首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Scaling analysis of the Telegram Open Network blockchain project Telegram Open Network区块链项目的扩容分析
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.13
V.I. Yukhymenko, O. Fediushyn
Blockchain systems are always distributed but differ greatly in resolutions, sizes, roles, transparency, types of participants, and the way transactions are handled. The decentralized structure offers inalienable security benefits, but with a large number of participants faces the problem of limited scaling. Sharding is suggested to solve this problem. Sharding is a way to divide consensual workload and transactions into several nodes. Effective application of sharding requires a lot of detail and work in terms of architecture and system implementation. As was found in the process of the work, in order to achieve significant results in scaling the blockchain system through sharding, it is necessary that the blockchain project is based on several blockchains simultaneously (i.e. had a multi-blockchain architecture) and provides infrastructure for fast and reliable messaging between them (i.e. strongly interconnected). The Telegram Open Network (TON) and its component TON Blockchain are considered an example of such a project. This work provides a comparative analysis of the most popular blockchain platforms (Bitcoin and Ethereum) with the implementations of TON Blockchain ideas (The Open Network and Everscale) on three parameters: system bandwidth (measured at transactions per second, abbreviated TPS), the average time of a new block’s appearance in the network and projected bandwidth in TPS.
区块链系统始终是分布式的,但在分辨率、规模、角色、透明度、参与者类型和交易处理方式方面存在很大差异。去中心化的结构提供了不可剥夺的安全优势,但由于参与者众多,面临着规模有限的问题。建议使用分片来解决这个问题。分片是一种将双方同意的工作负载和事务划分到多个节点的方法。分片的有效应用需要在架构和系统实现方面进行大量的细节和工作。在工作过程中发现,为了通过分片在扩展区块链系统方面取得显著成果,区块链项目必须同时基于多个区块链(即具有多区块链架构),并为它们之间的快速可靠消息传递提供基础设施(即强互连)。Telegram开放网络(TON)及其组件TON区块链被认为是此类项目的一个例子。这项工作对最流行的区块链平台(比特币和以太坊)与TON区块链理念(开放网络和Everscale)的实现进行了三个参数的比较分析:系统带宽(以每秒交易数衡量,简称TPS),新区块在网络中出现的平均时间和TPS的预计带宽。
{"title":"Scaling analysis of the Telegram Open Network blockchain project","authors":"V.I. Yukhymenko, O. Fediushyn","doi":"10.30837/rt.2022.2.209.13","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.13","url":null,"abstract":"Blockchain systems are always distributed but differ greatly in resolutions, sizes, roles, transparency, types of participants, and the way transactions are handled. The decentralized structure offers inalienable security benefits, but with a large number of participants faces the problem of limited scaling. Sharding is suggested to solve this problem. Sharding is a way to divide consensual workload and transactions into several nodes. Effective application of sharding requires a lot of detail and work in terms of architecture and system implementation. As was found in the process of the work, in order to achieve significant results in scaling the blockchain system through sharding, it is necessary that the blockchain project is based on several blockchains simultaneously (i.e. had a multi-blockchain architecture) and provides infrastructure for fast and reliable messaging between them (i.e. strongly interconnected). The Telegram Open Network (TON) and its component TON Blockchain are considered an example of such a project. \u0000This work provides a comparative analysis of the most popular blockchain platforms (Bitcoin and Ethereum) with the implementations of TON Blockchain ideas (The Open Network and Everscale) on three parameters: system bandwidth (measured at transactions per second, abbreviated TPS), the average time of a new block’s appearance in the network and projected bandwidth in TPS.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89000752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object-oriented model of a formal description of an information and communication system 信息和通信系统的一种形式化描述的面向对象模型
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.11
V.O. Poddubnyi, R.Y. Gvozdov, Оleksand Sievierinov, V. Fedorchenko
The purpose of the article is to study algorithms for the formal description of information and communication systems. The article discusses the main provisions on the formal representation of objects of information and communication systems. It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment. These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text). There is a need for a mechanism for a unified description of a system that includes all environments. Such a description will be unambiguously formalized with well-defined mathematical concepts. The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system. An algorithm for the formal description of the information and communication system is proposed. In this algorithm, it is proposed to focus on the types and interaction of objects with each other. In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object. Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks. Since each element contains fields that connect it to other elements, and each attack has an "entry point" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.
