首页 > 最新文献

Cryptologia最新文献

英文 中文
Review of The Puzzle Master by Danielle TrussoniTrussoni, Danielle. 2023. The Puzzle Master . New York, NY: Random House. https://www.randomhousebooks.com/. 362 pages, ISBN 978-0-593-59529-9. $22.95 《The Puzzle Master》作者:Danielle trussoni拼图大师。纽约:兰登书屋。https://www.randomhousebooks.com/。362页,ISBN 978-0-593-59529-9。22.95美元
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-19 DOI: 10.1080/01611194.2023.2267562
John F. Dooley
"Review of The Puzzle Master by Danielle Trussoni." Cryptologia, ahead-of-print(ahead-of-print), pp. 1–2 Notes1 https://en.wikipedia.org/wiki/Kabbalah2 https://en.wikipedia.org/wiki/Sefirot; see also http://www.maqom.com/journal/paper14.pdf for a fuller discussion of the Sefirot3 https://en.wikipedia.org/wiki/Joseph_ben_Abraham_Gikatilla4 https://en.wikipedia.org/wiki/Abraham_AbulafiaAdditional informationNotes on contributorsJohn F. DooleyJohn F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College, Galesburg, Illinois. His research interests are in the history of cryptology, computer security, cryptology in fiction, software development in small groups, and computer science education. His latest book is The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology published by Springer.
“对Danielle Trussoni的《The Puzzle Master》的评论。”Cryptologia,印前(印前),1-2页Notes1 https://en.wikipedia.org/wiki/Kabbalah2 https://en.wikipedia.org/wiki/Sefirot;也请参阅http://www.maqom.com/journal/paper14.pdf获得关于Sefirot3的更全面的讨论https://en.wikipedia.org/wiki/Joseph_ben_Abraham_Gikatilla4 https://en.wikipedia.org/wiki/Abraham_AbulafiaAdditional信息贡献者说明john F. Dooley john F. Dooley是伊利诺斯州盖尔斯堡诺克斯学院的William and Marilyn Ingersoll计算机科学荣誉教授。他的研究兴趣包括密码学的历史、计算机安全、小说中的密码学、小团体中的软件开发和计算机科学教育。他的最新著作是《赌徒和学者:赫伯特·亚德利、威廉和伊丽莎白·弗里德曼,以及现代美国密码学的诞生》,由斯普林格出版社出版。
{"title":"Review of <i>The Puzzle Master</i> by Danielle TrussoniTrussoni, Danielle. 2023. <i>The Puzzle Master</i> . New York, NY: Random House. https://www.randomhousebooks.com/. 362 pages, ISBN 978-0-593-59529-9. $22.95","authors":"John F. Dooley","doi":"10.1080/01611194.2023.2267562","DOIUrl":"https://doi.org/10.1080/01611194.2023.2267562","url":null,"abstract":"\"Review of The Puzzle Master by Danielle Trussoni.\" Cryptologia, ahead-of-print(ahead-of-print), pp. 1–2 Notes1 https://en.wikipedia.org/wiki/Kabbalah2 https://en.wikipedia.org/wiki/Sefirot; see also http://www.maqom.com/journal/paper14.pdf for a fuller discussion of the Sefirot3 https://en.wikipedia.org/wiki/Joseph_ben_Abraham_Gikatilla4 https://en.wikipedia.org/wiki/Abraham_AbulafiaAdditional informationNotes on contributorsJohn F. DooleyJohn F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College, Galesburg, Illinois. His research interests are in the history of cryptology, computer security, cryptology in fiction, software development in small groups, and computer science education. His latest book is The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology published by Springer.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why the French military cryptanalysis failed to break Enigma 为什么法国军方的密码分析无法破解恩尼格玛密码
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-19 DOI: 10.1080/01611194.2023.2261121
Jean-Charles Foucrier
