Cryptanalysis of ForkAES View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2019-05-29

AUTHORS

Subhadeep Banik , Jannis Bossert , Amit Jana , Eik List , Stefan Lucks , Willi Meier , Mostafizar Rahman , Dhiman Saha , Yu Sasaki

ABSTRACT

Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryption and authentication of small messages. They fork the middle state of a cipher and encrypt it twice under two smaller independent permutations. Thus, forkciphers produce two output blocks in one primitive call.Andreeva et al. proposed ForkAES, a tweakable AES-based forkcipher that splits the state after five out of ten rounds. While their authenticated encrypted schemes were accompanied by proofs, the security discussion for ForkAES was not provided, and founded on existing results on the AES and KIASU-BC. Forkciphers provide a unique interface called reconstruction queries that use one ciphertext block as input and compute the respective other ciphertext block. Thus, they deserve a careful security analysis.This work fosters the understanding of the security of ForkAES with three contributions: (1) We observe that security in reconstruction queries differs strongly from the existing results on the AES. This allows to attack nine out of ten rounds with differential, impossible-differential and yoyo attacks. (2) We observe that some forkcipher modes may lack the interface of reconstruction queries, so that attackers must use encryption queries. We show that nine rounds can still be attacked with rectangle and impossible-differential attacks. (3) We present forgery attacks on the AE modes proposed by Andreeva et al. with nine-round ForkAES. More... »

PAGES

43-63

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-21568-2_3

DOI

http://dx.doi.org/10.1007/978-3-030-21568-2_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1115954859


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "EPFL, Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5333.6", 
          "name": [
            "EPFL, Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Banik", 
        "givenName": "Subhadeep", 
        "id": "sg:person.010614556552.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010614556552.79"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany", 
          "id": "http://www.grid.ac/institutes/grid.41315.32", 
          "name": [
            "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bossert", 
        "givenName": "Jannis", 
        "id": "sg:person.010177473713.45", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010177473713.45"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "CSRU, Indian Statistical Institute, Kolkata, India", 
          "id": "http://www.grid.ac/institutes/grid.39953.35", 
          "name": [
            "CSRU, Indian Statistical Institute, Kolkata, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jana", 
        "givenName": "Amit", 
        "id": "sg:person.015235130673.96", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015235130673.96"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany", 
          "id": "http://www.grid.ac/institutes/grid.41315.32", 
          "name": [
            "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "List", 
        "givenName": "Eik", 
        "id": "sg:person.012346753655.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012346753655.92"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany", 
          "id": "http://www.grid.ac/institutes/grid.41315.32", 
          "name": [
            "Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lucks", 
        "givenName": "Stefan", 
        "id": "sg:person.013144334255.93", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144334255.93"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "CSRU, Indian Statistical Institute, Kolkata, India", 
          "id": "http://www.grid.ac/institutes/grid.39953.35", 
          "name": [
            "CSRU, Indian Statistical Institute, Kolkata, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rahman", 
        "givenName": "Mostafizar", 
        "id": "sg:person.013454005377.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013454005377.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IIT Bhilai, Raipur, India", 
          "id": "http://www.grid.ac/institutes/grid.494637.b", 
          "name": [
            "IIT Bhilai, Raipur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Saha", 
        "givenName": "Dhiman", 