本文的目的是研究信息和通信系统形式化描述的算法。本文讨论了信息通信系统对象形式化表示的主要规定。需要指出的是,对信息通信系统进行形式化描述的主要环境有:物理环境、计算系统环境、用户环境、信息环境。信息和通信系统的这些组成部分将以非正式形式(以文本形式)加以详细考虑、分析和记录。需要一种机制来统一描述包含所有环境的系统。这样的描述将用定义良好的数学概念明确形式化。在信息和通信系统中制定信息安全策略时,单个形式化描述的机制或形式化描述的技术在理解上是明确的,并可作为控制描述。提出了一种信息通信系统形式化描述的算法。在该算法中,重点关注对象的类型和对象之间的相互作用。在这种方案中,注意力集中在对象、对象的特征以及与对象的交互类型等概念上。进一步考虑创建的框图(图形),以探索使用该模型模拟网络攻击的可能性。由于每个元素都包含将其连接到其他元素的字段,并且每次攻击都有一个使用图论的“入口点”,因此可以遍历图以确定网络攻击可能的水平传播路径。
{"title":"Object-oriented model of a formal description of an information and communication system","authors":"V.O. Poddubnyi, R.Y. Gvozdov, Оleksand Sievierinov, V. Fedorchenko","doi":"10.30837/rt.2022.2.209.11","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.11","url":null,"abstract":"The purpose of the article is to study algorithms for the formal description of information and communication systems. The article discusses the main provisions on the formal representation of objects of information and communication systems. It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment. These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text). There is a need for a mechanism for a unified description of a system that includes all environments. Such a description will be unambiguously formalized with well-defined mathematical concepts. The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system. An algorithm for the formal description of the information and communication system is proposed. In this algorithm, it is proposed to focus on the types and interaction of objects with each other. In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object. Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks. Since each element contains fields that connect it to other elements, and each attack has an \"entry point\" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87893419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAINBOW algorithm and its ability to resist RBS attacks and third party channels RAINBOW算法及其抵抗RBS攻击和第三方通道的能力
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.05
D. Harmash
The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.
分析了彩虹后量子加密算法的本质和保护的可能性。研究了基于多维二次变换的算法的主要性质。评估了成功使用基于多维二次变换的算法所需要的资源和计算能量。分析了该算法抵御第三方通道攻击的能力。研究了基于彩虹多元二次变换的密码算法如何成功抵御RBS攻击。详细描述了对基于彩虹多元二次变换的密码算法进行攻击的步骤。对彩虹算法进行了结构分析。对所进行的分析进行了详细的总结。对基于多元二次变换的密码加密算法和电子签名的稳定性和复杂性进行了评价。
{"title":"RAINBOW algorithm and its ability to resist RBS attacks and third party channels","authors":"D. Harmash","doi":"10.30837/rt.2022.2.209.05","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.05","url":null,"abstract":"The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Substantiation of the parameters of the annealing simulation algorithm for searching non-linear substitutions of symmetric ciphers 对称密码非线性替换搜索退火模拟算法参数的证明
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.10
О.О. Kuznetsov, М.О. Poluyanenko, S. Kandiy, Y.O. Lohachova
Cryptographic protection in information and information and communication systems is an important component of cybersecurity. Therefore, the development, research and improvement of means of cryptographic information protection is an urgent and important task. In this paper, we study evolutionary methods for generating non-linear substitutions (S-boxes). These are cryptographic primitives that are an important component of many modern block and stream ciphers with a secret key. However, the problem of generating random highly non-linear substitutions is extremely difficult. In this paper, we study the annealing simulation method. This is an iterative algorithm, the essence of which is the gradual improvement of the current solution (substitution). Special cost functions are used as an improvement criterion. The initial state is formed randomly, and then, at each iteration the current solution is gradually changed. Approaching the target solution means minimizing the cost function. The paper investigates a simple and computationally efficient cost function based on the Walsh-Hadamard transform. Through exploratory research and numerous tests, it was possible to optimize the operation of the annealing simulation algorithm. Optimized algorithm for several parameters (initial temperature, "cooling factor", cost function) allows you to quickly generate highly non-linear bijective substitutions for cryptographic applications. Compared to other well-known implementations of the annealing simulation algorithm, the use of the recommended parameters can significantly reduce the generation time of nonlinear substitutions.
