首页 > 最新文献

Journal of Cryptographic Engineering最新文献

英文 中文
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case MaskSIMD-lib:基于Ascon-p测试用例的屏蔽软件的通用C优化汇编和宽向量扩展的性能差距
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-29 DOI: 10.1007/s13389-023-00322-4
D. Salomon, I. Levi
{"title":"MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case","authors":"D. Salomon, I. Levi","doi":"10.1007/s13389-023-00322-4","DOIUrl":"https://doi.org/10.1007/s13389-023-00322-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"325 - 342"},"PeriodicalIF":1.9,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46257158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version) 木马唤醒器:使用激光逻辑状态成像检测休眠恶意硬件(扩展版)
4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-29 DOI: 10.1007/s13389-023-00323-3
Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik
Abstract The threat of (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecting dormant HTs with small or zero-overhead triggers and payloads on these platforms is still a challenging task, as the Trojan might not get activated during the chip verification using logical testing or physical measurements. In this work, we present a novel Trojan detection approach based on a technique known from (IC) failure analysis, capable of detecting virtually all classes of dormant Trojans. Using (LLSI), we show how supply voltage modulations can awaken inactive Trojans, making them detectable using laser voltage imaging techniques. Therefore, our technique does not require triggering the Trojan. To support our claims, we present three case studies on 28 nm and 20 nm SRAM- and flash-based (FPGAs). We demonstrate how to detect with high confidence small changes in sequential and combinatorial logic as well as in the routing configuration of FPGAs in a non-invasive manner. Finally, we discuss the practical applicability of our approach on dormant analog Trojans in ASICs.
高频辐射的威胁及其检测是一个被广泛研究的领域。虽然在ASIC中插入木马的工作量相对较高,特别是在信任芯片制造商的情况下,可编程硬件即使在产品已经发货或在使用过程中也容易受到木马插入的攻击。与此同时,在这些平台上检测具有小型或零开销触发器和有效负载的休眠ht仍然是一项具有挑战性的任务,因为在使用逻辑测试或物理测量进行芯片验证期间,木马可能不会被激活。在这项工作中,我们提出了一种新的木马检测方法,该方法基于一种已知的(IC)故障分析技术,能够检测几乎所有类别的休眠木马。使用(LLSI),我们展示了电源电压调制如何唤醒非活动木马,使其使用激光电压成像技术可检测到。因此,我们的技术不需要触发木马。为了支持我们的观点,我们提出了28纳米和20纳米基于SRAM和闪存(fpga)的三个案例研究。我们演示了如何以高置信度检测顺序和组合逻辑中的小变化,以及fpga的路由配置以非侵入性的方式。最后,我们讨论了我们的方法在asic中休眠模拟木马的实际适用性。
{"title":"Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)","authors":"Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik","doi":"10.1007/s13389-023-00323-3","DOIUrl":"https://doi.org/10.1007/s13389-023-00323-3","url":null,"abstract":"Abstract The threat of (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecting dormant HTs with small or zero-overhead triggers and payloads on these platforms is still a challenging task, as the Trojan might not get activated during the chip verification using logical testing or physical measurements. In this work, we present a novel Trojan detection approach based on a technique known from (IC) failure analysis, capable of detecting virtually all classes of dormant Trojans. Using (LLSI), we show how supply voltage modulations can awaken inactive Trojans, making them detectable using laser voltage imaging techniques. Therefore, our technique does not require triggering the Trojan. To support our claims, we present three case studies on 28 nm and 20 nm SRAM- and flash-based (FPGAs). We demonstrate how to detect with high confidence small changes in sequential and combinatorial logic as well as in the routing configuration of FPGAs in a non-invasive manner. Finally, we discuss the practical applicability of our approach on dormant analog Trojans in ASICs.","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135742004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis 无(好)损失无收益:基于深度学习的侧通道分析中损失函数的系统评估
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-28 DOI: 10.1007/s13389-023-00320-6
Maikel Kerkhof, Lichao Wu, Guilherme Perin, S. Picek
{"title":"No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis","authors":"Maikel Kerkhof, Lichao Wu, Guilherme Perin, S. Picek","doi":"10.1007/s13389-023-00320-6","DOIUrl":"https://doi.org/10.1007/s13389-023-00320-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"311 - 324"},"PeriodicalIF":1.9,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48104167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spoofing attacks against vehicular FMCW radar 针对车载FMCW雷达的欺骗攻击
4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-22 DOI: 10.1007/s13389-023-00321-5
Rony Komissarov, Avishai Wool
The safety and security of the passengers in vehicles in the face of cyber attacks is a key concern in the automotive industry, especially with the emergence of the Advanced driver assistance systems and the vast improvement in autonomous vehicles. Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors themselves may present a potential security hazard if exploited by an attacker. In this paper we propose a system to attack an automotive FMCW mmWave radar, that uses fast chirp modulation. Using a single rogue radar, our attack system is capable of spoofing the distance and velocity measured by the victim vehicle simultaneously, presenting phantom measurements coherent with the laws of physics governing vehicle motion. The attacking radar controls the delay in order to spoof its distance, and uses phase compensation and control in order to spoof its velocity. After developing the attack theory, we demonstrate the spoofing attack by building a proof-of-concept hardware-based system, using a Software Defined Radio. We successfully demonstrate two real-world scenarios in which the victim radar is spoofed to detect either a phantom emergency stop or a phantom acceleration, while measuring coherent range and velocity. We also discuss several countermeasures that can mitigate the described attack.
