首页 > 最新文献

IET Information Security最新文献

英文 中文
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca 基于MILP的AEGIS/Tiaoxin-346/Rocca安全性评价
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-27 DOI: 10.1049/ise2.12109
Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe

In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for the initialisation phase of AEGIS, Tiaoxin-346, and Rocca, the security against differential attacks and integral attacks is evaluated by estimating the lower bounds for the number of active S-boxes and utilising division property, respectively. In addition to the estimations of initialisation phases, the security of the encryption phases of AEGIS, Tiaoxin-346, and Rocca against distinguishing attacks on keystream is evaluated by exploiting integral properties. As a result, the authors show that the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca are secure against differential attacks after 4/3/6, 5, and 6 rounds, respectively. Regarding integral attacks, the distinguisher is found on 6/6/7, 15, and 7 rounds in the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. Additionally, the integral distinguisher is presented on 2/2/4, 4, and 4 rounds in the encryption phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. As far as it is known, this study’s results are the first distinguishing attacks on the keystream on AEGIS, Tiaoxin-346, and Rocca without relying on weak keys.

本文利用混合整数线性规划工具,研究了基于高级加密标准的认证加密方案的安全性,包括AEGIS家族、Tiaoxin-346和Rocca。具体而言,对于AEGIS、Tiaoxin-346和Rocca的初始化阶段,分别通过估计活动S盒数量的下限和利用除法性质来评估对差分攻击和积分攻击的安全性。除了初始化阶段的估计外,还通过利用积分特性评估了AEGIS、Tiaoxin-346和Rocca的加密阶段对密钥流的区别攻击的安全性。因此,作者表明,AEGIS-128/128L/256、Tiaoxin-346和Rocca的初始化阶段分别在4/3/6、5和6轮后对差分攻击是安全的。关于积分攻击,在AEGIS-128/128L/256、Tiaoxin-346和Rocca的初始化阶段,分别在6/6/7、15和7轮中发现了区别。此外,积分鉴别器分别在AEGIS-128/128L/256、Tiaoxin-346和Rocca的加密阶段的2/2/4、4和4轮上给出。据目前所知,本研究的结果是首次在不依赖弱密钥的情况下区分对AEGIS、Tiaoxin-346和Rocca的密钥流的攻击。
{"title":"MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca","authors":"Takuro Shiraya,&nbsp;Nobuyuki Takeuchi,&nbsp;Kosei Sakamoto,&nbsp;Takanori Isobe","doi":"10.1049/ise2.12109","DOIUrl":"https://doi.org/10.1049/ise2.12109","url":null,"abstract":"<p>In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for the initialisation phase of AEGIS, Tiaoxin-346, and Rocca, the security against differential attacks and integral attacks is evaluated by estimating the lower bounds for the number of active S-boxes and utilising division property, respectively. In addition to the estimations of initialisation phases, the security of the encryption phases of AEGIS, Tiaoxin-346, and Rocca against distinguishing attacks on keystream is evaluated by exploiting integral properties. As a result, the authors show that the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca are secure against differential attacks after 4/3/6, 5, and 6 rounds, respectively. Regarding integral attacks, the distinguisher is found on 6/6/7, 15, and 7 rounds in the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. Additionally, the integral distinguisher is presented on 2/2/4, 4, and 4 rounds in the encryption phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. As far as it is known, this study’s results are the first distinguishing attacks on the keystream on AEGIS, Tiaoxin-346, and Rocca without relying on weak keys.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"458-467"},"PeriodicalIF":1.4,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50154900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the security of ‘an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller’ 关于“利用ARM Cortex-M微控制器实现智能电表和邻里网关通信的超轻量级安全方案”的安全性
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-13 DOI: 10.1049/ise2.12108
Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi, Saeed Aghapour

In 2018, Abbasinezhad-Mood and Nikooghadam (IEEE Transaction on Smart Grid, pp 6194–6205, 9(6), 2018) proposed an ultra-lightweight secure scheme for neighbourhood area network (NAN $boldsymbol{N}boldsymbol{A}boldsymbol{N}$) communications in smart grid. They have claimed that their protocol is secure against all known attacks in NAN $boldsymbol{N}boldsymbol{A}boldsymbol{N}$ environment by providing informal security analysis besides a formal analysis which was done by using an automatic verification tool. However, by performing several attacks, this study shows that their scheme has serious security flaws. After performing each attack, lightweight countermeasures is proposed for securing their protocol against that attack.