信息和信息通信系统中的密码保护是网络安全的重要组成部分。因此,开发、研究和改进加密信息保护手段是一项紧迫而重要的任务。在本文中,我们研究了生成非线性替换(s -box)的进化方法。这些是加密原语,是许多具有秘密密钥的现代块和流密码的重要组成部分。然而,产生随机的高度非线性的替换问题是非常困难的。在本文中,我们研究了退火模拟方法。这是一种迭代算法,其本质是对当前解逐步改进(代入)。使用特殊的成本函数作为改进准则。初始状态随机形成,然后在每次迭代中逐渐改变当前解。接近目标解意味着最小化成本函数。本文研究了一种基于Walsh-Hadamard变换的简单且计算效率高的代价函数。通过探索性研究和大量的测试,可以优化退火模拟算法的运行。针对几个参数(初始温度,“冷却因子”,成本函数)的优化算法允许您快速生成用于加密应用的高度非线性双目标替换。与其他已知的退火模拟算法实现相比,推荐参数的使用可以显著减少非线性替换的生成时间。
{"title":"Substantiation of the parameters of the annealing simulation algorithm for searching non-linear substitutions of symmetric ciphers","authors":"О.О. Kuznetsov, М.О. Poluyanenko, S. Kandiy, Y.O. Lohachova","doi":"10.30837/rt.2022.2.209.10","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.10","url":null,"abstract":"Cryptographic protection in information and information and communication systems is an important component of cybersecurity. Therefore, the development, research and improvement of means of cryptographic information protection is an urgent and important task. In this paper, we study evolutionary methods for generating non-linear substitutions (S-boxes). These are cryptographic primitives that are an important component of many modern block and stream ciphers with a secret key. However, the problem of generating random highly non-linear substitutions is extremely difficult. In this paper, we study the annealing simulation method. This is an iterative algorithm, the essence of which is the gradual improvement of the current solution (substitution). Special cost functions are used as an improvement criterion. The initial state is formed randomly, and then, at each iteration the current solution is gradually changed. Approaching the target solution means minimizing the cost function. The paper investigates a simple and computationally efficient cost function based on the Walsh-Hadamard transform. Through exploratory research and numerous tests, it was possible to optimize the operation of the annealing simulation algorithm. Optimized algorithm for several parameters (initial temperature, \"cooling factor\", cost function) allows you to quickly generate highly non-linear bijective substitutions for cryptographic applications. Compared to other well-known implementations of the annealing simulation algorithm, the use of the recommended parameters can significantly reduce the generation time of nonlinear substitutions.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84232644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of methods and algorithms for generating key data for FALCON-like electronic signature algorithms falcon类电子签名算法关键数据生成方法与算法分析
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.08
O. Kachko, M. Yesina, K.O. Kuznetsova
At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data being processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. This work is devoted to the analysis of methods and algorithms for generating key data for Falcon-like algorithms of electronic signature. Some of the basic algorithms for Falcon-shaped algorithms of electronic signature are considered, namely the algorithm of key data generation and algorithm of random polynomials f, g generation, which satisfy the Gauss distribution. The Falcon algorithm itself is the finalist of the post-quantum electronic signature contest due to the satisfactory value of the public key and signature lengths, but the key data generation algorithm uses many methods and  difficult to implement. The Falcon authors use this algorithm for polynomials n=512, 1024. To increase the sixth level of cryptostability, this algorithm can be expanded for n=2048. This work is devoted to study the Falcon algorithm, taking into account its expansion for n=512, 1024, 2048 in terms of generating key data. Also, the paper considers the results of justifying the choice of a mathematical apparatus for implementing a software package for generating a key pair of a cryptographic algorithm for an electronic signature in order to create reliable electronic signatures.
