分别为200位和400位的两种最小版本Keccak的抗碰撞性能。我们利用Keccak圆函数的线性部分的一些有趣性质,证明了代数和线性化技术可以服务于碰撞密码分析。我们提出了一种针对Keccak版本的攻击,这种攻击可以在轻量级密码术中使用,减少到两轮。For Keccak[40,160](参考文献)。Keccak[72,128]和Keccak[144,256]),我们的攻击的计算复杂度为273。252.5和2101.5)Keccak呼叫。
{"title":"Algebraic Collision Attacks on Keccak","authors":"Rachelle Heim Boissier, C. Noûs, Yann Rotella","doi":"10.46586/tosc.v2021.i1.239-268","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.239-268","url":null,"abstract":"In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting properties of the linear part of the round function of Keccak. We present an attack on the Keccak versions that could be used in lightweight cryptography reduced to two rounds. For Keccak[40, 160] (resp. Keccak[72, 128] and Keccak[144, 256]) our attack has a computational complexity of 273 (resp. 252.5 and 2101.5) Keccak calls.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"55 1","pages":"239-268"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90903704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Atom: A Stream Cipher with Double Key Filter 带双密钥过滤器的流密码
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i1.5-36
S. Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, W. Meier, Kosei Sakamoto, Santanu Sarkar
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key. In FSE 2015, Armknecht and Mikhalev however proposed the stream cipher Sprout with a Grain-like architecture, whose internal state was equal in size with its secret key and yet resistant against TMD attacks. Although Sprout had other weaknesses, it germinated a sequence of stream cipher designs like Lizard and Plantlet with short internal states. Both these designs have had cryptanalytic results reported against them. In this paper, we propose the stream cipher Atom that has an internal state of 159 bits and offers a security of 128 bits. Atom uses two key filters simultaneously to thwart certain cryptanalytic attacks that have been recently reported against keystream generators. In addition, we found that our design is one of the smallest stream ciphers that offers this security level, and we prove in this paper that Atom resists all the attacks that have been proposed against stream ciphers so far in literature. On the face of it, Atom also builds on the basic structure of the Grain family of stream ciphers. However, we try to prove that by including the additional key filter in the architecture of Atom we can make it immune to all cryptanalytic advances proposed against stream ciphers in recent cryptographic literature.
众所周知,要使流密码免受通用的TMD折衷攻击,其内部状态的比特大小至少需要是其密钥长度的两倍。然而,在FSE 2015中,Armknecht和Mikhalev提出了具有类似grain架构的流密码Sprout,其内部状态与其密钥大小相等,并且可以抵抗TMD攻击。尽管Sprout还有其他弱点,但它孕育了一系列具有短内部状态的流密码设计,如Lizard和Plantlet。这两种设计都有针对它们的密码分析结果报告。本文提出了一种内部状态为159位,安全性为128位的流密码Atom。Atom同时使用两个密钥过滤器来阻止最近报道的针对密钥流生成器的某些密码分析攻击。此外,我们发现我们的设计是提供此安全级别的最小流密码之一,并且我们在本文中证明了Atom可以抵抗迄今为止文献中针对流密码提出的所有攻击。从表面上看,Atom也是建立在Grain系列流密码的基本结构之上的。然而,我们试图证明,通过在Atom架构中包含额外的密钥过滤器,我们可以使它免受最近密码学文献中针对流密码提出的所有密码分析进展的影响。
{"title":"Atom: A Stream Cipher with Double Key Filter","authors":"S. Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, W. Meier, Kosei Sakamoto, Santanu Sarkar","doi":"10.46586/tosc.v2021.i1.5-36","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.5-36","url":null,"abstract":"It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key. In FSE 2015, Armknecht and Mikhalev however proposed the stream cipher Sprout with a Grain-like architecture, whose internal state was equal in size with its secret key and yet resistant against TMD attacks. Although Sprout had other weaknesses, it germinated a sequence of stream cipher designs like Lizard and Plantlet with short internal states. Both these designs have had cryptanalytic results reported against them. In this paper, we propose the stream cipher Atom that has an internal state of 159 bits and offers a security of 128 bits. Atom uses two key filters simultaneously to thwart certain cryptanalytic attacks that have been recently reported against keystream generators. In addition, we found that our design is one of the smallest stream ciphers that offers this security level, and we prove in this paper that Atom resists all the attacks that have been proposed against stream ciphers so far in literature. On the face of it, Atom also builds on the basic structure of the Grain family of stream ciphers. However, we try to prove that by including the additional key filter in the architecture of Atom we can make it immune to all cryptanalytic advances proposed against stream ciphers in recent cryptographic literature.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"34 1","pages":"5-36"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74629231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Preimage Attacks on 4-Round Keccak-224/256 改进了4轮Keccak-224/256的预图像攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i1.217-238
Le He, Xiaoen Lin, Hongbo Yu
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265.
