A Practical Attack on Patched MIFARE Classic View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Yi-Hao Chiu , Wei-Chih Hong , Li-Ping Chou , Jintai Ding , Bo-Yin Yang , Chen-Mou Cheng

ABSTRACT

MIFARE Classic is the world’s most widely deployed RFID (radio-frequency identification) technology. It was claimed to be cryptographically protected by the proprietary Crypto-1 stream cipher. However, it proved inadequate after weaknesses in the design and implementation of Crypto-1 and MIFARE Classic started surfacing since late 2007 [7, 8, 12–17]. Some operators of MIFARE Classic-based systems reacted by upgrading to more secure alternatives such as MIFARE DESFire. However, many (especially in Asia) opted to “patch” MIFARE Classic instead. Their risk analysis might have gone as follows: “The most serious threat comes from efficient card-only attacks, where the attacker only needs an off-the-shelf reader and a PC to tamper a target tag. All efficient card-only attacks depend on certain implementation flaws. Ergo, if we just fix these flaws, we can stop the most serious attacks without an expensive infrastructure upgrade.” One such prominent case is “EasyCard 2.0,” today accepted in Taiwan as a means of electronic payment not only in public transportation but also in convenient stores, drug stores, eateries, cafes, supermarkets, book stores, movie theaters, etc. Obviously, the whole “patching” approach is questionable because Crypto-1 is fundamentally a weak cipher. In support of the proposition, we present a new card-only attack based on state-of-the-art algebraic differential cryptanalytic techniques [1, 2]. Still using the same cheap reader as previous attacks, it takes 2–15 min of computation on a PC to recover a secret key of EasyCard 2.0 after 10–20 h of data collection. We hope the new attack makes our point sufficiently clear, and we urge that all MIFARE-Classic operators with important transactions such as electronic payment upgrade their systems to the more secure alternatives soon. More... »

PAGES

150-164

References to SciGraph publications

  • 2008. A Practical Attack on the MIFARE Classic in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2009. Algebraic Techniques in Differential Cryptanalysis in FAST SOFTWARE ENCRYPTION
  • 2013. Cryptanalytic Attacks on MIFARE Classic Protocol in TOPICS IN CRYPTOLOGY – CT-RSA 2013
  • 2011. Algebraic Precomputations in Differential and Integral Cryptanalysis in INFORMATION SECURITY AND CRYPTOLOGY
  • 2008. Dismantling MIFARE Classic in COMPUTER SECURITY - ESORICS 2008
  • 2011. Algebraic Techniques in Differential Cryptanalysis Revisited in INFORMATION SECURITY AND PRIVACY
  • 2000. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • Book

    TITLE

    Information Security and Cryptology

    ISBN

    978-3-319-12086-7
    978-3-319-12087-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-12087-4_10