目前和将来,标准化的非对称密码转换(如电子签名(ES))的数学方法、机制和算法已经并将用于信息密码保护。电子签名是网络安全的重要组成部分,可以提供所处理信息和数据的完整性、不可抗拒性和真实性等优质信息安全服务。然而,有充分的理由怀疑,在后量子时期,现有的ES标准将被打破和破坏,使用经典和量子密码分析系统与适当的数学,软件和硬件软件。一项分析证实,量子计算机已经被开发、制造和使用。本文主要研究了电子签名类猎鹰算法中关键数据的生成方法和算法。考虑了满足高斯分布的隼形电子签名算法的一些基本算法,即密钥数据生成算法和随机多项式f, g生成算法。Falcon算法本身由于公钥值和签名长度令人满意,成为后量子电子签名大赛的决赛选手,但密钥数据生成算法使用的方法多,实现难度大。Falcon的作者对多项式n=512, 1024使用这种算法。为了提高第六级密码稳定性,可以将该算法扩展到n=2048。本文主要研究Falcon算法,考虑到其在生成关键数据时n=512, 1024, 2048的扩展。此外,本文还考虑了证明选择一种数学装置来实现软件包的结果,该软件包用于生成用于电子签名的加密算法的密钥对,以便创建可靠的电子签名。
{"title":"Analysis of methods and algorithms for generating key data for FALCON-like electronic signature algorithms","authors":"O. Kachko, M. Yesina, K.O. Kuznetsova","doi":"10.30837/rt.2022.2.209.08","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.08","url":null,"abstract":"At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data being processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. This work is devoted to the analysis of methods and algorithms for generating key data for Falcon-like algorithms of electronic signature. Some of the basic algorithms for Falcon-shaped algorithms of electronic signature are considered, namely the algorithm of key data generation and algorithm of random polynomials f, g generation, which satisfy the Gauss distribution. The Falcon algorithm itself is the finalist of the post-quantum electronic signature contest due to the satisfactory value of the public key and signature lengths, but the key data generation algorithm uses many methods and  difficult to implement. The Falcon authors use this algorithm for polynomials n=512, 1024. To increase the sixth level of cryptostability, this algorithm can be expanded for n=2048. This work is devoted to study the Falcon algorithm, taking into account its expansion for n=512, 1024, 2048 in terms of generating key data. Also, the paper considers the results of justifying the choice of a mathematical apparatus for implementing a software package for generating a key pair of a cryptographic algorithm for an electronic signature in order to create reliable electronic signatures.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81612983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of a new cost function for generating random substitutions of symmetric ciphers 生成对称密码随机替换的新代价函数研究
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.07
О.О. Kuznetsov, М.О. Poluyanenko, S. Kandiy, O. Peliukh
Cryptographic transformations with a secret key play an essential role in providing information and cyber security. Block and stream symmetric ciphers are used in various applications both as a separate cryptographic protection mechanism and as part of other applications (pseudo-random sequence generators, hashing algorithms, electronic signature protocols, etc.). Therefore, the design and study of individual components of symmetric ciphers is a relevant and important scientific task. In this paper we consider and investigates iterative algorithms for generating non-linear substitutions (substitutions, S-boxes), which are used in modern block and stream encryption algorithms with a symmetric key. Cryptographic resistance of symmetric ciphers to statistical, differential, linear and other methods of cryptanalysis is provided by the properties of substitutions. In addition, S-boxes must be random from the point of view of the possibility to use algebraic cryptanalysis. Therefore, the task of quickly generating random S-boxes with the desired cryptographic properties is an urgent, but extremely difficult task. For example, the best known generation algorithm requires more than 65 thousand iterations to find a random bijective 8-bit substitution with a non-linearity of 104. In this paper, we study an iterative algorithm for generating substitutions for hill climbing with different cost functions and propose a new cost function, the use of which can significantly reduce the number of search iterations. In particular, the search for a bijective S-box with nonlinearity 104 requires less than 50 thousand iterations.
使用密钥的加密转换在提供信息和网络安全方面起着至关重要的作用。块和流对称密码用于各种应用程序中,既可以作为单独的加密保护机制,也可以作为其他应用程序(伪随机序列生成器,散列算法,电子签名协议等)的一部分。因此,设计和研究对称密码的各个组成部分是一项相关而重要的科学任务。在本文中,我们考虑并研究了用于生成非线性替换(替换,s -box)的迭代算法,这些算法用于现代具有对称密钥的块和流加密算法。对称密码对统计、微分、线性和其他密码分析方法的密码抗性是由替换的性质提供的。此外,从使用代数密码分析的可能性的角度来看,s盒必须是随机的。因此,快速生成具有所需密码属性的随机s盒是一项紧迫但极其困难的任务。例如,最著名的生成算法需要超过65000次迭代才能找到一个非线性为104的随机双射8位替换。本文研究了一种用不同代价函数生成爬坡替换的迭代算法,并提出了一种新的代价函数,该函数的使用可以显著减少搜索迭代次数。特别地,搜索具有非线性的双射s盒需要少于5万次迭代。