本文提出了一种改进的标准3轮Keccak-224/256预像攻击方法。我们的方法是基于李和孙的工作。他们的策略是通过分两个阶段构建第一个和第二个消息块来找到一个2块的原映像,而不是一个1块的原映像。在此策略下,他们为2轮Keccak-224/256设计了一种新的线性结构,剩余自由度为194,能够构建复杂度为231/262的第二个消息块。然而,该策略的瓶颈是第一阶段比第二阶段需要更多的费用。因此,我们通过使用两种技术来改进第一阶段。第一种技术是在第一阶段构造多块消息而不是单块消息,这样可以达到更好的内部状态。第二种技术是更有效地设置限制方程,它可以在3轮Keccak-256中工作。因此,寻找3轮Keccak-224/256的预像的复杂性可以从238/281降低到232/265。
{"title":"Improved Preimage Attacks on 4-Round Keccak-224/256","authors":"Le He, Xiaoen Lin, Hongbo Yu","doi":"10.46586/tosc.v2021.i1.217-238","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.217-238","url":null,"abstract":"In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second message blocks in two stages. Under this strategy, they design a new linear structure for 2-round Keccak-224/256 with 194 degrees of freedom left, which is able to construct the second message block with a complexity of 231/262. However, the bottleneck of this strategy is that the first stage needs much more expense than the second one. Therefore, we improve the first stage by using two techniques. The first technique is constructing multi-block messages rather than one-block message in the first stage, which can reach a better inner state. The second technique is setting restricting equations more efficiently, which can work in 3-round Keccak-256. As a result, the complexity of finding a preimage for 3-round Keccak-224/256 can be decreased from 238/281 to 232/265.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"5 1","pages":"217-238"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89920156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MOE: Multiplication Operated Encryption with Trojan Resilience MOE:乘法操作加密与特洛伊木马弹性
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i1.78-129
Olivier Bronchain, Sebastian Faust, Virginie Lallemand, G. Leander, Léo Perrin, François-Xavier Standaert
In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong form of Trojan-resilience can be obtained from untrusted chips by exploiting secret sharing and Multi-Party Computation (MPC), yet with significant cost overheads. In this paper, we study the possibility of building a symmetric cipher enabling similar guarantees in a more efficient manner. To reach this goal, we exploit a simple round structure mixing a modular multiplication and a multiplication with a binary matrix. Besides being motivated as a new block cipher design for Trojan resilience, our research also exposes the cryptographic properties of the modular multiplication, which is of independent interest.