2018年,Abbasinezhad Mood和Nikooghadam(IEEE智能电网交易,第6194–6205页,9(6),2018)提出了一种用于智能电网中邻域网络(N A N$boldsymbol{N}boldsymbol{A}bold symbol{N}$)通信的超轻量级安全方案。他们声称,他们的协议除了通过使用自动验证工具。然而,通过多次攻击,本研究表明他们的方案存在严重的安全缺陷。在执行每一次攻击之后,都会提出轻量级对策来保护他们的协议免受该攻击。
{"title":"On the security of ‘an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller’","authors":"Sonia Miri,&nbsp;Masoud Kaveh,&nbsp;Hadi Shahriar Shahhoseini,&nbsp;Mohammad Reza Mosavi,&nbsp;Saeed Aghapour","doi":"10.1049/ise2.12108","DOIUrl":"https://doi.org/10.1049/ise2.12108","url":null,"abstract":"<p>In 2018, Abbasinezhad-Mood and Nikooghadam (IEEE Transaction on Smart Grid, pp 6194–6205, 9(6), 2018) proposed an ultra-lightweight secure scheme for neighbourhood area network (<math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>N</mi>\u0000 <mi>A</mi>\u0000 <mi>N</mi>\u0000 </mrow>\u0000 <annotation> $boldsymbol{N}boldsymbol{A}boldsymbol{N}$</annotation>\u0000 </semantics></math>) communications in smart grid. They have claimed that their protocol is secure against all known attacks in <math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>N</mi>\u0000 <mi>A</mi>\u0000 <mi>N</mi>\u0000 </mrow>\u0000 <annotation> $boldsymbol{N}boldsymbol{A}boldsymbol{N}$</annotation>\u0000 </semantics></math> environment by providing informal security analysis besides a formal analysis which was done by using an automatic verification tool. However, by performing several attacks, this study shows that their scheme has serious security flaws. After performing each attack, lightweight countermeasures is proposed for securing their protocol against that attack.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"544-551"},"PeriodicalIF":1.4,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50131207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021) 客座编辑:第24届信息安全与密码学国际会议论文选集(ICISC 2021)
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-13 DOI: 10.1049/ise2.12096
Jong Hwan Park
<p>This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.</p><p>The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).</p><p>Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.</p><p>Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.</p><p>Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the en
洪对GIMLI-HASH的一个回合缩减变体提出了预图像攻击,其中消息吸收阶段使用5回合GIMLI,压缩阶段使用9回合GIMLI。他们将这种变体称为5-9周GIMLI-HASH。他们对5-9周GIMLI-HASH的图像前攻击需要294.44的时间复杂性和297的内存复杂性。此外,该方法可以在压缩阶段达到高达移位10轮的GIMLI。他们的第一次攻击需要内存来存储GIMLI SP盒操作中的几个预计算表。在他们的第二次攻击中,他们采取了时间-内存权衡方法,减少了预计算表的内存需求,但增加了SAT求解器求解SP盒方程的计算时间。该攻击需要266.17内存复杂度和296+ε时间复杂度,其中ε是求解SP盒方程的时间复杂度。他们使用CryptoMiniSat SAT解算器进行的实验表明,ε的最大时间复杂度约为220.57 9轮GIMLI。S.Lim和D.G.Han的论文6研究了ICISC 2020中提出的一种轻量级分组密码PIPO的差分故障攻击。PIPO设计用于在使用侧信道分析对策时提供强大的安全强度,同时具有较小的开销。差分故障攻击是一种侧通道分析,它在密码操作中引发故障,并利用发生的差分信息。他们提出了一种针对PIPO的基于单比特翻转的差分故障攻击,其中,通过64个故障密文,他们提出的攻击恢复PIPO 64/128的正确密钥的概率为98.9%。他们不仅通过模拟,还通过电磁故障注入对拟议的攻击进行了评估。本期特刊的所有论文都表明,在后量子密码学和分组密码安全分析的主题领域,信息安全和密码学有了进一步的改进。特别是,作者的各种实验结果将清楚地向读者展示,与目前与六篇精选论文相关的研究工作相比,他们的结果是多么先进。与此同时,该领域仍有许多挑战需要未来的研究关注,如基于格的密码原语的高效构建、基于格的约简算法的分析,以及针对后量子密码原语及其潜在复杂性假设的更现实的量子攻击。我们希望在不久的将来看到更多关于这些主题的先进研究成果。
{"title":"Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021)","authors":"Jong Hwan Park","doi":"10.1049/ise2.12096","DOIUrl":"https://doi.org/10.1049/ise2.12096","url":null,"abstract":"&lt;p&gt;This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.&lt;/p&gt;&lt;p&gt;The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).&lt;/p&gt;&lt;p&gt;Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.&lt;/p&gt;&lt;p&gt;Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.&lt;/p&gt;&lt;p&gt;Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the en","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 1","pages":"1-2"},"PeriodicalIF":1.4,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders 一种增强的基于深度学习的网络钓鱼检测机制,使用可变自动编码器有效识别恶意URL
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-12 DOI: 10.1049/ise2.12106
Manoj Kumar Prabakaran, Parvathy Meenakshi Sundaram, Abinaya Devi Chandrasekar