{"title":"Study of a new cost function for generating random substitutions of symmetric ciphers","authors":"О.О. Kuznetsov, М.О. Poluyanenko, S. Kandiy, O. Peliukh","doi":"10.30837/rt.2022.2.209.07","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.07","url":null,"abstract":"Cryptographic transformations with a secret key play an essential role in providing information and cyber security. Block and stream symmetric ciphers are used in various applications both as a separate cryptographic protection mechanism and as part of other applications (pseudo-random sequence generators, hashing algorithms, electronic signature protocols, etc.). Therefore, the design and study of individual components of symmetric ciphers is a relevant and important scientific task. In this paper we consider and investigates iterative algorithms for generating non-linear substitutions (substitutions, S-boxes), which are used in modern block and stream encryption algorithms with a symmetric key. Cryptographic resistance of symmetric ciphers to statistical, differential, linear and other methods of cryptanalysis is provided by the properties of substitutions. In addition, S-boxes must be random from the point of view of the possibility to use algebraic cryptanalysis. Therefore, the task of quickly generating random S-boxes with the desired cryptographic properties is an urgent, but extremely difficult task. For example, the best known generation algorithm requires more than 65 thousand iterations to find a random bijective 8-bit substitution with a non-linearity of 104. In this paper, we study an iterative algorithm for generating substitutions for hill climbing with different cost functions and propose a new cost function, the use of which can significantly reduce the number of search iterations. In particular, the search for a bijective S-box with nonlinearity 104 requires less than 50 thousand iterations.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77755935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for estimating statistical characteristics of the pre-stroke warehouse process based on average monthly temperatures analysis 基于月平均温度分析的预冲程仓库过程统计特征估计模型
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.24
V. Tikhonov, V. Kartashov, O.V. Kartashov
The possibilities of an improved autoregression model and an integrated moving average (ARMAS) for the analysis of non-stationary data and the identification of long-term trends in the processes under study are considered. The proposed model can be used to study the observed processes in various areas of human activity: the analysis of the observed trajectories of the movement of aircraft, in particular unmanned aerial vehicles, meteorological processes that reflect the state of the atmosphere. The mathematical apparatus developed in the article was used to analyze changes in the atmospheric temperature time series observed for a long time, the average annual temperatures were estimated, followed by sliding smoothing with a low-frequency filter. It is shown that the removal of the seasonal component in the ARPSS model eliminates or distorts significantly the trend and has little effect on the stationary component of the ARPSS process. The operation of de-trending has little effect on the properties of the seasonal component and the stationary component of the process. To assess the trend, the mean annual temperatures were preliminarily obtained. The use of moving averaging, which removes the seasonal component from the average monthly temperatures, makes it possible to find a weak long-term trend. The results obtained in the work can be used to analyze medium-term and long-term changes in atmospheric phenomena, to refine the results obtained by traditional methods of processing results and methods of mathematical statistics, as well as in other areas of human activity.
考虑了改进的自回归模型和综合移动平均(ARMAS)用于分析非平稳数据和识别所研究过程的长期趋势的可能性。所提出的模型可用于研究在人类活动的各个领域中观测到的过程:分析观测到的飞机运动轨迹,特别是无人驾驶飞行器,反映大气状态的气象过程。利用本文研制的数学装置,对长期观测到的大气温度时间序列变化进行分析,估计出年平均气温,并用低频滤波进行滑动平滑。结果表明,去除ARPSS模式中的季节分量会显著消除或扭曲ARPSS过程的趋势,而对ARPSS过程的平稳分量影响很小。去趋势操作对过程的季节分量和平稳分量的性质影响不大。为了评估这一趋势,初步得到了年平均气温。移动平均的使用,从月平均气温中去除季节性成分,使得发现一个弱的长期趋势成为可能。这项工作所获得的结果可用于分析大气现象的中期和长期变化,改进传统的处理结果方法和数理统计方法所获得的结果,以及用于人类活动的其他领域。