为了降低成本,集成电路(ic)的制造越来越多地委托给离岸合同代工厂,这使得它们容易受到恶意修改,即硬件木马。最近的研究表明,通过利用秘密共享和多方计算(MPC),可以从不受信任的芯片中获得强大的木马抵御能力,但成本很高。在本文中,我们研究了以一种更有效的方式构建能够实现类似保证的对称密码的可能性。为了达到这个目标,我们利用了一个简单的圆形结构,混合了一个模乘法和一个带二进制矩阵的乘法。除了作为一种新的针对特洛伊木马抵御能力的分组密码设计,我们的研究还揭示了模乘法的密码学特性,这是一个独立的兴趣。
{"title":"MOE: Multiplication Operated Encryption with Trojan Resilience","authors":"Olivier Bronchain, Sebastian Faust, Virginie Lallemand, G. Leander, Léo Perrin, François-Xavier Standaert","doi":"10.46586/tosc.v2021.i1.78-129","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.78-129","url":null,"abstract":"In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong form of Trojan-resilience can be obtained from untrusted chips by exploiting secret sharing and Multi-Party Computation (MPC), yet with significant cost overheads. In this paper, we study the possibility of building a symmetric cipher enabling similar guarantees in a more efficient manner. To reach this goal, we exploit a simple round structure mixing a modular multiplication and a multiplication with a binary matrix. Besides being motivated as a new block cipher design for Trojan resilience, our research also exposes the cryptographic properties of the modular multiplication, which is of independent interest.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"47 1","pages":"78-129"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76241877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Differential-Based Distinguishers and Forgeries for ASCON ASCON中基于微分的区分和伪造的探索
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i3.102-136
David Gérault, Thomas Peyrin, Q. Tan
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. In this article, we explore the use of Constraint Programming (CP) for differential cryptanalysis on the Ascon authenticated encryption family (first choice of the CAESAR lightweight applications portfolio and current finalist of the NIST LWC competition) and its internal permutation. We first present a search methodology for finding differential characteristics for Ascon with CP, which can easily find the best differential characteristics already reported by the Ascon designers. This shows the capability of CP in generating easily good differential results compared to dedicated search heuristics. Based on our tool, we also parametrize the search strategies in CP to generate other differential characteristics with the goal of forming limited-birthday distinguishers for 4, 5, 6 and 7 rounds and rectangle attacks for 4 and 5 rounds of the Ascon internal permutation. We propose a categorization of the distinguishers into black-box and non-black-box to better differentiate them as they are often useful in different contexts. We also obtained limited-birthday distinguishers which represent currently the best known distinguishers for 4, 5 and 6 rounds under the category of non-black-box distinguishers. Leveraging again our tool, we have generated forgery attacks against both reduced-rounds Ascon-128 and Ascon-128a, improving over the best reported results at the time of writing. Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-Hash.
在针对对称密钥加密原语搜索区分符时,自动化方法已成为关键组件。虽然MILP和SAT求解器是最流行的密码建模和执行密码分析的工具,但其他具有不同性能配置文件的方法正在出现。在本文中,我们将探讨在Ascon认证加密家族(CAESAR轻量级应用程序组合的首选和NIST LWC竞赛的当前决赛选手)及其内部排列上使用约束编程(CP)进行差分密码分析。我们首先提出了一种寻找具有CP的Ascon差分特性的搜索方法,它可以很容易地找到Ascon设计者已经报告的最佳差分特性。这表明,与专门的搜索启发式相比,CP能够轻松生成良好的差分结果。基于我们的工具,我们还对CP中的搜索策略进行了参数化,以生成其他差分特征,目标是为Ascon内部排列的4、5、6和7轮形成有限生日区分符,为4和5轮形成矩形攻击。我们建议将区分词分为黑箱和非黑箱,以便更好地区分它们,因为它们通常在不同的上下文中有用。我们还获得了代表当前最知名的4、5和6轮非黑盒子区分者类别的有限生日区分者。再次利用我们的工具,我们针对Ascon-128和Ascon-128a生成了伪造攻击,比撰写本文时报告的最佳结果有所改善。最后,使用我们在2轮中发现的最佳差分特性,我们还可以改进最近对round-reduced Ascon-Hash的攻击。