Phishing attacks have become one of the powerful sources for cyber criminals to impose various forms of security attacks in which fake website Uniform Resource Locators (URL) are circulated around the Internet community in the form of email, messages etc., in order to deceive users, resulting in the loss of their valuable assets. The phishing URLs are predicted using several blacklist-based traditional phishing website detection techniques. However, numerous phishing websites are frequently constructed and launched on the Internet over time; these blacklist-based traditional methods do not accurately predict most phishing websites. In order to effectively identify malicious URLs, an enhanced deep learning-based phishing detection approach has been proposed by integrating the strength of Variational Autoencoders (VAE) and deep neural networks (DNN). In the proposed framework, the inherent features of a raw URL are automatically extracted by the VAE model by reconstructing the original input URL to enhance phishing URL detection. For experimentation, around 1 lakh URLs were crawled from two publicly available datasets, namely ISCX-URL-2016 dataset and Kaggle dataset. The experimental results suggested that the proposed model has reached a maximum accuracy of 97.45% and exhibits a quicker response time of 1.9 s, which is better when compared to all the other experimented models.

网络钓鱼攻击已成为网络犯罪分子实施各种形式安全攻击的强大来源之一,在这种攻击中,假冒网站统一资源定位器(URL)以电子邮件、消息等形式在互联网社区中传播,以欺骗用户,导致其宝贵资产损失。使用几种基于黑名单的传统钓鱼网站检测技术来预测钓鱼URL。然而,随着时间的推移,许多钓鱼网站经常在互联网上构建和推出;这些基于黑名单的传统方法并不能准确预测大多数钓鱼网站。为了有效识别恶意URL,结合变分自动编码器(VAE)和深度神经网络(DNN)的优势,提出了一种增强的基于深度学习的网络钓鱼检测方法。在所提出的框架中,VAE模型通过重构原始输入URL来自动提取原始URL的固有特征,以增强钓鱼URL检测。为了进行实验,从两个公开可用的数据集(即ISCX-URL-2016数据集和Kaggle数据集)中抓取了大约10万个URL。实验结果表明,所提出的模型达到了97.45%的最大精度,并表现出1.9s的更快响应时间,与所有其他实验模型相比,这是更好的。
{"title":"An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders","authors":"Manoj Kumar Prabakaran,&nbsp;Parvathy Meenakshi Sundaram,&nbsp;Abinaya Devi Chandrasekar","doi":"10.1049/ise2.12106","DOIUrl":"https://doi.org/10.1049/ise2.12106","url":null,"abstract":"<p>Phishing attacks have become one of the powerful sources for cyber criminals to impose various forms of security attacks in which fake website Uniform Resource Locators (URL) are circulated around the Internet community in the form of email, messages etc., in order to deceive users, resulting in the loss of their valuable assets. The phishing URLs are predicted using several blacklist-based traditional phishing website detection techniques. However, numerous phishing websites are frequently constructed and launched on the Internet over time; these blacklist-based traditional methods do not accurately predict most phishing websites. In order to effectively identify malicious URLs, an enhanced deep learning-based phishing detection approach has been proposed by integrating the strength of Variational Autoencoders (VAE) and deep neural networks (DNN). In the proposed framework, the inherent features of a raw URL are automatically extracted by the VAE model by reconstructing the original input URL to enhance phishing URL detection. For experimentation, around 1 lakh URLs were crawled from two publicly available datasets, namely ISCX-URL-2016 dataset and Kaggle dataset. The experimental results suggested that the proposed model has reached a maximum accuracy of 97.45% and exhibits a quicker response time of 1.9 s, which is better when compared to all the other experimented models.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"423-440"},"PeriodicalIF":1.4,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50129855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the performance of non-profiled side channel attacks based on deep learning techniques 基于深度学习技术的非轮廓侧信道攻击性能研究
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-20 DOI: 10.1049/ise2.12102
Ngoc-Tuan Do, Van-Phuc Hoang, Van Sang Doan, Cong-Kha Pham

