首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
Density of Metric Small Cancellation in Finitely Presented Groups 有限表示群中度量小消去的密度
Q4 MATHEMATICS Pub Date : 2020-02-18 DOI: 10.46298/jgcc.2020.12.2.6200
A. Bishop, Michal Ferov
Small cancellation groups form an interesting class with many desirableproperties. It is a well-known fact that small cancellation groups are generic;however, all previously known results of their genericity are asymptotic andprovide no information about "small" group presentations. In this note, we giveclosed-form formulas for both lower and upper bounds on the density of smallcancellation presentations, and compare our results with experimental data.Comment: 18 pages, 12 figures
小的抵消群形成了一个有趣的类,具有许多理想的属性。一个众所周知的事实是,小的消去群是泛型的;然而,所有先前已知的关于它们泛型的结果都是渐近的,并且没有提供关于“小”群表示的信息。在本文中,我们给出了小消去表示密度的下界和上界的封闭形式公式,并将我们的结果与实验数据进行了比较。评论:18页,12个数字
{"title":"Density of Metric Small Cancellation in Finitely Presented Groups","authors":"A. Bishop, Michal Ferov","doi":"10.46298/jgcc.2020.12.2.6200","DOIUrl":"https://doi.org/10.46298/jgcc.2020.12.2.6200","url":null,"abstract":"Small cancellation groups form an interesting class with many desirable\u0000properties. It is a well-known fact that small cancellation groups are generic;\u0000however, all previously known results of their genericity are asymptotic and\u0000provide no information about \"small\" group presentations. In this note, we give\u0000closed-form formulas for both lower and upper bounds on the density of small\u0000cancellation presentations, and compare our results with experimental data.\u0000Comment: 18 pages, 12 figures","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89077683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frontmatter
Q4 MATHEMATICS Pub Date : 2019-11-01 DOI: 10.1515/gcc-2019-frontmatter2
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2019-frontmatter2","DOIUrl":"https://doi.org/10.1515/gcc-2019-frontmatter2","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77806776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On group automorphisms in universal algebraic geometry 关于普遍代数几何中的群自同构
Q4 MATHEMATICS Pub Date : 2019-10-24 DOI: 10.1515/gcc-2019-2008
A. Shevlyakov
Abstract In this paper, we study group equations with occurrences of automorphisms. We describe equational domains in this class of equations. Moreover, we solve a number of open problem posed in universal algebraic geometry.
摘要本文研究了一类具有自同构的群方程。我们在这类方程中描述方程定义域。此外,我们还解决了一些通用代数几何中的开放问题。
{"title":"On group automorphisms in universal algebraic geometry","authors":"A. Shevlyakov","doi":"10.1515/gcc-2019-2008","DOIUrl":"https://doi.org/10.1515/gcc-2019-2008","url":null,"abstract":"Abstract In this paper, we study group equations with occurrences of automorphisms. We describe equational domains in this class of equations. Moreover, we solve a number of open problem posed in universal algebraic geometry.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"35 1","pages":"115 - 121"},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90224165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective construction of covers of canonical Hom-diagrams for equations over torsion-free hyperbolic groups 无扭双曲群上方程正则homs图盖的有效构造
Q4 MATHEMATICS Pub Date : 2019-10-16 DOI: 10.1515/gcc-2019-2010
O. Kharlampovich, A. Myasnikov, Alexander Taam
Abstract We show that, given a finitely generated group G as the coordinate group of a finite system of equations over a torsion-free hyperbolic group Γ, there is an algorithm which constructs a cover of a canonical solution diagram. The diagram encodes all homomorphisms from G to Γ as compositions of factorizations through Γ-NTQ groups and canonical automorphisms of the corresponding NTQ-subgroups. We also give another characterization of Γ-limit groups as iterated generalized doubles over Γ.