    DOI

    http://dx.doi.org/10.1007/978-3-319-12087-4_10

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1019524738


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "National Taiwan University", 
              "id": "https://www.grid.ac/institutes/grid.19188.39", 
              "name": [
                "National Taiwan University, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chiu", 
            "givenName": "Yi-Hao", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Academia Sinica", 
              "id": "https://www.grid.ac/institutes/grid.28665.3f", 
              "name": [
                "Academia Sinica, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hong", 
            "givenName": "Wei-Chih", 
            "id": "sg:person.010470105563.91", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010470105563.91"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Chinese Culture University", 
              "id": "https://www.grid.ac/institutes/grid.411531.3", 
              "name": [
                "Chinese Culture University, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chou", 
            "givenName": "Li-Ping", 
            "id": "sg:person.012274410671.62", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012274410671.62"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Cincinnati", 
              "id": "https://www.grid.ac/institutes/grid.24827.3b", 
              "name": [
                "University of Cincinnati, Cincinnati, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ding", 
            "givenName": "Jintai", 
            "id": "sg:person.010723403013.04", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Academia Sinica", 
              "id": "https://www.grid.ac/institutes/grid.28665.3f", 
              "name": [
                "Academia Sinica, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yang", 
            "givenName": "Bo-Yin", 
            "id": "sg:person.010017213117.39", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010017213117.39"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National Taiwan University", 
              "id": "https://www.grid.ac/institutes/grid.19188.39", 
              "name": [
                "National Taiwan University, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Cheng", 
            "givenName": "Chen-Mou", 
            "id": "sg:person.014013613551.99", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014013613551.99"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-45539-6_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000285811", 
              "https://doi.org/10.1007/3-540-45539-6_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/368273.368557", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002239284"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85893-5_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002657449", 
              "https://doi.org/10.1007/978-3-540-85893-5_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/j.1538-7305.1949.tb00928.x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009908265"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-36095-4_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015972471", 
              "https://doi.org/10.1007/978-3-642-36095-4_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018028771", 
              "https://doi.org/10.1007/978-3-642-03317-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018028771", 
              "https://doi.org/10.1007/978-3-642-03317-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21518-6_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029632367", 
              "https://doi.org/10.1007/978-3-642-21518-6_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21518-6_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029632367", 
              "https://doi.org/10.1007/978-3-642-21518-6_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22497-3_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031040621", 
              "https://doi.org/10.1007/978-3-642-22497-3_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-88313-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039079461", 
              "https://doi.org/10.1007/978-3-540-88313-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-88313-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039079461", 
              "https://doi.org/10.1007/978-3-540-88313-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s0022-4049(99)00005-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040947089"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.jsc.2008.02.017", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044270177"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014", 
        "datePublishedReg": "2014-01-01", 
        "description": "MIFARE Classic is the world\u2019s most widely deployed RFID (radio-frequency identification) technology. It was claimed to be cryptographically protected by the proprietary Crypto-1 stream cipher. However, it proved inadequate after weaknesses in the design and implementation of Crypto-1 and MIFARE Classic started surfacing since late 2007 [7, 8, 12\u201317]. Some operators of MIFARE Classic-based systems reacted by upgrading to more secure alternatives such as MIFARE DESFire. However, many (especially in Asia) opted to \u201cpatch\u201d MIFARE Classic instead. Their risk analysis might have gone as follows: \u201cThe most serious threat comes from efficient card-only attacks, where the attacker only needs an off-the-shelf reader and a PC to tamper a target tag. All efficient card-only attacks depend on certain implementation flaws. Ergo, if we just fix these flaws, we can stop the most serious attacks without an expensive infrastructure upgrade.\u201d One such prominent case is \u201cEasyCard\u00a02.0,\u201d today accepted in Taiwan as a means of electronic payment not only in public transportation but also in convenient stores, drug stores, eateries, cafes, supermarkets, book stores, movie theaters, etc. Obviously, the whole \u201cpatching\u201d approach is questionable because Crypto-1 is fundamentally a weak cipher. In support of the proposition, we present a new card-only attack based on state-of-the-art algebraic differential cryptanalytic techniques\u00a0[1, 2]. Still using the same cheap reader as previous attacks, it takes 2\u201315\u00a0min of computation on a PC to recover a secret key of EasyCard\u00a02.0 after 10\u201320\u00a0h of data collection. We hope the new attack makes our point sufficiently clear, and we urge that all MIFARE-Classic operators with important transactions such as electronic payment upgrade their systems to the more secure alternatives soon.", 
        "editor": [
          {
            "familyName": "Lin", 
            "givenName": "Dongdai", 
            "type": "Person"
          }, 
          {
            "familyName": "Xu", 
            "givenName": "Shouhuai", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-12087-4_10", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-12086-7", 
            "978-3-319-12087-4"
          ], 
          "name": "Information Security and Cryptology", 
          "type": "Book"
        }, 
        "name": "A Practical Attack on Patched MIFARE Classic", 
        "pagination": "150-164", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-12087-4_10"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "5d07527f7bd0e6708267e8b8ef18184c9268080859ea0f1979de79fc735bdc1e"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1019524738"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-12087-4_10", 
          "https://app.dimensions.ai/details/publication/pub.1019524738"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T23:51", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000255.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-12087-4_10"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12087-4_10'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12087-4_10'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12087-4_10'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12087-4_10'


     

    This table displays all metadata directly associated to this object as RDF triples.