        "id": "sg:person.012266711264.41", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012266711264.41"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "NTT Secure Platform Laboratories, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sasaki", 
        "givenName": "Yu", 
        "id": "sg:person.014072424160.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-05-29", 
    "datePublishedReg": "2019-05-29", 
    "description": "Forkciphers are a new kind of primitive proposed recently by Andreeva et al.\u00a0for efficient encryption and authentication of small messages. They fork the middle state of a cipher and encrypt it twice under two smaller independent permutations. Thus, forkciphers produce two output blocks in one primitive call.Andreeva et al.\u00a0proposed ForkAES, a tweakable AES-based forkcipher that splits the state after five out of ten rounds. While their authenticated encrypted schemes were accompanied by proofs, the security discussion for ForkAES was not provided, and founded on existing results on the AES and KIASU-BC. Forkciphers provide a unique interface called reconstruction queries that use one ciphertext block as input and compute the respective other ciphertext block. Thus, they deserve a careful security analysis.This work fosters the understanding of the security of ForkAES with three contributions: (1) We observe that security in reconstruction queries differs strongly from the existing results on the AES. This allows to attack nine out of ten rounds with differential, impossible-differential and yoyo attacks. (2) We observe that some forkcipher modes may lack the interface of reconstruction queries, so that attackers must use encryption queries. We show that nine rounds can still be attacked with rectangle and impossible-differential attacks. (3) We present forgery attacks on the AE modes proposed by Andreeva et al.\u00a0with nine-round ForkAES.", 
    "editor": [
      {
        "familyName": "Deng", 
        "givenName": "Robert H.", 
        "type": "Person"
      }, 
      {
        "familyName": "Gauthier-Uma\u00f1a", 
        "givenName": "Val\u00e9rie", 
        "type": "Person"
      }, 
      {
        "familyName": "Ochoa", 
        "givenName": "Mart\u00edn", 
        "type": "Person"
      }, 
      {
        "familyName": "Yung", 
        "givenName": "Moti", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-21568-2_3", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-21567-5", 
        "978-3-030-21568-2"
      ], 
      "name": "Applied Cryptography and Network Security", 
      "type": "Book"
    }, 
    "keywords": [
      "ciphertext blocks", 
      "careful security analysis", 
      "Andreeva et al", 
      "efficient encryption", 
      "security analysis", 
      "small messages", 
      "encryption queries", 
      "forgery attack", 
      "security discussion", 
      "queries", 
      "primitive call", 
      "AE modes", 
      "independent permutations", 
      "unique interface", 
      "output block", 
      "security", 
      "attacks", 
      "Kiasu-BC", 
      "AES", 
      "impossible differential attack", 
      "encryption", 
      "authentication", 
      "attacker", 
      "primitives", 
      "new kind", 
      "cipher", 
      "cryptanalysis", 
      "interface", 
      "messages", 
      "block", 
      "scheme", 
      "rectangle", 
      "permutations", 
      "rounds", 
      "input", 
      "proof", 
      "calls", 
      "kind", 
      "et al", 
      "work", 
      "state", 
      "results", 
      "mode", 
      "contribution", 
      "discussion", 
      "middle state", 
      "analysis", 
      "understanding", 
      "al", 
      "Forkciphers", 
      "smaller independent permutations", 
      "ForkAES", 
      "tweakable AES", 
      "reconstruction queries", 
      "security of ForkAES", 
      "yoyo attacks", 
      "forkcipher modes", 
      "nine-round ForkAES", 
      "Cryptanalysis of ForkAES"
    ], 
    "name": "Cryptanalysis of ForkAES", 
    "pagination": "43-63", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1115954859"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-21568-2_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-21568-2_3", 
      "https://app.dimensions.ai/details/publication/pub.1115954859"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:26", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_454.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-21568-2_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-21568-2_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-21568-2_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-21568-2_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-21568-2_3'