AbstractIn July 1939, when the French military discovered the possibility of breaking Enigma thanks to revelations from the Polish Cipher Service, it came as a complete surprise. Although the French secret services had known about the German machine for almost ten years, the military cryptologists based in Paris had quickly concluded that it was impossible to break it. Only the forced exile of Polish mathematicians in France after the 1939 campaign enabled the French to decipher Enigma from January 1940 until the June defeat. While the story of the Polish and British cryptological successes is now well known through academic and mainstream literature, the French failure has received virtually no attention until now. Using unpublished archives held at the Defense Historical Service in Vincennes, this study analyzes the reasons for this fiasco and paints a picture of French military cryptanalysis in the 1930s, quite different from the past success of French codebreakers in the First World War.Keywords: EnigmaFrench cryptanalysisWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 De Lastours (Citation1998, 212).2 Kahn (Citation1996), Ollier (2004), Forcade (Citation2008).3 Some very short indications are given by Widman & Wik (Citation2021, 31), Canuel (Citation2013) and Faligot (Citation2001).4 Ribadeau-Dumas (Citation1975, 24).5 Service Historique de la Défense [Defense Historical Service – DHS], Vincennes, France.6 DHS, 1937, Feuille de renseignements concernant le Capitaine Braquenié (DHS).7 DHS, 1913, Relevé de notes (DHS).8 DHS, 1912, Feuillet individuel de campagne (DHS).9 DHS, no date, Relevé des notes (DHS).10 DHS, 1930, Feuillet individuel de campagne (DHS).11 Bertrand (DHS, 10).12 Bertrand (DHS, 147).13 DHS, 1936, Feuillet du personnel (DHS).14 Forcade (Citation2008, 179–180).15 Paillole (Citation2013, 130–140).16 Durand-Richard and Guillot (Citation2014, 160).17 Ribadeau-Dumas (Citation1975, 26–27).18 Rivet (Citation2010, 99).19 DHS, 1932, Résumé des notes antérieures à l’année 1932 (DHS).20 DHS, 1932, Feuillet du personnel (DHS).21 DHS, 1931, Feuillet individuel de campagne (DHS).22 DHS, 1933, Feuillet individuel de campagne (DHS).23 DHS, 1936, Feuillet individuel de campagne (DHS).24 DHS, 1921, Diplôme d’ingénieur des Travaux publics (DHS).25 DHS, 1937, Feuille de renseignements concernant le capitaine Henri Braquenié (DHS).26 DHS, 1937, Copie des notes inscrites au feuillet du personnel du capitaine de réserve Braquenié (DHS).27 DHS, 1936, Relevé des notes du capitaine Braquenié Henri (DHS).28 Kozaczuk (Citation1989, 328).29 DHS, 1938, Bulletin individuel de notes (DHS).30 Bertrand (DHS, 151).31 DHS, 1938, Bulletin de décès (DHS).32 Rivet (Citation2010, 198).33 DHS, no date, Fiche biographique du général de brigade Joubert des Ouches (DHS).34 DHS, 1935, Relevé des notes (DHS).35 DHS, no date, Fiche biographique du général de brigade Joubert des Ouches (DHS).36 DHS, 1909, Feuille de n
1939年7月,当法国军方在波兰密码服务部门的启示下发现破解恩尼格玛的可能性时,这完全是一个惊喜。尽管法国情报部门在近十年前就知道了德国机器的存在,但驻扎在巴黎的军事密码学家很快得出结论,认为不可能破解它。1939年战役后,波兰数学家被迫流亡法国,法国才得以从1940年1月破译谜机,直到6月战败。虽然波兰和英国的密码学成功的故事现在已经通过学术和主流文学众所周知,但法国的失败直到现在几乎没有受到关注。利用文森斯国防历史服务中心未发表的档案,本研究分析了这次惨败的原因,并描绘了20世纪30年代法国军事密码分析的图景,这与法国在第一次世界大战中取得的成功有很大不同。关键词:enig法语密码分析二战披露声明作者未报告潜在的利益冲突。注1 . De Lastours (Citation1998, 2122 . Kahn (Citation1996), Ollier (2004), Forcade (Citation2008)Widman & Wik (Citation2021, 31)、Canuel (Citation2013)和Faligot (Citation2001)给出了一些非常简短的指示李伯多-杜马(引文,1975,24). 47 .