    158 TRIPLES      23 PREDICATES      38 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-12087-4_10 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N0f4edb092a484f1e81daaa81043afcd3
    4 schema:citation sg:pub.10.1007/3-540-45539-6_27
    5 sg:pub.10.1007/978-3-540-85893-5_20
    6 sg:pub.10.1007/978-3-540-88313-5_7
    7 sg:pub.10.1007/978-3-642-03317-9_12
    8 sg:pub.10.1007/978-3-642-21518-6_27
    9 sg:pub.10.1007/978-3-642-22497-3_9
    10 sg:pub.10.1007/978-3-642-36095-4_16
    11 https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
    12 https://doi.org/10.1016/j.jsc.2008.02.017
    13 https://doi.org/10.1016/s0022-4049(99)00005-5
    14 https://doi.org/10.1145/368273.368557
    15 schema:datePublished 2014
    16 schema:datePublishedReg 2014-01-01
    17 schema:description MIFARE Classic is the world’s most widely deployed RFID (radio-frequency identification) technology. It was claimed to be cryptographically protected by the proprietary Crypto-1 stream cipher. However, it proved inadequate after weaknesses in the design and implementation of Crypto-1 and MIFARE Classic started surfacing since late 2007 [7, 8, 12–17]. Some operators of MIFARE Classic-based systems reacted by upgrading to more secure alternatives such as MIFARE DESFire. However, many (especially in Asia) opted to “patch” MIFARE Classic instead. Their risk analysis might have gone as follows: “The most serious threat comes from efficient card-only attacks, where the attacker only needs an off-the-shelf reader and a PC to tamper a target tag. All efficient card-only attacks depend on certain implementation flaws. Ergo, if we just fix these flaws, we can stop the most serious attacks without an expensive infrastructure upgrade.” One such prominent case is “EasyCard 2.0,” today accepted in Taiwan as a means of electronic payment not only in public transportation but also in convenient stores, drug stores, eateries, cafes, supermarkets, book stores, movie theaters, etc. Obviously, the whole “patching” approach is questionable because Crypto-1 is fundamentally a weak cipher. In support of the proposition, we present a new card-only attack based on state-of-the-art algebraic differential cryptanalytic techniques [1, 2]. Still using the same cheap reader as previous attacks, it takes 2–15 min of computation on a PC to recover a secret key of EasyCard 2.0 after 10–20 h of data collection. We hope the new attack makes our point sufficiently clear, and we urge that all MIFARE-Classic operators with important transactions such as electronic payment upgrade their systems to the more secure alternatives soon.
    18 schema:editor N1183fea67b3e47029e0f7bb48cf1ab3d
    19 schema:genre chapter
    20 schema:inLanguage en
    21 schema:isAccessibleForFree false
    22 schema:isPartOf Ne1363e17dd26484faa38c2543ba407ad
    23 schema:name A Practical Attack on Patched MIFARE Classic
    24 schema:pagination 150-164
    25 schema:productId N3bc1716917f84153ba7b977364eece5a
    26 N80a3cf1b28e44094995fb991077b0d4b
    27 Ne0ab2bb417ce467c81ad1c8b2092fb6c
    28 schema:publisher N526eee5e4cf448af9155c94e1e9f175f
    29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019524738
    30 https://doi.org/10.1007/978-3-319-12087-4_10
    31 schema:sdDatePublished 2019-04-15T23:51
    32 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    33 schema:sdPublisher Neb52d7b0ac2b40459593aa0191302bb4
    34 schema:url http://link.springer.com/10.1007/978-3-319-12087-4_10
    35 sgo:license sg:explorer/license/
    36 sgo:sdDataset chapters
    37 rdf:type schema:Chapter
    38 N0f4edb092a484f1e81daaa81043afcd3 rdf:first N496dd04e8c6645be867b328c1b4ad11b
    39 rdf:rest Nb5b5335b28b942c7aade8c4ef05b4b1d
    40 N10a6d21e9ec74ff5b385daf65c0e5d88 rdf:first sg:person.010017213117.39
    41 rdf:rest N52c61de7f6804de3817557f143ad38c4
    42 N1183fea67b3e47029e0f7bb48cf1ab3d rdf:first Ncec4d95f94af4e8f9d9ce6d78c0de635
    43 rdf:rest N59a940394f7a47cf9e09ebab6edbd127
    44 N2e5e49c9983d42cabbb49209403d9739 schema:familyName Yung
    45 schema:givenName Moti
    46 rdf:type schema:Person
    47 N3bc1716917f84153ba7b977364eece5a schema:name doi
    48 schema:value 10.1007/978-3-319-12087-4_10
    49 rdf:type schema:PropertyValue
    50 N496dd04e8c6645be867b328c1b4ad11b schema:affiliation https://www.grid.ac/institutes/grid.19188.39
    51 schema:familyName Chiu
    52 schema:givenName Yi-Hao
    53 rdf:type schema:Person
    54 N4df251a2da5b4f7ca4028223b05a4345 schema:familyName Xu
    55 schema:givenName Shouhuai
    56 rdf:type schema:Person
    57 N526eee5e4cf448af9155c94e1e9f175f schema:location Cham
    58 schema:name Springer International Publishing
    59 rdf:type schema:Organisation
    60 N52c61de7f6804de3817557f143ad38c4 rdf:first sg:person.014013613551.99
    61 rdf:rest rdf:nil
    62 N59a940394f7a47cf9e09ebab6edbd127 rdf:first N4df251a2da5b4f7ca4028223b05a4345
    63 rdf:rest Nff8370cd2c894628b4bf58e1c6a976c6
    64 N7620b1f139164f639fe6e1224745bfb6 rdf:first sg:person.010723403013.04
    65 rdf:rest N10a6d21e9ec74ff5b385daf65c0e5d88
    66 N80a3cf1b28e44094995fb991077b0d4b schema:name dimensions_id
    67 schema:value pub.1019524738