{"title":"Model for estimating statistical characteristics of the pre-stroke warehouse process based on average monthly temperatures analysis","authors":"V. Tikhonov, V. Kartashov, O.V. Kartashov","doi":"10.30837/rt.2022.2.209.24","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.24","url":null,"abstract":"The possibilities of an improved autoregression model and an integrated moving average (ARMAS) for the analysis of non-stationary data and the identification of long-term trends in the processes under study are considered. The proposed model can be used to study the observed processes in various areas of human activity: the analysis of the observed trajectories of the movement of aircraft, in particular unmanned aerial vehicles, meteorological processes that reflect the state of the atmosphere. The mathematical apparatus developed in the article was used to analyze changes in the atmospheric temperature time series observed for a long time, the average annual temperatures were estimated, followed by sliding smoothing with a low-frequency filter. \u0000It is shown that the removal of the seasonal component in the ARPSS model eliminates or distorts significantly the trend and has little effect on the stationary component of the ARPSS process. The operation of de-trending has little effect on the properties of the seasonal component and the stationary component of the process. To assess the trend, the mean annual temperatures were preliminarily obtained. The use of moving averaging, which removes the seasonal component from the average monthly temperatures, makes it possible to find a weak long-term trend. The results obtained in the work can be used to analyze medium-term and long-term changes in atmospheric phenomena, to refine the results obtained by traditional methods of processing results and methods of mathematical statistics, as well as in other areas of human activity.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75701347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling a screw extruder for FFF 3D printing 为FFF 3D打印螺杆挤出机建模
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.21
I. Razumov-Fryziuk, D. Gurin, D.O. Nikitin, R. Strilets, D. Blyzniuk
The article presents the development and modeling of a screw extruder for 3D printers operating on the FFF technology, namely, the Fused Filament Fabrication (“production by fusing threads”). Extruders, usually installed on FFF 3D printers, use a thermoplastic polymer filament as a material. There are two filament standards: 1.75mm and 2.85mm. The minimum cost of such a filament starts from $ 11 per kilogram (ABS plastic 1.75 mm). The cost of more expensive filaments can reach several thousand or even tens of thousands per kilogram (depending on the material, filler, the presence of inhibitors, dyes, etc.). The cost of the material is much higher than granulated primary plastics and even more so recycled materials. In addition, the extruder nozzle diameter is typically limited to 1.2mm for 1.75mm filament. Thus, when printing large products, for which the detail and roughness of vertical surfaces are not so important, increase in the diameter of the extruder nozzle will increase significantly the printing speed due to the increase in the thickness of the print layer and the width of the print line. To produce filament, screw filament extruders are used, which work on the principle of injection molding machines. The authors propose a calculation of the parameters of a screw extruder for an FFF 3D printer, which will directly use granulated primary plastics or crushed plastic recyclables as a material. The use of a screw extruder will reduce the cost of the printed product and increase significantly the diameter of the extruder nozzle, which will significantly reduce the production time for large-sized products. When designing a screw extruder, it is necessary to adhere to two main strategies: minimizing the weight and size parameters of the extruder and ensuring the required linear productivity. On the one hand, the extruder must be as light as possible to be able to increase the printing speed, on the other hand, it must provide the necessary linear performance to be able to extrude plastic at printing speeds. Modeling is made for nozzles with a diameter of 1mm and 5mm. According to the calculation results, the screw extruder has a 3-fold and 37-fold margin of linear productivity, respectively.