In modern embedded systems, security issues including side-channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non-profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non-profiled attacks on the AES-128 encryption implementation. Especially, the proposed network is fine-tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC-V microcontroller, and ChipWhisperer boards has achieved a higher performance of non-profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation-based hiding countermeasure.

在现代嵌入式系统中,包括侧信道攻击(SCA)在内的安全问题变得至关重要,因为嵌入式设备在许多类别的消费电子产品中无处不在。最近,深度学习(DL)作为一种新的有前景的方法被引入到有轮廓和无轮廓的SCA中。本文提出并评估了不同DL技术的应用,包括卷积神经网络和多层感知器模型,用于AES-128加密实现中的非轮廓攻击。特别是,所提出的网络通过不同数量的隐藏层、标记技术和激活函数进行了微调。除了设计的模型外,还对所提出的模型进行了数据集重建和标记技术,以解决高维数据和不平衡数据集的问题。因此,基于DL的SCA和我们为ASCAD、RISC-V微控制器和ChipWhisperer板的不同目标重建的数据集实现了更高的非轮廓攻击性能。具体而言,已经进行了必要的调查,以评估所提出的技术对不同SCA对策(如掩蔽和隐藏)的效率。此外,还研究了激活函数对所提出的DL模型的影响。实验结果表明,在对抗基于噪声生成的隐藏对策方面,指数线性单元函数优于校正线性单元。
{"title":"On the performance of non-profiled side channel attacks based on deep learning techniques","authors":"Ngoc-Tuan Do,&nbsp;Van-Phuc Hoang,&nbsp;Van Sang Doan,&nbsp;Cong-Kha Pham","doi":"10.1049/ise2.12102","DOIUrl":"https://doi.org/10.1049/ise2.12102","url":null,"abstract":"<p>In modern embedded systems, security issues including side-channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non-profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non-profiled attacks on the AES-128 encryption implementation. Especially, the proposed network is fine-tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC-V microcontroller, and ChipWhisperer boards has achieved a higher performance of non-profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation-based hiding countermeasure.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"377-393"},"PeriodicalIF":1.4,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC 改进了对回合减少的Deoxys BC的相关调整矩形攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-19 DOI: 10.1049/ise2.12104
Jiamei Liu, Lin Tan, Hong Xu

Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 224 compared with the best previous attack.

Deoxys BC是认证加密(AE)Deoxys家族的内部可调整分组密码,其中Deoxys II是CAESAR竞争组合中“深度防御”用例的主要选择。使用已知的识别器改进了对圆形还原Deoxys BC的相关微调矩形攻击。在董等人提出的新的相关密钥矩形攻击框架下。在EUROCRYPT 2022中,我们提出了三种预计算表,以进一步降低密钥恢复阶段的时间复杂性。在相关的tweakey矩形攻击中,过滤无效的四元组,或者通过查找预先计算的表来获得子密钥候选,而不需要更多的计算。在预编算表技术的基础上,改进了对11轮Deoxy-BC-256、13轮Deoxy BC-384和14轮Deoxi-BC-384的相关调整矩形攻击。此外,与之前的最佳攻击相比,我们将Deoxys AE方案Deoxy-I-256-128上的13轮相关调整矩形攻击的时间复杂度降低了224倍。
{"title":"Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC","authors":"Jiamei Liu,&nbsp;Lin Tan,&nbsp;Hong Xu","doi":"10.1049/ise2.12104","DOIUrl":"https://doi.org/10.1049/ise2.12104","url":null,"abstract":"<p>Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong <i>et al.</i> in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 2<sup>24</sup> compared with the best previous attack.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"407-422"},"PeriodicalIF":1.4,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50137697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems 用代数系统求解降维圆Keccak散列函数的预图像攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-13 DOI: 10.1049/ise2.12103
Junling Pei, Lusheng Chen