 

This table displays all metadata directly associated to this object as RDF triples.

205 TRIPLES      23 PREDICATES      83 URIs      76 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-21568-2_3 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N6e81421fd9ae4d7aa859e28685e54c4d
4 schema:datePublished 2019-05-29
5 schema:datePublishedReg 2019-05-29
6 schema:description Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryption and authentication of small messages. They fork the middle state of a cipher and encrypt it twice under two smaller independent permutations. Thus, forkciphers produce two output blocks in one primitive call.Andreeva et al. proposed ForkAES, a tweakable AES-based forkcipher that splits the state after five out of ten rounds. While their authenticated encrypted schemes were accompanied by proofs, the security discussion for ForkAES was not provided, and founded on existing results on the AES and KIASU-BC. Forkciphers provide a unique interface called reconstruction queries that use one ciphertext block as input and compute the respective other ciphertext block. Thus, they deserve a careful security analysis.This work fosters the understanding of the security of ForkAES with three contributions: (1) We observe that security in reconstruction queries differs strongly from the existing results on the AES. This allows to attack nine out of ten rounds with differential, impossible-differential and yoyo attacks. (2) We observe that some forkcipher modes may lack the interface of reconstruction queries, so that attackers must use encryption queries. We show that nine rounds can still be attacked with rectangle and impossible-differential attacks. (3) We present forgery attacks on the AE modes proposed by Andreeva et al. with nine-round ForkAES.
7 schema:editor Nb26d981f9cc3436b912560579f969131
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nfd51ed8319f34d01b49c6d4d9e2a3e10
12 schema:keywords AE modes
13 AES
14 Andreeva et al
15 Cryptanalysis of ForkAES
16 ForkAES
17 Forkciphers
18 Kiasu-BC
19 al
20 analysis
21 attacker
22 attacks
23 authentication
24 block
25 calls
26 careful security analysis
27 cipher
28 ciphertext blocks
29 contribution
30 cryptanalysis
31 discussion
32 efficient encryption
33 encryption
34 encryption queries
35 et al
36 forgery attack
37 forkcipher modes
38 impossible differential attack
39 independent permutations
40 input
41 interface
42 kind
43 messages
44 middle state
45 mode
46 new kind
47 nine-round ForkAES
48 output block
49 permutations
50 primitive call
51 primitives
52 proof
53 queries
54 reconstruction queries
55 rectangle
56 results
57 rounds
58 scheme
59 security
60 security analysis
61 security discussion
62 security of ForkAES
63 small messages
64 smaller independent permutations
65 state
66 tweakable AES
67 understanding
68 unique interface
69 work
70 yoyo attacks
71 schema:name Cryptanalysis of ForkAES
72 schema:pagination 43-63
73 schema:productId N6b2209bde2754bb39630f329325eaa1f
74 Naf91d301300f4cc1b41475790607a959
75 schema:publisher N9bc88622b37a4aea8b7daba71558f0ec
76 schema:sameAs https://app.dimensions.ai/details/publication/pub.1115954859
77 https://doi.org/10.1007/978-3-030-21568-2_3
78 schema:sdDatePublished 2022-01-01T19:26
79 schema:sdLicense https://scigraph.springernature.com/explorer/license/
80 schema:sdPublisher Na4aea5f1d6324c919971a16c71dde9af
81 schema:url https://doi.org/10.1007/978-3-030-21568-2_3
82 sgo:license sg:explorer/license/
83 sgo:sdDataset chapters
84 rdf:type schema:Chapter
85 N00d803f03bb8423280ac25ac7561d6ef rdf:first sg:person.014072424160.79
86 rdf:rest rdf:nil
87 N0966770228b5492185eaf9a73ad4c19d rdf:first sg:person.010177473713.45
88 rdf:rest N45e6d9f875e64445bb60842550a2b113
89 N16a449e9597541f18170ce62f3f6f052 rdf:first sg:person.013454005377.91
90 rdf:rest N8790b267ac6c464fba6fdfe0c6834755
91 N45e6d9f875e64445bb60842550a2b113 rdf:first sg:person.015235130673.96
92 rdf:rest Na86a1a895957451781898e1161710f3c
93 N4e6b81cf89e64438a82400ae6c7b0047 schema:familyName Gauthier-Umaña
94 schema:givenName Valérie
95 rdf:type schema:Person
96 N6b2209bde2754bb39630f329325eaa1f schema:name doi
97 schema:value 10.1007/978-3-030-21568-2_3
98 rdf:type schema:PropertyValue
99 N6e81421fd9ae4d7aa859e28685e54c4d rdf:first sg:person.010614556552.79
100 rdf:rest N0966770228b5492185eaf9a73ad4c19d
101 N70595f9875514ec2b40b5df94e5be744 schema:familyName Deng
102 schema:givenName Robert H.
103 rdf:type schema:Person
104 N7dd65474b88245628a16ed9a51fa2dbb rdf:first Nc796e927e8044edb8f5e7bebb52823bf
105 rdf:rest rdf:nil
106 N8790b267ac6c464fba6fdfe0c6834755 rdf:first sg:person.012266711264.41
107 rdf:rest N00d803f03bb8423280ac25ac7561d6ef
108 N9bc88622b37a4aea8b7daba71558f0ec schema:name Springer Nature
109 rdf:type schema:Organisation