国防史学[国防史学-美国国土安全部],文森,法国。6 .美国国土安全部,1937,关于布雷克尼上尉(美国国土安全部)的调查8 .国土安全部,1913,相关注释(国土安全部)9 .美国国土安全部,1912年,美国国土安全部(DHS)国土安全部,无日期,相关文件(DHS)11 .美国国土安全部,1930,美国国土安全部(DHS)伯特兰(国土安全部,10).12伯特兰(国土安全部,147).13美国国土安全部,1936年,人事费(DHS)[j] .林业科学(英文版),2008,179-180[j] .中国农业科学(自然科学版),2013,30 - 40[17]杜兰德-理查德与吉洛[j]利巴多-杜马(Citation1975, 26-27).18铆钉(Citation2010, 99).1920 .美国国土安全部,1932,ransamsum<s:1> des notes antsamrieures <s:1> l ' annacei 1932 (DHS)国土安全部,1932年,人力资源管理(DHS)22 .国土安全部,1931,《人口与健康》(DHS)23 .国土安全部,1933,《个人与运动》(DHS)24 .国土安全部,1936,《战争的个体》(DHS)25 .国土安全部,1921,Diplôme公共卫生组织(国土安全部)26 .国土安全部,1937,关于亨利·布拉克尼上尉的辞职(国土安全部)27 .国土安全部,1937,《国土安全部备忘录》,第27页28 .国土安全部,1936,《有关布雷克尼·亨利上尉的记录》(国土安全部)科扎祖克(引文,1989,328).29国土安全部,1938,《个人公报》,第30页[3] [j]32 .国土安全部,1938年,《通讯》(DHS)铆钉(Citation2010, 198).33国土安全部,没有日期,菲切·朱伯特·德·奥什旅的个人履历(国土安全部)国土安全部,1935,《相关文献》,第35页国土安全部,没有日期,菲切·朱伯特·德·奥什旅的个人履历(国土安全部)37 .国土安全部,1909,《注释》(国土安全部)美国国土安全部,1940年,美国国土安全部(DHS)国土安全部(DHS), 1938年,人事管理(DHS)[j] .科学通报(英文版)41 .国土安全部,1938,路易斯·里维致斯图尔特·孟席斯的信,1938年12月14日(国土安全部)伯特兰(引文,1973,57).42美国国土安全部,1949年,贡献:<s:1> <s:1> <s:1> <s:1> <s:1> <s:1> <s:1> <s:1>机械通讯通讯<e:1>“谜机”(Wehrmacht型),编号:S.R. de l ' emma。(1931-1942) (DHS, 151-152)。43 .在他1973年出版的回忆录中,贝特朗只提到了一位法国“专家”,删去了“Cne b”的提法,这可能是为了不让仍然健在、完全不为人所知的布拉克涅涅尔(braqueni<s:1>)知道Batey (Citation2019, 70), Turing (30,152).44图灵(2022,152).45伯特兰(引文,1973,58).46[4][参考文献]Rejewski (Citation2011, 66), Kozaczuk and Straszak (Citation2004, 236).48[j] .科学通报(英文版)国土安全部,1939,《航空部通报》(DHS).50国土安全部,1939,《人事管理条例副本》(DHS)。51同上。52卫生与社会服务部,1999,“个人的运动”,“运动”科扎祖克(引文1989,318).54[j] .中国科学院学报(自然科学版),2016,31 (5)《路易斯·里韦致阿拉斯泰尔·丹尼斯顿的信》,1939年11月8日(美国国土安全部)国土安全部,阿拉斯泰尔·丹尼斯顿给路易斯·里维的信,1939年11月11日(国土安全部)。57Kapera (citation, 2015, 106).58科扎祖克(引文,1989,320).59出处同上(322).60出处同上(321)点国土安全部,1940,人事管理条例副本,(国土安全部).62同上。63国土安全部,1949,《研究和改进有关运动技术的研究(1930-1942)》(国土安全部,40).64国土安全部,1940年8月20日,Louis Rivet上校(国土安全部)[6][中国科学:自然科学版]67 .国土安全部,1945,与亨利·布拉克尼上尉有关的辞职通知(国土安全部)[j] .中国科学(自然科学版),2011,63-67国土安全部,1949,《研究和改进有关运动技术的研究(1930-1942)》(国土安全部,46).69出处同上(41)2同上。71美国国土安全部,1945,有关亨利·布雷格尼上尉的退伍军人(国土安全部)。72同上。73 Kozaczuk (Citation1989, 323).74同前。
{"title":"Why the French military cryptanalysis failed to break Enigma","authors":"Jean-Charles Foucrier","doi":"10.1080/01611194.2023.2261121","DOIUrl":"https://doi.org/10.1080/01611194.2023.2261121","url":null,"abstract":"AbstractIn July 1939, when the French military discovered the possibility of breaking Enigma thanks to revelations from the Polish Cipher Service, it came as a complete surprise. Although the French secret services had known about the German machine for almost ten years, the military cryptologists based in Paris had quickly concluded that it was impossible to break it. Only the forced exile of Polish mathematicians in France after the 1939 campaign enabled the French to decipher Enigma from January 1940 until the June defeat. While the story of the Polish and British cryptological successes is now well known through academic and mainstream literature, the French failure has received virtually no attention until now. Using unpublished archives held at the Defense Historical Service in Vincennes, this study analyzes the reasons for this fiasco and paints a picture of French military cryptanalysis in the 1930s, quite different from the past success of French codebreakers in the First World War.Keywords: EnigmaFrench cryptanalysisWorld