In this paper, improved preimage attacks are presented on 3-round Keccak-256 and Keccak-512 and 4-round Keccak-256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3-round Keccak-256 and Keccak-512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4-round Keccak-256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188.

本文基于代数方法,对3轮Keccak-256、Keccak-512和4轮Keccak-256进行了改进的预图像攻击。作者提出了关于Keccak置换分量的一些新性质,重新考虑了现有的预图像攻击,并进一步改进了二次比特的线性化过程以降低复杂性。对于3轮Keccak-256和Keccak-512,优先考虑二次比特的概率更高的值,使得猜测复杂度分别从略高于265和2440降低到264.79和2424。对于4轮Keccak-256的预图像攻击,应用一些节省自由度的策略来求解布尔多元二次系统,并将猜测复杂度从2196降低到2188。
{"title":"Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems","authors":"Junling Pei,&nbsp;Lusheng Chen","doi":"10.1049/ise2.12103","DOIUrl":"https://doi.org/10.1049/ise2.12103","url":null,"abstract":"<p>In this paper, improved preimage attacks are presented on 3-round Keccak-256 and Keccak-512 and 4-round Keccak-256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3-round Keccak-256 and Keccak-512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 2<sup>65</sup> and 2<sup>440</sup> to 2<sup>64.79</sup> and 2<sup>424</sup>, respectively. For preimage attack on 4-round Keccak-256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2<sup>196</sup> to 2<sup>188</sup>.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"394-406"},"PeriodicalIF":1.4,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50131030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lattice-based cryptosystems in standardisation processes: A survey 标准化过程中的基于格的密码系统:综述
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-10 DOI: 10.1049/ise2.12101
Anyu Wang, Dianyan Xiao, Yang Yu

The current widely used public-key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post-quantum alternatives. Due to solid security and desirable performance, lattice-based cryptosystems are viewed as promising candidates in the upcoming standardisation of post-quantum cryptography. This study surveys the lattice-based cryptosystems in the post-quantum standardisation processes including the NIST Post-Quantum Cryptography Standardisation and the Chinese Cryptographic Algorithm Design Competition, from both design and security aspects. We present generic design paradigms of lattice-based schemes and describe several representative proposals and recent progress. We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice-based schemes.

目前广泛使用的公钥密码系统容易受到量子攻击。为了为量子时代的网络安全做好准备,一些项目已经启动,呼吁采用后量子替代方案。由于可靠的安全性和令人满意的性能,基于晶格的密码系统被视为即将到来的后量子密码标准化的有前途的候选者。本研究从设计和安全两个方面调查了后量子标准化过程中的基于晶格的密码系统,包括NIST后量子密码标准化和中国密码算法设计竞赛。我们提出了基于格的方案的通用设计范式,并描述了几个有代表性的建议和最新进展。我们还回顾了一些主要的密码分析结果和估计基于格的方案的具体安全性的方法。
{"title":"Lattice-based cryptosystems in standardisation processes: A survey","authors":"Anyu Wang,&nbsp;Dianyan Xiao,&nbsp;Yang Yu","doi":"10.1049/ise2.12101","DOIUrl":"https://doi.org/10.1049/ise2.12101","url":null,"abstract":"<p>The current widely used public-key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post-quantum alternatives. Due to solid security and desirable performance, lattice-based cryptosystems are viewed as promising candidates in the upcoming standardisation of post-quantum cryptography. This study surveys the lattice-based cryptosystems in the post-quantum standardisation processes including the NIST Post-Quantum Cryptography Standardisation and the Chinese Cryptographic Algorithm Design Competition, from both design and security aspects. We present generic design paradigms of lattice-based schemes and describe several representative proposals and recent progress. We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice-based schemes.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"227-243"},"PeriodicalIF":1.4,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50146109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack MF-RF:一种基于多特征和随机森林算法的改进共谋利益泛滥攻击检测方法
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-28 DOI: 10.1049/ise2.12100
Meng Yue, Silin Peng, Wenzhi Feng