{"title":"Exploring Differential-Based Distinguishers and Forgeries for ASCON","authors":"David Gérault, Thomas Peyrin, Q. Tan","doi":"10.46586/tosc.v2021.i3.102-136","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i3.102-136","url":null,"abstract":"Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. In this article, we explore the use of Constraint Programming (CP) for differential cryptanalysis on the Ascon authenticated encryption family (first choice of the CAESAR lightweight applications portfolio and current finalist of the NIST LWC competition) and its internal permutation. We first present a search methodology for finding differential characteristics for Ascon with CP, which can easily find the best differential characteristics already reported by the Ascon designers. This shows the capability of CP in generating easily good differential results compared to dedicated search heuristics. Based on our tool, we also parametrize the search strategies in CP to generate other differential characteristics with the goal of forming limited-birthday distinguishers for 4, 5, 6 and 7 rounds and rectangle attacks for 4 and 5 rounds of the Ascon internal permutation. We propose a categorization of the distinguishers into black-box and non-black-box to better differentiate them as they are often useful in different contexts. We also obtained limited-birthday distinguishers which represent currently the best known distinguishers for 4, 5 and 6 rounds under the category of non-black-box distinguishers. Leveraging again our tool, we have generated forgery attacks against both reduced-rounds Ascon-128 and Ascon-128a, improving over the best reported results at the time of writing. Finally, using the best differential characteristic we have found for 2 rounds, we could also improve a recent attack on round-reduced Ascon-Hash.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"73 1","pages":"102-136"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73604136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Maximums of the Additive Differential Probability of Exclusive-Or 异或的加性微分概率的极大值
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i2.292-313
N. Mouha, N. Kolomeec, D. Akhtiamov, I. Sutormin, M. Panferov, Kseniya A. Titova, T. Bonich, E. Ishchukova, N. Tokareva, Bulat Zhantulikov
At FSE 2004, Lipmaa et al. studied the additive differential probability adp⊕(α, β → γ) of exclusive-or where differences α, β, γ ∈ F2 are expressed using addition modulo 2. This probability is used in the analysis of symmetrickey primitives that combine XOR and modular addition, such as the increasingly popular Addition-Rotation-XOR (ARX) constructions. The focus of this paper is on maximal differentials, which are helpful when constructing differential trails. We provide the missing proof for Theorem 3 of the FSE 2004 paper, which states that maxα,β adp⊕(α, β → γ) = adp⊕(0, γ → γ) for all γ. Furthermore, we prove that there always exist either two or eight distinct pairs α, β such that adp⊕(α, β → γ) = adp⊕(0, γ → γ), and we obtain recurrence formulas for calculating adp⊕. To gain insight into the range of possible differential probabilities, we also study other properties such as the minimum value of adp⊕(0, γ → γ), and we find all γ that satisfy this minimum value.
在FSE 2004上,Lipmaa等人研究了异或的加性微分概率adp⊕(α, β→γ),其中差分α, β, γ∈F2用加法模2表示。这个概率用于分析结合异或和模块化加法的对称基元,例如日益流行的加法-旋转-异或(ARX)结构。本文的重点是最大微分,这有助于构建微分轨迹。我们提供了FSE 2004论文中关于maxα,β adp⊕(α, β→γ) = adp⊕(0,γ→γ)的定理3的缺失证明。进一步证明了总存在两个或八个不同的α, β对,使得adp⊕(α, β→γ) = adp⊕(0,γ→γ),并得到了计算adp⊕的递推公式。为了深入了解可能的微分概率范围,我们还研究了其他性质,如adp⊕(0,γ→γ)的最小值,并找到了满足该最小值的所有γ。
{"title":"Maximums of the Additive Differential Probability of Exclusive-Or","authors":"N. Mouha, N. Kolomeec, D. Akhtiamov, I. Sutormin, M. Panferov, Kseniya A. Titova, T. Bonich, E. Ishchukova, N. Tokareva, Bulat Zhantulikov","doi":"10.46586/tosc.v2021.i2.292-313","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.292-313","url":null,"abstract":"At FSE 2004, Lipmaa et al. studied the additive differential probability adp⊕(α, β → γ) of exclusive-or where differences α, β, γ ∈ F2 are expressed using addition modulo 2. This probability is used in the analysis of symmetrickey primitives that combine XOR and modular addition, such as the increasingly popular Addition-Rotation-XOR (ARX) constructions. The focus of this paper is on maximal differentials, which are helpful when constructing differential trails. We provide the missing proof for Theorem 3 of the FSE 2004 paper, which states that maxα,β adp⊕(α, β → γ) = adp⊕(0, γ → γ) for all γ. Furthermore, we prove that there always exist either two or eight distinct pairs α, β such that adp⊕(α, β → γ) = adp⊕(0, γ → γ), and we obtain recurrence formulas for calculating adp⊕. To gain insight into the range of possible differential probabilities, we also study other properties such as the minimum value of adp⊕(0, γ → γ), and we find all γ that satisfy this minimum value.