War II Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 De Lastours (Citation1998, 212).2 Kahn (Citation1996), Ollier (2004), Forcade (Citation2008).3 Some very short indications are given by Widman & Wik (Citation2021, 31), Canuel (Citation2013) and Faligot (Citation2001).4 Ribadeau-Dumas (Citation1975, 24).5 Service Historique de la Défense [Defense Historical Service – DHS], Vincennes, France.6 DHS, 1937, Feuille de renseignements concernant le Capitaine Braquenié (DHS).7 DHS, 1913, Relevé de notes (DHS).8 DHS, 1912, Feuillet individuel de campagne (DHS).9 DHS, no date, Relevé des notes (DHS).10 DHS, 1930, Feuillet individuel de campagne (DHS).11 Bertrand (DHS, 10).12 Bertrand (DHS, 147).13 DHS, 1936, Feuillet du personnel (DHS).14 Forcade (Citation2008, 179–180).15 Paillole (Citation2013, 130–140).16 Durand-Richard and Guillot (Citation2014, 160).17 Ribadeau-Dumas (Citation1975, 26–27).18 Rivet (Citation2010, 99).19 DHS, 1932, Résumé des notes antérieures à l’année 1932 (DHS).20 DHS, 1932, Feuillet du personnel (DHS).21 DHS, 1931, Feuillet individuel de campagne (DHS).22 DHS, 1933, Feuillet individuel de campagne (DHS).23 DHS, 1936, Feuillet individuel de campagne (DHS).24 DHS, 1921, Diplôme d’ingénieur des Travaux publics (DHS).25 DHS, 1937, Feuille de renseignements concernant le capitaine Henri Braquenié (DHS).26 DHS, 1937, Copie des notes inscrites au feuillet du personnel du capitaine de réserve Braquenié (DHS).27 DHS, 1936, Relevé des notes du capitaine Braquenié Henri (DHS).28 Kozaczuk (Citation1989, 328).29 DHS, 1938, Bulletin individuel de notes (DHS).30 Bertrand (DHS, 151).31 DHS, 1938, Bulletin de décès (DHS).32 Rivet (Citation2010, 198).33 DHS, no date, Fiche biographique du général de brigade Joubert des Ouches (DHS).34 DHS, 1935, Relevé des notes (DHS).35 DHS, no date, Fiche biographique du général de brigade Joubert des Ouches (DHS).36 DHS, 1909, Feuille de n","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"191 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135729855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí ChionnaChionna, Jackie Uí. Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker . Headline Publishing Group, London, 2023. 418 pages, Hardcover, £25.00. ISBN978-1-4722-9547-7. 《密码女王:英国最伟大的女性密码破译者艾米丽·安德森的秘密生活》作者:Jackie Uí ChionnaChionna, Jackie Uí。密码女王:英国最伟大的女性密码破译者艾米丽·安德森的秘密生活。标题出版集团,伦敦,2023。418页,精装版,25英镑。isbn978 - 1 - 4722 - 9547 - 7。
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-14 DOI: 10.1080/01611194.2023.2248141
Chris Christensen
Click to increase image sizeClick to decrease image size Notes1 Chionna comments on page 61 that Hay, who was passed over (in favor of Alastair Denniston) to be the head of the Government Code and Cypher School after the war, destroyed most of the records of MI1(b). She calls Hay’s decision “at best vindictive and at worst an act of archival vandalism of the most reprehensible kind.” Chionna notes that an album called “The Cork Street Book” that was compiled after the war by Hay’s staff as a memento and is now held at the University of Aberdeen is a resource for the history of MI1(b). (57)Additional informationNotes on contributorsChris ChristensenChris Christensen teaches cryptology and mathematics at Northern Kentucky University. One of his cryptologic interests is World War II Japanese ciphers.