    68 rdf:type schema:PropertyValue
    69 N9e6cebaa25bf478aa506844170156edf rdf:first sg:person.012274410671.62
    70 rdf:rest N7620b1f139164f639fe6e1224745bfb6
    71 Nb5b5335b28b942c7aade8c4ef05b4b1d rdf:first sg:person.010470105563.91
    72 rdf:rest N9e6cebaa25bf478aa506844170156edf
    73 Ncec4d95f94af4e8f9d9ce6d78c0de635 schema:familyName Lin
    74 schema:givenName Dongdai
    75 rdf:type schema:Person
    76 Ne0ab2bb417ce467c81ad1c8b2092fb6c schema:name readcube_id
    77 schema:value 5d07527f7bd0e6708267e8b8ef18184c9268080859ea0f1979de79fc735bdc1e
    78 rdf:type schema:PropertyValue
    79 Ne1363e17dd26484faa38c2543ba407ad schema:isbn 978-3-319-12086-7
    80 978-3-319-12087-4
    81 schema:name Information Security and Cryptology
    82 rdf:type schema:Book
    83 Neb52d7b0ac2b40459593aa0191302bb4 schema:name Springer Nature - SN SciGraph project
    84 rdf:type schema:Organization
    85 Nff8370cd2c894628b4bf58e1c6a976c6 rdf:first N2e5e49c9983d42cabbb49209403d9739
    86 rdf:rest rdf:nil
    87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Information and Computing Sciences
    89 rdf:type schema:DefinedTerm
    90 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Data Format
    92 rdf:type schema:DefinedTerm
    93 sg:person.010017213117.39 schema:affiliation https://www.grid.ac/institutes/grid.28665.3f
    94 schema:familyName Yang
    95 schema:givenName Bo-Yin
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010017213117.39
    97 rdf:type schema:Person
    98 sg:person.010470105563.91 schema:affiliation https://www.grid.ac/institutes/grid.28665.3f
    99 schema:familyName Hong
    100 schema:givenName Wei-Chih
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010470105563.91
    102 rdf:type schema:Person
    103 sg:person.010723403013.04 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
    104 schema:familyName Ding
    105 schema:givenName Jintai
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04
    107 rdf:type schema:Person
    108 sg:person.012274410671.62 schema:affiliation https://www.grid.ac/institutes/grid.411531.3
    109 schema:familyName Chou
    110 schema:givenName Li-Ping
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012274410671.62
    112 rdf:type schema:Person
    113 sg:person.014013613551.99 schema:affiliation https://www.grid.ac/institutes/grid.19188.39
    114 schema:familyName Cheng
    115 schema:givenName Chen-Mou
    116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014013613551.99
    117 rdf:type schema:Person
    118 sg:pub.10.1007/3-540-45539-6_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000285811
    119 https://doi.org/10.1007/3-540-45539-6_27
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/978-3-540-85893-5_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002657449
    122 https://doi.org/10.1007/978-3-540-85893-5_20
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/978-3-540-88313-5_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039079461
    125 https://doi.org/10.1007/978-3-540-88313-5_7
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/978-3-642-03317-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018028771
    128 https://doi.org/10.1007/978-3-642-03317-9_12
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-642-21518-6_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029632367
    131 https://doi.org/10.1007/978-3-642-21518-6_27
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-642-22497-3_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031040621
    134 https://doi.org/10.1007/978-3-642-22497-3_9
    135 rdf:type schema:CreativeWork
    136 sg:pub.10.1007/978-3-642-36095-4_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015972471
    137 https://doi.org/10.1007/978-3-642-36095-4_16
    138 rdf:type schema:CreativeWork
    139 https://doi.org/10.1002/j.1538-7305.1949.tb00928.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1009908265
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1016/j.jsc.2008.02.017 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044270177
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1016/s0022-4049(99)00005-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040947089
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1145/368273.368557 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002239284
    146 rdf:type schema:CreativeWork
    147 https://www.grid.ac/institutes/grid.19188.39 schema:alternateName National Taiwan University
    148 schema:name National Taiwan University, Taipei, Taiwan
    149 rdf:type schema:Organization
    150 https://www.grid.ac/institutes/grid.24827.3b schema:alternateName University of Cincinnati
    151 schema:name University of Cincinnati, Cincinnati, USA
    152 rdf:type schema:Organization
    153 https://www.grid.ac/institutes/grid.28665.3f schema:alternateName Academia Sinica
    154 schema:name Academia Sinica, Taipei, Taiwan
    155 rdf:type schema:Organization
    156 https://www.grid.ac/institutes/grid.411531.3 schema:alternateName Chinese Culture University
    157 schema:name Chinese Culture University, Taipei, Taiwan
    158 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...