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"16 1","pages":"292-313"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84171241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks 利用Gimli的弱扩散:改进的区分器和预像攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i1.185-216
F. Liu, Takanori Isobe, W. Meier
The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a sparse linear layer (Small-Swap and Big-Swap), which occurs every two rounds. In addition, the round constant addition occurs every four rounds and only one 32-bit word is affected by it. The above two facts have been recently exploited to construct a distinguisher for the full Gimli permutation with time complexity 264. By utilizing a new property of the SP-box, we demonstrate that the time complexity of the full-round distinguisher can be further reduced to 252 while a significant bias still remains. Moreover, for the 18-round Gimli permutation, we could construct a distinguisher even with only 2 queries. Apart from the permutation itself, the weak diffusion can also be utilized to accelerate the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 with a divide-and-conquer method. As a consequence, the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 can reach up to 5 rounds and 9 rounds, respectively. Since Gimli is included in the second round candidates in NIST’s Lightweight Cryptography Standardization process, we expect that our analysis can further advance the understanding of Gimli. To the best of our knowledge, the distinguishing attacks and preimage attacks are the best so far.
在CHES 2017中提出的Gimli排列是为跨平台性能而设计的。实现这一目标的一个主要策略是利用稀疏线性层(Small-Swap和Big-Swap),每两轮发生一次。此外,四舍五入常数每四舍五入一次,只影响一个32位字。最近利用上述两个事实构造了一个时间复杂度为264的全Gimli排列的区分符。通过利用SP-box的一个新性质,我们证明了在仍然存在显著偏差的情况下,全轮区分符的时间复杂度可以进一步降低到252。此外,对于18轮Gimli排列,我们可以构造一个区分符,即使只有2个查询。除了排列本身,弱扩散还可以利用分治法加速对约简的Gimli-Hash和Gimli-XOF-128的预像攻击。因此,对简化的Gimli-Hash和Gimli-XOF-128的预映像攻击可以分别达到5轮和9轮。由于Gimli包含在NIST的轻量级加密标准化过程的第二轮候选中,我们希望我们的分析可以进一步促进对Gimli的理解。据我们所知,区分攻击和预映像攻击是目前为止最好的。
{"title":"Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks","authors":"F. Liu, Takanori Isobe, W. Meier","doi":"10.46586/tosc.v2021.i1.185-216","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i1.185-216","url":null,"abstract":"The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a sparse linear layer (Small-Swap and Big-Swap), which occurs every two rounds. In addition, the round constant addition occurs every four rounds and only one 32-bit word is affected by it. The above two facts have been recently exploited to construct a distinguisher for the full Gimli permutation with time complexity 264. By utilizing a new property of the SP-box, we demonstrate that the time complexity of the full-round distinguisher can be further reduced to 252 while a significant bias still remains. Moreover, for the 18-round Gimli permutation, we could construct a distinguisher even with only 2 queries. Apart from the permutation itself, the weak diffusion can also be utilized to accelerate the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 with a divide-and-conquer method. As a consequence, the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 can reach up to 5 rounds and 9 rounds, respectively. Since Gimli is included in the second round candidates in NIST’s Lightweight Cryptography Standardization process, we expect that our analysis can further advance the understanding of Gimli. To the best of our knowledge, the distinguishing attacks and preimage attacks are the best so far.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"35 1","pages":"185-216"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76339843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer 证明对无限长子空间轨迹的阻力:如何选择线性层