注1 Chionna在第61页评论说,海在战后被(支持阿拉斯泰尔·丹尼斯顿)取代为政府密码和密码学校的负责人,他销毁了军情一处的大部分记录(b)。她称海伊的决定“往好里说是报复,往坏里说是最应受谴责的档案破坏行为”。Chionna指出,海的工作人员在战后编撰的一本名为《科克街书》(The Cork Street Book)的纪念册是军情一处(b)历史的重要资料,目前收藏在阿伯丁大学。(57)其他信息贡献者备注克里斯·克里斯滕森克里斯·克里斯滕森在北肯塔基大学教授密码学和数学。他的密码学兴趣之一是二战时期的日本密码。
{"title":"Review of <i>Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker</i> by Jackie Uí ChionnaChionna, Jackie Uí. <i>Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker</i> . Headline Publishing Group, London, 2023. 418 pages, Hardcover, £25.00. ISBN978-1-4722-9547-7.","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2248141","DOIUrl":"https://doi.org/10.1080/01611194.2023.2248141","url":null,"abstract":"Click to increase image sizeClick to decrease image size Notes1 Chionna comments on page 61 that Hay, who was passed over (in favor of Alastair Denniston) to be the head of the Government Code and Cypher School after the war, destroyed most of the records of MI1(b). She calls Hay’s decision “at best vindictive and at worst an act of archival vandalism of the most reprehensible kind.” Chionna notes that an album called “The Cork Street Book” that was compiled after the war by Hay’s staff as a memento and is now held at the University of Aberdeen is a resource for the history of MI1(b). (57)Additional informationNotes on contributorsChris ChristensenChris Christensen teaches cryptology and mathematics at Northern Kentucky University. One of his cryptologic interests is World War II Japanese ciphers.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II Leo Marks的“一次性密码簿”:二战期间英国特种作战的一种实验性密码
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-11 DOI: 10.1080/01611194.2023.2259376
Thomas Larsen
AbstractDuring World War II, Leo Marks designed ciphers for the British Special Operations Executive (SOE). Tasked with ensuring that SOE undercover agents could encrypt radio transmissions from Nazi-occupied Europe to British headquarters, Marks introduced one-time pad ciphers with random keys printed on materials like paper and silk. However, carrying such materials was risky for agents. In an attempt to mitigate this risk, Marks experimented with a system he called the “Mental One-Time Pad” (MOP) cipher. Contrary to its name, the MOP cipher was not a genuine one-time pad system, but rather used double columnar transposition with memorized texts to create unique substitution keys. In this article, we’ll explore the design, vulnerabilities, and historical significance of the MOP cipher, and discuss potential improvements from US Army cryptographer William Friedman.Keywords: Leo Marksmental one-time pad (MOP)transposition-substitution ciphersWilliam FriedmanWorld War II ciphers Disclosure statementNo potential conflict of interest was reported by the authors.Additional informationNotes on contributorsThomas LarsenThomas Larsen is an Australian data scientist in the commercial sector as well as in critical care research at the University of Melbourne and Monash University. He specializes in accurate and interpretable (A+I) machine learning techniques including symbolic regression.
摘要第二次世界大战期间,Leo Marks为英国特种作战署(SOE)设计了密码。马克斯的任务是确保SOE卧底特工能够加密从纳粹占领的欧洲到英国总部的无线电传输,他引入了一次性的pad密码,将随机密钥打印在纸和丝绸等材料上。然而,携带这些材料对特工来说是有风险的。为了降低这种风险,马克斯试验了一种他称之为“心智一次性密码”(MOP)的密码系统。与它的名字相反,MOP密码不是一个真正的一次性输入系统,而是使用双列换位和记忆文本来创建唯一的替换密钥。在本文中,我们将探讨MOP密码的设计、漏洞和历史意义,并讨论美国陆军密码学家William Friedman的潜在改进。关键词:Leo Marksmental一次性垫(MOP)换位替换密码william friedman二战密码披露声明作者未报告潜在的利益冲突。thomas Larsen是澳大利亚商业领域的数据科学家,同时在墨尔本大学和莫纳什大学从事重症监护研究。他擅长于精确和可解释(A+I)的机器学习技术,包括符号回归。
{"title":"Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II","authors":"Thomas Larsen","doi":"10.1080/01611194.2023.2259376","DOIUrl":"https://doi.org/10.1080/01611194.2023.2259376","url":null,"abstract":"AbstractDuring World War II, Leo Marks designed ciphers for the British Special Operations Executive (SOE). Tasked with ensuring that SOE undercover agents could encrypt radio transmissions from Nazi-occupied Europe to British headquarters, Marks introduced one-time pad ciphers with random keys printed on materials like paper and silk. However, carrying such materials was risky for agents. In an attempt to mitigate this risk, Marks experimented with a system he called the “Mental One-Time Pad” (MOP) cipher. Contrary to its name, the MOP cipher was not a genuine one-time pad system, but rather used double columnar transposition with memorized texts to create unique substitution keys. In this article, we’ll explore the design, vulnerabilities, and historical significance of the MOP cipher, and discuss potential improvements from US Army cryptographer William Friedman.Keywords: Leo Marksmental one-time pad (MOP)transposition-substitution ciphersWilliam FriedmanWorld War II ciphers Disclosure statementNo potential conflict of interest was reported by the authors.Additional informationNotes on contributorsThomas LarsenThomas Larsen is an Australian data scientist in the commercial sector as well as in critical care research at the University of Melbourne and Monash University. He specializes in accurate and interpretable (A+I) machine learning techniques including symbolic regression.