本文介绍了在FFF技术上运行的3D打印机的螺杆挤出机的开发和建模,即熔丝制造(“通过熔丝生产”)。挤出机通常安装在FFF 3D打印机上,使用热塑性聚合物长丝作为材料。灯丝标准有1.75mm和2.85mm两种。这种长丝的最低成本从每公斤11美元(ABS塑料1.75毫米)开始。更昂贵的长丝的成本可以达到每公斤几千甚至几万美元(取决于材料、填料、抑制剂、染料等的存在)。这种材料的成本远远高于颗粒状的原生塑料,甚至比再生材料还要高。此外,对于1.75mm长丝,挤出机喷嘴直径通常限制在1.2mm。因此,在打印大型产品时,对于垂直表面的细节和粗糙度不那么重要,由于打印层厚度和打印线宽度的增加,增加挤出机喷嘴的直径将显着提高打印速度。为了生产长丝,使用螺杆长丝挤出机,它的工作原理是注塑机。本文提出了一种用于FFF 3D打印机的螺杆挤出机的参数计算方法,该挤出机将直接使用颗粒状的初级塑料或破碎的可回收塑料作为材料。使用螺杆挤出机将降低印刷产品的成本,并显着增加挤出机喷嘴的直径,这将显着减少大尺寸产品的生产时间。在设计螺杆挤出机时,必须坚持两个主要策略:尽量减少挤出机的重量和尺寸参数,并确保所需的线性生产率。一方面,挤出机必须尽可能轻,以便能够提高印刷速度,另一方面,它必须提供必要的线性性能,以便能够在印刷速度下挤出塑料。对直径为1mm和5mm的喷嘴进行了建模。根据计算结果,螺杆挤出机的线性生产率边际分别为3倍和37倍。
{"title":"Modeling a screw extruder for FFF 3D printing","authors":"I. Razumov-Fryziuk, D. Gurin, D.O. Nikitin, R. Strilets, D. Blyzniuk","doi":"10.30837/rt.2022.2.209.21","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.21","url":null,"abstract":"The article presents the development and modeling of a screw extruder for 3D printers operating on the FFF technology, namely, the Fused Filament Fabrication (“production by fusing threads”). Extruders, usually installed on FFF 3D printers, use a thermoplastic polymer filament as a material. There are two filament standards: 1.75mm and 2.85mm. The minimum cost of such a filament starts from $ 11 per kilogram (ABS plastic 1.75 mm). The cost of more expensive filaments can reach several thousand or even tens of thousands per kilogram (depending on the material, filler, the presence of inhibitors, dyes, etc.). The cost of the material is much higher than granulated primary plastics and even more so recycled materials. In addition, the extruder nozzle diameter is typically limited to 1.2mm for 1.75mm filament. Thus, when printing large products, for which the detail and roughness of vertical surfaces are not so important, increase in the diameter of the extruder nozzle will increase significantly the printing speed due to the increase in the thickness of the print layer and the width of the print line. \u0000To produce filament, screw filament extruders are used, which work on the principle of injection molding machines. The authors propose a calculation of the parameters of a screw extruder for an FFF 3D printer, which will directly use granulated primary plastics or crushed plastic recyclables as a material. The use of a screw extruder will reduce the cost of the printed product and increase significantly the diameter of the extruder nozzle, which will significantly reduce the production time for large-sized products. \u0000When designing a screw extruder, it is necessary to adhere to two main strategies: minimizing the weight and size parameters of the extruder and ensuring the required linear productivity. On the one hand, the extruder must be as light as possible to be able to increase the printing speed, on the other hand, it must provide the necessary linear performance to be able to extrude plastic at printing speeds. Modeling is made for nozzles with a diameter of 1mm and 5mm. According to the calculation results, the screw extruder has a 3-fold and 37-fold margin of linear productivity, respectively.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81438772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the RAINBOW post-quantum electronic signature algorithm state and attacks on it for the period of the NIST PQC third round completion NIST PQC第三轮完成期间RAINBOW后量子电子签名算法状态及攻击分析
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.09
Ye.Yu. Kaptiol
The paper identifies and analyzes attacks aimed at cryptanalysis of the Rainbow post-quantum electronic signature algorithm and the state of this electronic signature within the framework of the NIST PQC competition and as a whole. The Rainbow electronic signature as a candidate in the third round of the NIST PQC was examined in detail for the possibility of cryptanalysis. The possibility to use this quantitative attack on the Rainbow electronic signature and the complexity of such an attack depends on the possibility to use this electronic signature in the post-quantum period. Also during the NIST PQC report on the peculiarities of the adoption of the first post-quantum standards, which took place on March 8-11, 2022, some concerns about the Rainbow's security were mentioned due to the implementation of an attack on one of the parameter sets (although the parameter set of the second round). Some details of this attack were discussed in the paper to understand better the state of the Rainbow's electronic signature at the end of the third round of the NIST PQC.