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.46586/tosc.v2021.i2.314-352
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios.For word-oriented partial SPN (P-SPN) schemes with a fixed linear layer, our goal is to better understand how the details of the linear layer affect the security of the construction. In this paper, we derive conditions that allow us to either set up or prevent attacks based on infinitely long truncated differentials with probability 1. Our analysis is rather broad compared to earlier independent work on this problem since we consider (1) both invariant and non-invariant/iterative trails, and (2) trails with and without active S-boxes.For these cases, we provide rigorous sufficient and necessary conditions for the matrix that defines the linear layer to prevent the analyzed attacks. On the practical side, we present a tool that can determine whether a given linear layer is vulnerable based on these results. Furthermore, we propose a sufficient condition for the linear layer that, if satisfied, ensures that no infinitely long truncated differential exists. This condition is related to the degree and the irreducibility of the minimal polynomial of the matrix that defines the linear layer. Besides P-SPN schemes, our observations may also have a crucial impact on the Hades design strategy, which mixes rounds with full S-box layers and rounds with partial S-box layers.
利用非线性部分不覆盖整个状态的替换置换网络(substitutionpermutation network, SPN)方法设计密码排列和分组密码,由于其在各种场景下具有良好的实现特性,近年来受到了人们的关注。对于具有固定线性层的面向字的部分SPN (P-SPN)方案,我们的目标是更好地理解线性层的细节如何影响结构的安全性。在本文中,我们推导了基于概率为1的无限长截断微分的条件,使我们能够建立或防止攻击。与之前在这个问题上的独立工作相比,我们的分析相当广泛,因为我们考虑了(1)不变和非不变/迭代轨迹,以及(2)有和没有活动s盒的轨迹。针对这些情况,我们为定义线性层的矩阵提供了严格的充要条件,以防止所分析的攻击。在实践方面,我们提出了一种工具,可以根据这些结果确定给定的线性层是否易受攻击。进一步,我们给出了线性层的一个充分条件,如果满足,则保证不存在无穷长截断微分。这个条件与定义线性层的矩阵的最小多项式的程度和不可约性有关。除了P-SPN方案外,我们的观察结果也可能对Hades的设计策略产生关键影响,该策略混合了具有完整s盒层的圆形和具有部分s盒层的圆形。
{"title":"Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer","authors":"Lorenzo Grassi, Christian Rechberger, Markus Schofnegger","doi":"10.46586/tosc.v2021.i2.314-352","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.314-352","url":null,"abstract":"Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios.For word-oriented partial SPN (P-SPN) schemes with a fixed linear layer, our goal is to better understand how the details of the linear layer affect the security of the construction. In this paper, we derive conditions that allow us to either set up or prevent attacks based on infinitely long truncated differentials with probability 1. Our analysis is rather broad compared to earlier independent work on this problem since we consider (1) both invariant and non-invariant/iterative trails, and (2) trails with and without active S-boxes.For these cases, we provide rigorous sufficient and necessary conditions for the matrix that defines the linear layer to prevent the analyzed attacks. On the practical side, we present a tool that can determine whether a given linear layer is vulnerable based on these results. Furthermore, we propose a sufficient condition for the linear layer that, if satisfied, ensures that no infinitely long truncated differential exists. This condition is related to the degree and the irreducibility of the minimal polynomial of the matrix that defines the linear layer. Besides P-SPN schemes, our observations may also have a crucial impact on the Hades design strategy, which mixes rounds with full S-box layers and rounds with partial S-box layers.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"14 1","pages":"314-352"},"PeriodicalIF":3.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79575828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
IACR Transactions on Symmetric Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1