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136210928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing Gawłowski, Robert. The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing , Yorkshire, England: Pen and Sword Books. 2023. 186 + ix pages, Hardcover, £20.00. ISBN 9781399069106. 回顾第一个Enigma密码破译者:Marian Rejewski将接力棒传给Alan Turing的不为人知的故事Gawłowski, Robert。第一个Enigma密码破解者:Marian Rejewski将接力棒传给Alan Turing的不为人知的故事,约克郡,英格兰:笔与剑书。2023。186 + 9页,精装版,20.00英镑。ISBN 9781399069106。
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-11 DOI: 10.1080/01611194.2023.2246470
Chris Christensen
Click to increase image sizeClick to decrease image size Notes1 Wyższa Szkoła Bankowa: “banking college.”2 A particularly striking translation occurs on page 161 where Rejewski is described as having had an “epileptic fit.”3 Stefan Mazurkiewicz (1888–1945) was a well-known Polish mathematician. Along with two other well-known Polish mathematicians, Warcław Sierpiński and Stanisław Leśniewski, he served as a codebreaker for the Polish Cipher Bureau during the Polish-Soviet War (1919–1921).4 Bertrand (1896–1976) was a French intelligence officer. He obtained Enigma documents from Hans-Thilo Schmidt, an employee of the German cipher bureau, and he passed those documents to the Polish Cipher Bureau. Those documents played a critical role in Rejewski’s determining of the wiring of the Enigma rotors. Bertrand assisted the Polish codebreakers during their time in France.5 Langer (1894–1948) was chief of the Polish Cipher Bureau.6 The Knowlton Award mentioned on pages 167 and 168 is not, as stated, an award given by the National Security Agency, but it is an award given by the Military Intelligence Corps Association. However, Rejewski (along with Alan Turing) was inducted into the NSA Cryptologic Hall of Honor in 2014.Additional informationNotes on contributorsChris ChristensenChris Christensen teaches cryptology and mathematics at Northern Kentucky University. He had the privilege to have been a participant in the 2014 ceremony in Warsaw at which the work of the three Polish codebreakers was honored by the Institute for Electrical and Electronics Engineers with the awarding of a Milestone Award.
点击增大图片尺寸点击减小图片尺寸Notes1 Wyższa Szkoła Bankowa:“银行学院。2在161页有一个特别引人注目的翻译,Rejewski被描述为“癫痫发作”。Stefan Mazurkiewicz(1888-1945)是一位著名的波兰数学家。在波苏战争(1919-1921)期间,他与另外两位著名的波兰数学家Warcław Sierpiński和Stanisław Leśniewski一起担任波兰密码局的密码破译员贝特朗(1896-1976)是一名法国情报官员。他从德国密码局的雇员汉斯-蒂洛·施密特(Hans-Thilo Schmidt)那里获得了Enigma的文件,并将这些文件转交给了波兰密码局。这些文件对雷耶夫斯基确定谜机转子的布线起了关键作用。5兰格(1894-1948)是波兰密码局局长。6 167页和168页提到的诺尔顿奖,如上面所说,不是由国家安全局颁发的,而是由军事情报团协会颁发的。然而,2014年,雷杰维斯基(和艾伦·图灵一起)入选了美国国家安全局密码荣誉堂。克里斯·克里斯滕森(chris Christensen)在北肯塔基大学教授密码学和数学。2014年,他有幸参加了在华沙举行的仪式,电气和电子工程师协会为三位波兰密码破译人员的工作颁发了里程碑奖。
{"title":"Review of <i>The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing</i> Gawłowski, Robert. <i>The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing</i> , Yorkshire, England: Pen and Sword Books. 2023. 186 + ix pages, Hardcover, £20.00. ISBN 9781399069106.","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2246470","DOIUrl":"https://doi.org/10.1080/01611194.2023.2246470","url":null,"abstract":"Click to increase image sizeClick to decrease image size Notes1 Wyższa Szkoła Bankowa: “banking college.”2 A particularly striking translation occurs on page 161 where Rejewski is described as having had an “epileptic fit.”3 Stefan Mazurkiewicz (1888–1945) was a well-known Polish mathematician. Along with two other well-known Polish mathematicians, Warcław Sierpiński and Stanisław Leśniewski, he served as a codebreaker for the Polish Cipher Bureau during the Polish-Soviet War (1919–1921).4 Bertrand (1896–1976) was a French intelligence officer. He obtained Enigma documents from Hans-Thilo Schmidt, an employee of the German cipher bureau, and he passed those documents to the Polish Cipher Bureau. Those documents played a critical role in Rejewski’s determining of the wiring of the Enigma rotors. Bertrand assisted the Polish codebreakers during their time in France.5 Langer (1894–1948) was chief of the Polish Cipher Bureau.6 The Knowlton Award mentioned on pages 167 and 168 is not, as stated, an award given by the National Security Agency, but it is an award given by the Military Intelligence Corps Association. However, Rejewski (along with Alan Turing) was inducted into the NSA Cryptologic Hall of Honor in 2014.Additional informationNotes on contributorsChris ChristensenChris Christensen teaches cryptology and mathematics at Northern Kentucky University. He had the privilege to have been a participant in the 2014 ceremony in Warsaw at which the work of the three Polish codebreakers was honored by the Institute for Electrical and Electronics Engineers with the awarding of a Milestone Award.