摘要在无扭双曲群Γ上,给定有限生成群G作为有限方程组的坐标群,证明了存在构造正则解图覆盖的算法。该图将从G到Γ的所有同态编码为通过Γ-NTQ群和相应ntq子群的正则自同态的因数分解的组合。我们还给出了Γ-limit群在Γ上作为迭代广义双精度的另一个表征。
{"title":"Effective construction of covers of canonical Hom-diagrams for equations over torsion-free hyperbolic groups","authors":"O. Kharlampovich, A. Myasnikov, Alexander Taam","doi":"10.1515/gcc-2019-2010","DOIUrl":"https://doi.org/10.1515/gcc-2019-2010","url":null,"abstract":"Abstract We show that, given a finitely generated group G as the coordinate group of a finite system of equations over a torsion-free hyperbolic group Γ, there is an algorithm which constructs a cover of a canonical solution diagram. The diagram encodes all homomorphisms from G to Γ as compositions of factorizations through Γ-NTQ groups and canonical automorphisms of the corresponding NTQ-subgroups. We also give another characterization of Γ-limit groups as iterated generalized doubles over Γ.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"32 1","pages":"83 - 101"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82935143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ramp secret sharing with cheater identification in presence of rushing cheaters 坡道秘密共享与作弊者识别在匆忙的作弊者面前
Q4 MATHEMATICS Pub Date : 2019-10-16 DOI: 10.1515/gcc-2019-2006
Jyotirmoy Pramanik, A. Adhikari
Abstract Secret sharing allows one to share a piece of information among n participants in a way that only qualified subsets of participants can recover the secret whereas others cannot. Some of these participants involved may, however, want to forge their shares of the secret(s) in order to cheat other participants. Various cheater identifiable techniques have been devised in order to identify such cheaters in secret sharing schemes. On the other hand, Ramp secret sharing schemes are a practically efficient variant of usual secret sharing schemes with reduced share size and some loss in security. Ramp secret sharing schemes have many applications in secure information storage, information-theoretic private information retrieval and secret image sharing due to producing relatively smaller shares. However, to the best of our knowledge, there does not exist any cheater identifiable ramp secret sharing scheme. In this paper we define the security model for cheater identifiable ramp secret sharing schemes and provide two constructions for cheater identifiable ramp secret sharing schemes. In addition, the second construction is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round. Also, we do not make any computational assumptions for the cheaters, i.e., cheaters may be equipped with unlimited time and resources, yet, the cheating probability would be bounded above by a very small positive number.
摘要秘密共享允许在n个参与者之间共享一条信息,只有符合条件的参与者子集才能恢复该秘密,而其他参与者则不能。然而,其中一些参与者可能想要伪造他们的秘密份额,以欺骗其他参与者。为了在秘密共享方案中识别这些作弊者,已经设计了各种识别作弊者的技术。另一方面,Ramp秘密共享方案是常规秘密共享方案的一种实际有效的变体,它减小了共享大小,但在安全性上有一定的损失。斜坡秘密共享方案由于产生相对较小的共享,在安全信息存储、信息论私有信息检索和秘密图像共享等方面有着广泛的应用。然而,据我们所知,不存在任何可识别作弊者的斜坡秘密共享方案。本文定义了骗子可识别匝道秘密共享方案的安全模型,并给出了骗子可识别匝道秘密共享方案的两种结构。此外,第二次构建是安全的,防止匆忙的作弊者在观察其他参与者的反应后,在秘密重建期间提交自己的份额。同时,我们没有对作弊者做任何计算上的假设,即作弊者可能拥有无限的时间和资源,但是作弊的概率会被一个非常小的正数所限制。
{"title":"Ramp secret sharing with cheater identification in presence of rushing cheaters","authors":"Jyotirmoy Pramanik, A. Adhikari","doi":"10.1515/gcc-2019-2006","DOIUrl":"https://doi.org/10.1515/gcc-2019-2006","url":null,"abstract":"Abstract Secret sharing allows one to share a piece of information among n participants in a way that only qualified subsets of participants can recover the secret whereas others cannot. Some of these participants involved may, however, want to forge their shares of the secret(s) in order to cheat other participants. Various cheater identifiable techniques have been devised in order to identify such cheaters in secret sharing schemes. On the other hand, Ramp secret sharing schemes are a practically efficient variant of usual secret sharing schemes with reduced share size and some loss in security. Ramp secret sharing schemes have many applications in secure information storage, information-theoretic private information retrieval and secret image sharing due to producing relatively smaller shares. However, to the best of our knowledge, there does not exist any cheater identifiable ramp secret sharing scheme. In this paper we define the security model for cheater identifiable ramp secret sharing schemes and provide two constructions for cheater identifiable ramp secret sharing schemes. In addition, the second construction is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round. Also, we do not make any computational assumptions for the cheaters, i.e., cheaters may be equipped with unlimited time and resources, yet, the cheating probability would be bounded above by a very small positive number.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"79 1","pages":"103 - 113"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Randomized nonlinear software-oriented MDS diffusion layers 随机非线性面向软件的MDS扩散层
Q4 MATHEMATICS Pub Date : 2019-10-15 DOI: 10.1515/gcc-2019-2011
M. R. M. Shamsabad, S. M. Dehnavi, A. M. Rishakani
Abstract MDS diffusion layers are critical components in the design of symmetric ciphers. In this paper, after introducing some new algebraic structures, we provide new MDS matrices over special types of R-modules. With the help of the proposed methodology, we have more flexibility in designing software-oriented diffusion layers. Most notably, we construct randomized and/or nonlinear MDS diffusion layers, based upon the presented theoretical results, and discuss the resistance of the presented diffusion layers against various kinds of cryptanalysis, compared with classical linear diffusion layers.