本文识别并分析了针对彩虹后量子电子签名算法密码分析的攻击,以及NIST PQC竞赛框架内和整体上该电子签名的状态。作为NIST PQC第三轮候选人的彩虹电子签名,详细检查了密码分析的可能性。对彩虹电子签名使用这种定量攻击的可能性和这种攻击的复杂性取决于在后量子时期使用这种电子签名的可能性。同样,在NIST PQC关于采用第一个后量子标准的特殊性的报告中,该报告于2022年3月8日至11日举行,由于对其中一个参数集(尽管是第二轮的参数集)实施攻击,提到了对彩虹安全性的一些担忧。本文讨论了这次攻击的一些细节,以便更好地了解在第三轮NIST PQC结束时彩虹电子签名的状态。
{"title":"Analysis of the RAINBOW post-quantum electronic signature algorithm state and attacks on it for the period of the NIST PQC third round completion","authors":"Ye.Yu. Kaptiol","doi":"10.30837/rt.2022.2.209.09","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.09","url":null,"abstract":"The paper identifies and analyzes attacks aimed at cryptanalysis of the Rainbow post-quantum electronic signature algorithm and the state of this electronic signature within the framework of the NIST PQC competition and as a whole. The Rainbow electronic signature as a candidate in the third round of the NIST PQC was examined in detail for the possibility of cryptanalysis. The possibility to use this quantitative attack on the Rainbow electronic signature and the complexity of such an attack depends on the possibility to use this electronic signature in the post-quantum period. Also during the NIST PQC report on the peculiarities of the adoption of the first post-quantum standards, which took place on March 8-11, 2022, some concerns about the Rainbow's security were mentioned due to the implementation of an attack on one of the parameter sets (although the parameter set of the second round). Some details of this attack were discussed in the paper to understand better the state of the Rainbow's electronic signature at the end of the third round of the NIST PQC.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77479462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The concept of assessing the risks of cybersecurity of the information system of the critical infrastructure object 关键基础设施对象信息系统网络安全风险评估的概念
IF 0.3 Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.12
I. Gorbenko, О.A. Zamula, Yu. S. Osipenko
Ensuring cyber and information security for critical infrastructure is achieved through the implementation of an appropriate set of information security management measures, which can be provided in the form of software policies, methods, procedures, organizational structures and functions. Information security requirements are determined, in particular, by systematic risk assessment of information security, which can be one of the elements of the predicted approach to identifying hazards in the provision of services to service participants in the information interaction of the information system. The paper presents conceptual provisions for assessing and managing cybersecurity risks of the critical infrastructure information system. The proposed concept involves the definition of: areas of security threats to the information system; involved information assets and calculation of their value; assessment of the probability of attacks on the information system; assessment of the probability of success of attacks on the information system and more. Risk assessment methods are proposed that take into account the probability of success of an attack and the probability of an attack occurring, which makes it possible to eliminate the shortcomings inherent in known approaches and provide more accurate identification of attack methods associated with the attacker's behavior. The concept of cybersecurity risk assessment and the methodology for analyzing and assessing security threats that are presented in the work correspond to approaches to building risk-oriented information security management systems and can become the basis for developing an information security system in the information system of a critical infrastructure object.
通过实施一套适当的信息安全管理措施,确保关键基础设施的网络和信息安全,这些措施可以以软件政策、方法、程序、组织结构和功能的形式提供。信息安全需求是通过系统的信息安全风险评估来确定的,这可以是预测方法的一个要素,用于识别在信息系统的信息交互中向服务参与者提供服务时的危害。本文提出了评估和管理关键基础设施信息系统网络安全风险的概念性规定。拟议的概念涉及以下方面的定义:对信息系统构成安全威胁的领域;涉及的信息资产及其价值计算;信息系统遭受攻击的可能性评估;评估信息系统攻击成功的概率等。提出了考虑攻击成功概率和攻击发生概率的风险评估方法,这使得有可能消除已知方法固有的缺点,并提供更准确的识别与攻击者行为相关的攻击方法。工作中提出的网络安全风险评估的概念和分析评估安全威胁的方法与构建面向风险的信息安全管理系统的方法相对应,可以成为关键基础设施对象信息系统中开发信息安全系统的基础。
{"title":"The concept of assessing the risks of cybersecurity of the information system of the critical infrastructure object","authors":"I. Gorbenko, О.A. Zamula, Yu. S. Osipenko","doi":"10.30837/rt.2022.2.209.12","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.12","url":null,"abstract":"Ensuring cyber and information security for critical infrastructure is achieved through the implementation of an appropriate set of information security management measures, which can be provided in the form of software policies, methods, procedures, organizational structures and functions. Information security requirements are determined, in particular, by systematic risk assessment of information security, which can be one of the elements of the predicted approach to identifying hazards in the provision of services to service participants in the information interaction of the information system. The paper presents conceptual provisions for assessing and managing cybersecurity risks of the critical infrastructure information system. The proposed concept involves the definition of: areas of security threats to the information system; involved information assets and calculation of their value; assessment of the probability of attacks on the information system; assessment of the probability of success of attacks on the information system and more. Risk assessment methods are proposed that take into account the probability of success of an attack and the probability of an attack occurring, which makes it possible to eliminate the shortcomings inherent in known approaches and provide more accurate identification of attack methods associated with the attacker's behavior. The concept of cybersecurity risk assessment and the methodology for analyzing and assessing security threats that are presented in the work correspond to approaches to building risk-oriented information security management systems and can become the basis for developing an information security system in the information system of a critical infrastructure object.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89012397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1