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136209419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition ”Bauer, Craig P. Secret History: The Story of Cryptology. Second Edition . CRC Press, Boca Raton, FL, 2021. 650 pages, Hardcover. ISBN 978-1138061231. 回顾第二版克雷格鲍尔的“秘密历史:密码学的故事,第二版”鲍尔,克雷格P.秘密历史:密码学的故事。第二版。CRC出版社,博卡拉顿,佛罗里达州,2021。650页,精装版。ISBN 978 - 1138061231。
4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-28 DOI: 10.1080/01611194.2023.2257696
Elonka Dunin, Klaus Schmeh
Click to increase image sizeClick to decrease image size Disclosure statementNo potential conflict of interest was reported by the author(s)Additional informationNotes on contributorsElonka DuninElonka Dunin has co-authored the book Codebreaking: A Practical Guide (U.S. version published in 2023) together with Klaus Schmeh. She is considered an authority on classical ciphers, and is co-founder and co-leader of a group of cryptographers who are working hard to crack the final cipher on the famous Kryptos sculpture at CIA Headquarters. She maintains a list of the World’s most famous unsolved codes on her elonka.com site, and also published The Mammoth Book of Secret Codes and Cryptograms. Bestselling author Dan Brown named one of the characters in his The Da Vinci Code sequel, The Lost Symbol, after her. “Nola Kaye” is an anagrammed form of “Elonka.” She was a member of the Board of Directors for the National Cryptologic Foundation from 2012 to 2022, and is a lifetime member of the International Game Developers Association. Currently living in the Washington, D.C. area, she works as a management consultant. As a public speaker, Elonka regularly gives talks on her favorite subjects: Games, Wikipedia, cryptography, medieval history, Agile development, and geocaching.Klaus SchmehKlaus Schmeh has co-authored the book Codebreaking: A Practical Guide (U.S. version published in 2023) together with Elonka Dunin. He has written 15 other books (mainly in German) about cryptology, as well as over 250 articles, 25 scientific articles, and 1,500 blog posts, which probably makes him the most-published cryptology author in the world. He is also a member of the editorial board of Cryptologia. Klaus’s main fields of interest are codebreaking and the history of encryption. Klaus is a popular speaker, known for his entertaining presentation style involving self-drawn cartoons and Lego models. He has lectured at hundreds of conferences, including the NSA Cryptologic History Symposium, HistoCrypt, the Charlotte International Cryptologic Symposium, and the RSA Conference in San Francisco. In his day job, Klaus works for the Digital Identity branch of the French company, Eviden.
点击增大图片尺寸点击减小图片尺寸披露声明作者未报告潜在的利益冲突附加信息撰稿人selonka Dunin elonka Dunin与Klaus Schmeh共同撰写了《密码破译:实用指南》(美国版于2023年出版)一书。她被认为是经典密码方面的权威,也是一群密码学家的联合创始人和联合领导人,他们正在努力破解中央情报局总部著名的氪星雕像上的最后一个密码。她在她的elonka.com网站上保留了一份世界上最著名的未解密码清单,并出版了《密码和密码大全》。畅销书作家丹·布朗在他的《达芬奇密码》续集《失落的符号》中以她的名字命名了一个角色。"诺拉·凯"是"伊隆卡"的拼字形式从2012年到2022年,她是国家密码基金会的董事会成员,也是国际游戏开发者协会的终身成员。她目前居住在华盛顿特区,是一名管理顾问。作为一名公众演说家,Elonka经常就她最喜欢的主题发表演讲:游戏、维基百科、密码学、中世纪历史、敏捷开发和地理教学。Klaus SchmehKlaus Schmeh与Elonka Dunin合著了《密码破译:实用指南》(美国版于2023年出版)一书。他写了15本关于密码学的书(主要是德语),以及250多篇文章,25篇科学文章和1500篇博客文章,这可能使他成为世界上发表最多的密码学作者。他也是Cryptologia编辑委员会的成员。克劳斯的主要兴趣领域是密码破译和加密的历史。克劳斯是一位受欢迎的演讲者,他以自画漫画和乐高模型等有趣的演讲风格而闻名。他曾在数百个会议上发表演讲,包括NSA密码学历史研讨会、histrypt、夏洛特国际密码学研讨会和旧金山的RSA会议。在日常工作中,克劳斯为法国公司Eviden的数字身份部门工作。