面对网络攻击,车内乘客的安全和保障是汽车行业的一个关键问题,特别是随着高级驾驶辅助系统的出现和自动驾驶汽车的巨大改进。这种平台使用各种传感器,包括摄像头、激光雷达和毫米波雷达。如果被攻击者利用,这些传感器本身可能存在潜在的安全隐患。本文提出了一种基于快速啁啾调制的汽车FMCW毫米波雷达攻击系统。我们的攻击系统使用单一的流氓雷达,能够欺骗受害者车辆同时测量的距离和速度,呈现与控制车辆运动的物理定律一致的虚幻测量值。攻击雷达通过控制时延来欺骗目标的距离,通过相位补偿和控制来欺骗目标的速度。在开发攻击理论之后,我们通过使用软件定义无线电构建基于硬件的概念验证系统来演示欺骗攻击。我们成功地演示了两种现实场景,在测量相干距离和速度的同时,受害者雷达被欺骗来检测幻像紧急停止或幻像加速。我们还讨论了几种可以减轻所描述的攻击的对策。
{"title":"Spoofing attacks against vehicular FMCW radar","authors":"Rony Komissarov, Avishai Wool","doi":"10.1007/s13389-023-00321-5","DOIUrl":"https://doi.org/10.1007/s13389-023-00321-5","url":null,"abstract":"The safety and security of the passengers in vehicles in the face of cyber attacks is a key concern in the automotive industry, especially with the emergence of the Advanced driver assistance systems and the vast improvement in autonomous vehicles. Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors themselves may present a potential security hazard if exploited by an attacker. In this paper we propose a system to attack an automotive FMCW mmWave radar, that uses fast chirp modulation. Using a single rogue radar, our attack system is capable of spoofing the distance and velocity measured by the victim vehicle simultaneously, presenting phantom measurements coherent with the laws of physics governing vehicle motion. The attacking radar controls the delay in order to spoof its distance, and uses phase compensation and control in order to spoof its velocity. After developing the attack theory, we demonstrate the spoofing attack by building a proof-of-concept hardware-based system, using a Software Defined Radio. We successfully demonstrate two real-world scenarios in which the victim radar is spoofed to detect either a phantom emergency stop or a phantom acceleration, while measuring coherent range and velocity. We also discuss several countermeasures that can mitigate the described attack.","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135287981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Attribute-based encryption with enforceable obligations 具有可执行义务的基于属性的加密
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-04-29 DOI: 10.1007/s13389-023-00317-1
Hamed Arshad, Pablo Picazo-Sanchez, Christian Johansen, Gerardo Schneider
{"title":"Attribute-based encryption with enforceable obligations","authors":"Hamed Arshad, Pablo Picazo-Sanchez, Christian Johansen, Gerardo Schneider","doi":"10.1007/s13389-023-00317-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00317-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-29"},"PeriodicalIF":1.9,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41549768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A side-channel attack on a masked and shuffled software implementation of Saber 对Saber的屏蔽和混洗软件实现的侧通道攻击
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-04-25 DOI: 10.1007/s13389-023-00315-3
Kalle Ngo, E. Dubrova, T. Johansson
{"title":"A side-channel attack on a masked and shuffled software implementation of Saber","authors":"Kalle Ngo, E. Dubrova, T. Johansson","doi":"10.1007/s13389-023-00315-3","DOIUrl":"https://doi.org/10.1007/s13389-023-00315-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":"1-18"},"PeriodicalIF":1.9,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48752838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
StringENT test suite: ENT battery revisited for efficient P value computation 严格的测试套件:重新访问ENT电池以进行有效的P值计算
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-04-01 DOI: 10.1007/s13389-023-00313-5
Elena Almaraz Luengo, Bittor Alaña Olivares, L. G. García Villalba, J. Hernandez-Castro, D. Hurley-Smith
{"title":"StringENT test suite: ENT battery revisited for efficient P value computation","authors":"Elena Almaraz Luengo, Bittor Alaña Olivares, L. G. García Villalba, J. Hernandez-Castro, D. Hurley-Smith","doi":"10.1007/s13389-023-00313-5","DOIUrl":"https://doi.org/10.1007/s13389-023-00313-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"235-249"},"PeriodicalIF":1.9,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47796043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel non-profiled side channel attack based on multi-output regression neural network 一种基于多输出回归神经网络的非剖面侧信道攻击方法
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-03-31 DOI: 10.1007/s13389-023-00314-4
Ngoc-Tuan Do, Van‐Phuc Hoang, Van-Sang Doan
{"title":"A novel non-profiled side channel attack based on multi-output regression neural network","authors":"Ngoc-Tuan Do, Van‐Phuc Hoang, Van-Sang Doan","doi":"10.1007/s13389-023-00314-4","DOIUrl":"https://doi.org/10.1007/s13389-023-00314-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48995148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM 采用包括RSM在内的两种掩蔽对策实现针对AES软件的非配置深度学习侧信道攻击的实践方面
4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-03-27 DOI: 10.1007/s13389-023-00312-6
Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino
Abstract Deep-learning side-channel attacks, applying deep neural networks to side-channel attacks, are known that can easily attack some existing side-channel attack countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning side-channel attacks, a new approach that involves applying deep learning to non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons and points of interest for non-profiled deep-learning side-channel attacks using the ANSSI database with a masking countermeasure. The results of investigations indicate that it is better to use a simple network model, apply regularization to prevent over-fitting, and select a wide range of power traces that contain side-channel information as the points of interest. We also implemented AES-128 software implementation protected with the Rotating Sboxes Masking countermeasure, which has never been attacked by non-profiled deep-learning side-channel attacks, on the Xmega128 microcontroller and carried out non-profiled deep-learning side-channel attacks against it. Non-profiled deep-learning side-channel attacks successfully recovered all partial keys while the conventional power analysis could not. The attack results also showed that the least significant bit is the adequate selection for successful non-profiled deep-learning side-channel attacks, but the best labeling method may vary depending on the implementation of the countermeasure algorithm. We conducted two experimental analyses to clarify that deep-learning side-channel attacks learn mask values used in the masking countermeasure. One is the gradient visualization used in previous studies, and the other is a new analysis method using partial removal of power traces.
摘要深度学习侧信道攻击是将深度神经网络应用于侧信道攻击的一种方法,它可以很容易地攻击现有的一些侧信道攻击对策,如掩蔽和随机抖动。虽然已经有很多关于深度学习侧信道攻击的研究,但2018年提出了一种将深度学习应用于非侧信道攻击的新方法。在我们的研究中,我们使用带有掩蔽对策的ANSSI数据库研究了多层感知器的结构和非轮廓深度学习侧信道攻击的兴趣点。研究结果表明,最好使用简单的网络模型,应用正则化以防止过拟合,并选择包含侧信道信息的大范围功率走线作为感兴趣点。我们还在Xmega128微控制器上实现了受旋转Sboxes掩蔽对策保护的AES-128软件实现,该对策从未受到非配置深度学习侧信道攻击的攻击,并对其进行了非配置深度学习侧信道攻击。非轮廓深度学习侧信道攻击成功地恢复了所有部分密钥,而传统的功率分析无法恢复。攻击结果还表明,最小有效位是成功的非轮廓深度学习侧信道攻击的充分选择,但最佳标记方法可能因对策算法的实现而异。我们进行了两个实验分析,以阐明深度学习侧信道攻击学习掩码对策中使用的掩码值。一种是以往研究中使用的梯度可视化方法,另一种是采用部分去除功率走线的新型分析方法。
{"title":"Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM","authors":"Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino","doi":"10.1007/s13389-023-00312-6","DOIUrl":"https://doi.org/10.1007/s13389-023-00312-6","url":null,"abstract":"Abstract Deep-learning side-channel attacks, applying deep neural networks to side-channel attacks, are known that can easily attack some existing side-channel attack countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning side-channel attacks, a new approach that involves applying deep learning to non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons and points of interest for non-profiled deep-learning side-channel attacks using the ANSSI database with a masking countermeasure. The results of investigations indicate that it is better to use a simple network model, apply regularization to prevent over-fitting, and select a wide range of power traces that contain side-channel information as the points of interest. We also implemented AES-128 software implementation protected with the Rotating Sboxes Masking countermeasure, which has never been attacked by non-profiled deep-learning side-channel attacks, on the Xmega128 microcontroller and carried out non-profiled deep-learning side-channel attacks against it. Non-profiled deep-learning side-channel attacks successfully recovered all partial keys while the conventional power analysis could not. The attack results also showed that the least significant bit is the adequate selection for successful non-profiled deep-learning side-channel attacks, but the best labeling method may vary depending on the implementation of the countermeasure algorithm. We conducted two experimental analyses to clarify that deep-learning side-channel attacks learn mask values used in the masking countermeasure. One is the gradient visualization used in previous studies, and the other is a new analysis method using partial removal of power traces.","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135823093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning 针对ARM上ANSSI受保护的AES实现的侧信道分析:多任务学习的端到端攻击
IF 1.9 4区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-03-10 DOI: 10.1007/s13389-023-00311-7
Loïc Masure, Rémi Strullu
{"title":"Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning","authors":"Loïc Masure, Rémi Strullu","doi":"10.1007/s13389-023-00311-7","DOIUrl":"https://doi.org/10.1007/s13389-023-00311-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-19"},"PeriodicalIF":1.9,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42128871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Journal of Cryptographic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1