A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I-CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. Finally, the Random Forest model is designed to detect the I-CIFA attack. To evaluate the performance of the approach, extensive experiments are conducted in ndnSIM platform. Test results show that the proposed detection approach outperforms other existing approaches with a detection rate of 98.1%, error rate of 1.9%, and false positive rate of 1.5%.

一种新型的共谋利益淹没攻击(CIFA),即改进的共谋利益泛滥攻击(I-CIFA)。它源于命名数据网络中具有更强的隐蔽性、更高的攻击效果、更低的攻击成本和更宽的攻击范围的CIFA。为了检测这种攻击,本研究探索了新的检测特征,并建立了一个具有不同粒度的攻击特征样本集,因此,使用Pearson系数来验证所提出的特征与网络状态之间的相关性。最后,设计了随机森林模型来检测I-CIFA攻击。为了评估该方法的性能,在ndnSIM平台上进行了大量的实验。测试结果表明,所提出的检测方法优于其他现有方法,检测率为98.1%,错误率为1.9%,假阳性率为1.5%。
{"title":"MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack","authors":"Meng Yue,&nbsp;Silin Peng,&nbsp;Wenzhi Feng","doi":"10.1049/ise2.12100","DOIUrl":"https://doi.org/10.1049/ise2.12100","url":null,"abstract":"<p>A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I-CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. Finally, the Random Forest model is designed to detect the I-CIFA attack. To evaluate the performance of the approach, extensive experiments are conducted in ndnSIM platform. Test results show that the proposed detection approach outperforms other existing approaches with a detection rate of 98.1%, error rate of 1.9%, and false positive rate of 1.5%.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"360-376"},"PeriodicalIF":1.4,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50124187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional differential analysis on the KATAN ciphers based on deep learning 基于深度学习的KATAN密码的条件差分分析
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-19 DOI: 10.1049/ise2.12099
Dongdong Lin, Manman Li, Zezhou Hou, Shaozhen Chen

KATAN ciphers are block ciphers using non-linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. Multi-differential neural distinguishers are built to improve the accuracy of the neural distinguishers and increase the number of its rounds. Moreover, a conditional differential analysis framework is proposed based on deep learning with the multi-differential neural distinguishers, resulting in a significant improvement than the previous. We present a practical key recovery attack on the 97-round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82-round KATAN48 and 70-round KATAN64 are also presented as the best known practical results.

KATAN密码是使用非线性反馈移位寄存器的分组密码。在这项研究中,作者利用深度学习改进了KATAN的条件微分分析结果。建立了多差分神经分类器,提高了神经分类器的精度,增加了其轮数。此外,提出了一种基于深度学习的条件微分分析框架,该框架与多微分神经分类器相结合,比以前有了显著的改进。我们对97轮KATAN32提出了一种实用的密钥恢复攻击,数据复杂度为215.5,时间复杂度为220.5。82发KATAN48和70发KATAN64的攻击也被认为是最著名的实际结果。
{"title":"Conditional differential analysis on the KATAN ciphers based on deep learning","authors":"Dongdong Lin,&nbsp;Manman Li,&nbsp;Zezhou Hou,&nbsp;Shaozhen Chen","doi":"10.1049/ise2.12099","DOIUrl":"https://doi.org/10.1049/ise2.12099","url":null,"abstract":"<p>KATAN ciphers are block ciphers using non-linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. Multi-differential neural distinguishers are built to improve the accuracy of the neural distinguishers and increase the number of its rounds. Moreover, a conditional differential analysis framework is proposed based on deep learning with the multi-differential neural distinguishers, resulting in a significant improvement than the previous. We present a practical key recovery attack on the 97-round KATAN32 with 2<sup>15.5</sup> data complexity and 2<sup>20.5</sup> time complexity. The attack of the 82-round KATAN48 and 70-round KATAN64 are also presented as the best known practical results.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"347-359"},"PeriodicalIF":1.4,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1