MDS扩散层是对称密码设计中的关键组成部分。本文在引入一些新的代数结构后,给出了特殊类型r -模上的新的MDS矩阵。在此方法的帮助下,我们在设计面向软件的扩散层时具有更大的灵活性。最值得注意的是,我们基于所提出的理论结果构建了随机化和/或非线性MDS扩散层,并与经典线性扩散层相比,讨论了所提出的扩散层对各种密码分析的抵抗力。
{"title":"Randomized nonlinear software-oriented MDS diffusion layers","authors":"M. R. M. Shamsabad, S. M. Dehnavi, A. M. Rishakani","doi":"10.1515/gcc-2019-2011","DOIUrl":"https://doi.org/10.1515/gcc-2019-2011","url":null,"abstract":"Abstract MDS diffusion layers are critical components in the design of symmetric ciphers. In this paper, after introducing some new algebraic structures, we provide new MDS matrices over special types of R-modules. With the help of the proposed methodology, we have more flexibility in designing software-oriented diffusion layers. Most notably, we construct randomized and/or nonlinear MDS diffusion layers, based upon the presented theoretical results, and discuss the resistance of the presented diffusion layers against various kinds of cryptanalysis, compared with classical linear diffusion layers.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"15 1","pages":"123 - 131"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80403736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption 在一般整数因子分解难解性假设下构造无伪的有限计算群族
Q4 MATHEMATICS Pub Date : 2019-10-15 DOI: 10.1515/gcc-2019-2009
M. Anokhin
Abstract We provide a correct version of Remark 3.5 of the paper mentioned in the title. Also, we fix a typo in Remark 4.4 of that paper.
我们提供了标题中提到的论文的Remark 3.5的正确版本。此外,我们还修正了该论文注释4.4中的一个错别字。
{"title":"Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption","authors":"M. Anokhin","doi":"10.1515/gcc-2019-2009","DOIUrl":"https://doi.org/10.1515/gcc-2019-2009","url":null,"abstract":"Abstract We provide a correct version of Remark 3.5 of the paper mentioned in the title. Also, we fix a typo in Remark 4.4 of that paper.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"11 1","pages":"133 - 134"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75500031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the lattice of subgroups of a free group: complements and rank 自由群的子群的格:补和秩
Q4 MATHEMATICS Pub Date : 2019-05-29 DOI: 10.46298/jgcc.2020.12.1.6059
Jordi Delgado, Pedro V. Silva
A $vee$-complement of a subgroup $H leqslant mathbb{F}_n$ is a subgroup $Kleqslant mathbb{F}_n$ such that $H vee K = mathbb{F}_n$. If we also ask $K$to have trivial intersection with $H$, then we say that $K$ is a$oplus$-complement of $H$. The minimum possible rank of a $vee$-complement(resp. $oplus$-complement) of $H$ is called the $vee$-corank (resp.$oplus$-corank) of $H$. We use Stallings automata to study these notions andthe relations between them. In particular, we characterize when complementsexist, compute the $vee$-corank, and provide language-theoretical descriptionsof the sets of cyclic complements. Finally, we prove that the two notions ofcorank coincide on subgroups that admit cyclic complements of both kinds.Comment: 27 pages, 5 figures
子组$H leqslant mathbb{F}_n$的$vee$ -补码是子组$Kleqslant mathbb{F}_n$,这样$H vee K = mathbb{F}_n$。如果我们还要求$K$与$H$有平凡的交点,那么我们说$K$是$H$的$oplus$ -补。$vee$ -补码的最小可能秩。$H$的$oplus$ -补充)称为$vee$ -corank(参见:$oplus$ -corank)的$H$。我们使用斯托林斯自动机来研究这些概念以及它们之间的关系。特别地,我们描述了何时是互补的,计算了$vee$ - ank,并提供了循环互补集的语言理论描述。最后,我们证明了两个秩的概念在两种循环补的子群上重合。点评:27页,5张图