{"title":"Review of the second edition of Craig Bauer’s “ <i>Secret History: The Story of Cryptology, Second Edition</i> ”Bauer, Craig P. <i>Secret History: The Story of Cryptology. Second Edition</i> . CRC Press, Boca Raton, FL, 2021. 650 pages, Hardcover. ISBN 978-1138061231.","authors":"Elonka Dunin, Klaus Schmeh","doi":"10.1080/01611194.2023.2257696","DOIUrl":"https://doi.org/10.1080/01611194.2023.2257696","url":null,"abstract":"Click to increase image sizeClick to decrease image size Disclosure statementNo potential conflict of interest was reported by the author(s)Additional informationNotes on contributorsElonka DuninElonka Dunin has co-authored the book Codebreaking: A Practical Guide (U.S. version published in 2023) together with Klaus Schmeh. She is considered an authority on classical ciphers, and is co-founder and co-leader of a group of cryptographers who are working hard to crack the final cipher on the famous Kryptos sculpture at CIA Headquarters. She maintains a list of the World’s most famous unsolved codes on her elonka.com site, and also published The Mammoth Book of Secret Codes and Cryptograms. Bestselling author Dan Brown named one of the characters in his The Da Vinci Code sequel, The Lost Symbol, after her. “Nola Kaye” is an anagrammed form of “Elonka.” She was a member of the Board of Directors for the National Cryptologic Foundation from 2012 to 2022, and is a lifetime member of the International Game Developers Association. Currently living in the Washington, D.C. area, she works as a management consultant. As a public speaker, Elonka regularly gives talks on her favorite subjects: Games, Wikipedia, cryptography, medieval history, Agile development, and geocaching.Klaus SchmehKlaus Schmeh has co-authored the book Codebreaking: A Practical Guide (U.S. version published in 2023) together with Elonka Dunin. He has written 15 other books (mainly in German) about cryptology, as well as over 250 articles, 25 scientific articles, and 1,500 blog posts, which probably makes him the most-published cryptology author in the world. He is also a member of the editorial board of Cryptologia. Klaus’s main fields of interest are codebreaking and the history of encryption. Klaus is a popular speaker, known for his entertaining presentation style involving self-drawn cartoons and Lego models. He has lectured at hundreds of conferences, including the NSA Cryptologic History Symposium, HistoCrypt, the Charlotte International Cryptologic Symposium, and the RSA Conference in San Francisco. In his day job, Klaus works for the Digital Identity branch of the French company, Eviden.","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135425241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg 乔尔·格林伯格对布莱切利公园密码破译者的评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-08-24 DOI: 10.1080/01611194.2023.2246460
Chris Christensen
{"title":"Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2246460","DOIUrl":"https://doi.org/10.1080/01611194.2023.2246460","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43297126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ultra-lightweight block cipher with string transformations 一种具有字符串转换的超轻量级分组密码
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-08-24 DOI: 10.1080/01611194.2023.2224107
Dimpy Chauhan, Indivar Gupta, P. Mishra, Rashmi Verma
{"title":"An ultra-lightweight block cipher with string transformations","authors":"Dimpy Chauhan, Indivar Gupta, P. Mishra, Rashmi Verma","doi":"10.1080/01611194.2023.2224107","DOIUrl":"https://doi.org/10.1080/01611194.2023.2224107","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47779467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty Webb 贝蒂·韦伯的《不再有秘密:我在布莱切利公园和五角大楼的密码破译中的角色》评论
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-08-21 DOI: 10.1080/01611194.2023.2246466
Chris Christensen
{"title":"Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty Webb","authors":"Chris Christensen","doi":"10.1080/01611194.2023.2246466","DOIUrl":"https://doi.org/10.1080/01611194.2023.2246466","url":null,"abstract":"","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41994528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking the Silk Dress cryptogram 破解丝绸礼服密码
IF 0.6 4区 工程技术 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-08-06 DOI: 10.1080/01611194.2023.2223562
Wa-shing. Chan
A solution to the “Silk Dress cryptogram” is presented. The cryptogram was found to be a telegraphic code used for transmitting weather observations by the U.S. Army Signal Service (Signal Corps) and later by the U
提出了“丝绸连衣裙密码”的解决方案。该密码被发现是美国陆军通信服务局(Signal Corps)和后来的美国
{"title":"Breaking the Silk Dress cryptogram","authors":"Wa-shing. Chan","doi":"10.1080/01611194.2023.2223562","DOIUrl":"https://doi.org/10.1080/01611194.2023.2223562","url":null,"abstract":"A solution to the “Silk Dress cryptogram” is presented. The cryptogram was found to be a telegraphic code used for transmitting weather observations by the U.S. Army Signal Service (Signal Corps) and later by the U","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47409277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptologia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1