110 N9f353f7d6aa4435fa63617e52fd7b62b schema:familyName Ochoa
111 schema:givenName Martín
112 rdf:type schema:Person
113 Na4aea5f1d6324c919971a16c71dde9af schema:name Springer Nature - SN SciGraph project
114 rdf:type schema:Organization
115 Na86a1a895957451781898e1161710f3c rdf:first sg:person.012346753655.92
116 rdf:rest Nc286555b8ff94d7ba7eab357cd7930f1
117 Naa51a8f9a7204362888542c2fde97f0d rdf:first sg:person.07653531142.18
118 rdf:rest N16a449e9597541f18170ce62f3f6f052
119 Naf91d301300f4cc1b41475790607a959 schema:name dimensions_id
120 schema:value pub.1115954859
121 rdf:type schema:PropertyValue
122 Nb26d981f9cc3436b912560579f969131 rdf:first N70595f9875514ec2b40b5df94e5be744
123 rdf:rest Nc165bd6a035944d28e594f0f01ca8f23
124 Nc165bd6a035944d28e594f0f01ca8f23 rdf:first N4e6b81cf89e64438a82400ae6c7b0047
125 rdf:rest Nf17b7d368c4b46c58ee814ec39d120db
126 Nc286555b8ff94d7ba7eab357cd7930f1 rdf:first sg:person.013144334255.93
127 rdf:rest Naa51a8f9a7204362888542c2fde97f0d
128 Nc796e927e8044edb8f5e7bebb52823bf schema:familyName Yung
129 schema:givenName Moti
130 rdf:type schema:Person
131 Nf17b7d368c4b46c58ee814ec39d120db rdf:first N9f353f7d6aa4435fa63617e52fd7b62b
132 rdf:rest N7dd65474b88245628a16ed9a51fa2dbb
133 Nfd51ed8319f34d01b49c6d4d9e2a3e10 schema:isbn 978-3-030-21567-5
134 978-3-030-21568-2
135 schema:name Applied Cryptography and Network Security
136 rdf:type schema:Book
137 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
138 schema:name Information and Computing Sciences
139 rdf:type schema:DefinedTerm
140 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
141 schema:name Data Format
142 rdf:type schema:DefinedTerm
143 sg:person.010177473713.45 schema:affiliation grid-institutes:grid.41315.32
144 schema:familyName Bossert
145 schema:givenName Jannis
146 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010177473713.45
147 rdf:type schema:Person
148 sg:person.010614556552.79 schema:affiliation grid-institutes:grid.5333.6
149 schema:familyName Banik
150 schema:givenName Subhadeep
151 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010614556552.79
152 rdf:type schema:Person
153 sg:person.012266711264.41 schema:affiliation grid-institutes:grid.494637.b
154 schema:familyName Saha
155 schema:givenName Dhiman
156 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012266711264.41
157 rdf:type schema:Person
158 sg:person.012346753655.92 schema:affiliation grid-institutes:grid.41315.32
159 schema:familyName List
160 schema:givenName Eik
161 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012346753655.92
162 rdf:type schema:Person
163 sg:person.013144334255.93 schema:affiliation grid-institutes:grid.41315.32
164 schema:familyName Lucks
165 schema:givenName Stefan
166 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144334255.93
167 rdf:type schema:Person
168 sg:person.013454005377.91 schema:affiliation grid-institutes:grid.39953.35
169 schema:familyName Rahman
170 schema:givenName Mostafizar
171 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013454005377.91
172 rdf:type schema:Person
173 sg:person.014072424160.79 schema:affiliation grid-institutes:None
174 schema:familyName Sasaki
175 schema:givenName Yu
176 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79
177 rdf:type schema:Person
178 sg:person.015235130673.96 schema:affiliation grid-institutes:grid.39953.35
179 schema:familyName Jana
180 schema:givenName Amit
181 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015235130673.96
182 rdf:type schema:Person
183 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
184 schema:familyName Meier
185 schema:givenName Willi
186 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
187 rdf:type schema:Person
188 grid-institutes:None schema:alternateName NTT Secure Platform Laboratories, Tokyo, Japan
189 schema:name NTT Secure Platform Laboratories, Tokyo, Japan
190 rdf:type schema:Organization
191 grid-institutes:grid.39953.35 schema:alternateName CSRU, Indian Statistical Institute, Kolkata, India
192 schema:name CSRU, Indian Statistical Institute, Kolkata, India
193 rdf:type schema:Organization
194 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
195 schema:name FHNW, Windisch, Switzerland
196 rdf:type schema:Organization
197 grid-institutes:grid.41315.32 schema:alternateName Bauhaus-Universität Weimar, Weimar, Germany
198 schema:name Bauhaus-Universität Weimar, Weimar, Germany
199 rdf:type schema:Organization
200 grid-institutes:grid.494637.b schema:alternateName IIT Bhilai, Raipur, India
201 schema:name IIT Bhilai, Raipur, India
202 rdf:type schema:Organization
203 grid-institutes:grid.5333.6 schema:alternateName EPFL, Lausanne, Switzerland
204 schema:name EPFL, Lausanne, Switzerland
205 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...