{"title":"On the lattice of subgroups of a free group: complements and rank","authors":"Jordi Delgado, Pedro V. Silva","doi":"10.46298/jgcc.2020.12.1.6059","DOIUrl":"https://doi.org/10.46298/jgcc.2020.12.1.6059","url":null,"abstract":"A $vee$-complement of a subgroup $H leqslant mathbb{F}_n$ is a subgroup $K\u0000leqslant mathbb{F}_n$ such that $H vee K = mathbb{F}_n$. If we also ask $K$\u0000to have trivial intersection with $H$, then we say that $K$ is a\u0000$oplus$-complement of $H$. The minimum possible rank of a $vee$-complement\u0000(resp. $oplus$-complement) of $H$ is called the $vee$-corank (resp.\u0000$oplus$-corank) of $H$. We use Stallings automata to study these notions and\u0000the relations between them. In particular, we characterize when complements\u0000exist, compute the $vee$-corank, and provide language-theoretical descriptions\u0000of the sets of cyclic complements. Finally, we prove that the two notions of\u0000corank coincide on subgroups that admit cyclic complements of both kinds.\u0000Comment: 27 pages, 5 figures","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84682301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Key agreement based on automaton groups 基于自动化组的密钥协议
Q4 MATHEMATICS Pub Date : 2019-05-08 DOI: 10.1515/gcc-2019-2012
R. Grigorchuk, D. Grigoriev
Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group Aff4⁢(ℤ){mathrm{Aff}_{4}(mathbb{Z})}.
我们提出了几个自动机组作为anshell - anshell - goldfeld密钥协议元方案的平台。它们包括Grigorchuk群和普遍Grigorchuk群、Hanoi 3-towers群、Basilica群和仿射群Aff4¹(0){ mathm {Aff}_{4}(mathbb{Z})}的一个子群。
{"title":"Key agreement based on automaton groups","authors":"R. Grigorchuk, D. Grigoriev","doi":"10.1515/gcc-2019-2012","DOIUrl":"https://doi.org/10.1515/gcc-2019-2012","url":null,"abstract":"Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group Aff4⁢(ℤ){mathrm{Aff}_{4}(mathbb{Z})}.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"100 1","pages":"77 - 81"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80023970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved version of the AAG cryptographic protocol AAG加密协议的改进版本
Q4 MATHEMATICS Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-2003
V. Roman’kov
Abstract An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established. Unlike the original version, that is based on the intractability of the simultaneous conjugacy search problem for the platform group, the proposed version is based on harder simultaneous membership-conjugacy search problems, and the membership problem needs to be solved for a subset of the platform group that can be easily and efficiently built to be very complicated and without any good structure. A number of other hard problems need to be solved first before start solving the simultaneous membership-conjugacy search problem to obtain the exchanged key.
摘要建立了一种改进的AAG (anshell - anshell - goldfeld)代数密码密钥交换方案,该方案具有抗Tsaban线性跨度密码分析的能力。与原始版本不同的是,原始版本是基于平台组的同时共轭搜索问题的难解性,而新版本是基于更难的同时隶属性共轭搜索问题,并且需要解决平台组的一个子集的隶属性问题,该子集可以轻松有效地构建到非常复杂且没有任何良好的结构。在开始解决同时的成员-共轭搜索问题以获得交换密钥之前,需要先解决许多其他难题。
{"title":"An improved version of the AAG cryptographic protocol","authors":"V. Roman’kov","doi":"10.1515/gcc-2019-2003","DOIUrl":"https://doi.org/10.1515/gcc-2019-2003","url":null,"abstract":"Abstract An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established. Unlike the original version, that is based on the intractability of the simultaneous conjugacy search problem for the platform group, the proposed version is based on harder simultaneous membership-conjugacy search problems, and the membership problem needs to be solved for a subset of the platform group that can be easily and efficiently built to be very complicated and without any good structure. A number of other hard problems need to be solved first before start solving the simultaneous membership-conjugacy search problem to obtain the exchanged key.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"116 1","pages":"35 - 41"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76185655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1