1
|
Chu L, Su Y, Zan X, Lin W, Yao X, Xu P, Liu W. A Deniable Encryption Method for Modulation-Based DNA Storage. Interdiscip Sci 2024:10.1007/s12539-024-00648-5. [PMID: 39155324 DOI: 10.1007/s12539-024-00648-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2023] [Revised: 07/23/2024] [Accepted: 07/26/2024] [Indexed: 08/20/2024]
Abstract
Recent advancements in synthesis and sequencing techniques have made deoxyribonucleic acid (DNA) a promising alternative for next-generation digital storage. As it approaches practical application, ensuring the security of DNA-stored information has become a critical problem. Deniable encryption allows the decryption of different information from the same ciphertext, ensuring that the "plausible" fake information can be provided when users are coerced to reveal the real information. In this paper, we propose a deniable encryption method that uniquely leverages DNA noise channels. Specifically, true and fake messages are encrypted by two similar modulation carriers and subsequently obfuscated by inherent errors. Experiment results demonstrate that our method not only can conceal true information among fake ones indistinguishably, but also allow both the coercive adversary and the legitimate receiver to decrypt the intended information accurately. Further security analysis validates the resistance of our method against various typical attacks. Compared with conventional DNA cryptography methods based on complex biological operations, our method offers superior practicality and reliability, positioning it as an ideal solution for data encryption in future large-scale DNA storage applications.
Collapse
Affiliation(s)
- Ling Chu
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China
| | - Yanqing Su
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China
| | - Xiangzhen Zan
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China
| | - Wanmin Lin
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China
| | - Xiangyu Yao
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China
| | - Peng Xu
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China.
- School of Computer Science of Information Technology, Qiannan Normal University for Nationalities, Duyun, 558000, China.
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, 510000, China.
| | - Wenbin Liu
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou, 510006, China.
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, 510000, China.
| |
Collapse
|
2
|
Zheng LL, Li JZ, Wen M, Xi D, Zhu Y, Wei Q, Zhang XB, Ke G, Xia F, Gao ZF. Enthalpy and entropy synergistic regulation-based programmable DNA motifs for biosensing and information encryption. SCIENCE ADVANCES 2023; 9:eadf5868. [PMID: 37196083 DOI: 10.1126/sciadv.adf5868] [Citation(s) in RCA: 5] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/06/2023] [Accepted: 04/13/2023] [Indexed: 05/19/2023]
Abstract
Deoxyribonucleic acid (DNA) provides a collection of intelligent tools for the development of information cryptography and biosensors. However, most conventional DNA regulation strategies rely solely on enthalpy regulation, which suffers from unpredictable stimuli-responsive performance and unsatisfactory accuracy due to relatively large energy fluctuations. Here, we report an enthalpy and entropy synergistic regulation-based pH-responsive A+/C DNA motif for programmable biosensing and information encryption. In the DNA motif, the variation in loop length alters entropic contribution, and the number of A+/C bases regulates enthalpy, which is verified through thermodynamic characterizations and analyses. On the basis of this straightforward strategy, the performances, such as pKa, of the DNA motif can be precisely and predictably tuned. The DNA motifs are finally successfully applied for glucose biosensing and crypto-steganography systems, highlighting their potential in the field of biosensing and information encryption.
Collapse
Affiliation(s)
- Lin Lin Zheng
- Key Laboratory of Interfacial Reaction & Sensing Analysis in Universities of Shandong, School of Chemistry and Chemical Engineering, University of Jinan, Jinan 250022, P. R. China
- Shandong Provincial Key Laboratory of Detection Technology for Tumor Markers, College of Chemistry and Chemical Engineering, Linyi University, Linyi 276005, P. R. China
- State Key Laboratory of Chemo/Biosensing and Chemometrics, College of Chemistry and Chemical Engineering, Hunan University, Changsha 410082, P. R. China
| | - Jin Ze Li
- Shandong Provincial Key Laboratory of Detection Technology for Tumor Markers, College of Chemistry and Chemical Engineering, Linyi University, Linyi 276005, P. R. China
| | - Mei Wen
- State Key Laboratory of Chemo/Biosensing and Chemometrics, College of Chemistry and Chemical Engineering, Hunan University, Changsha 410082, P. R. China
| | - Dongmei Xi
- Shandong Provincial Key Laboratory of Detection Technology for Tumor Markers, College of Chemistry and Chemical Engineering, Linyi University, Linyi 276005, P. R. China
| | - Yanxi Zhu
- Shandong Provincial Key Laboratory of Detection Technology for Tumor Markers, College of Chemistry and Chemical Engineering, Linyi University, Linyi 276005, P. R. China
- Central Laboratory of Linyi People's Hospital, Linyi 276003, P. R. China
| | - Qin Wei
- Key Laboratory of Interfacial Reaction & Sensing Analysis in Universities of Shandong, School of Chemistry and Chemical Engineering, University of Jinan, Jinan 250022, P. R. China
| | - Xiao-Bing Zhang
- State Key Laboratory of Chemo/Biosensing and Chemometrics, College of Chemistry and Chemical Engineering, Hunan University, Changsha 410082, P. R. China
| | - Guoliang Ke
- State Key Laboratory of Chemo/Biosensing and Chemometrics, College of Chemistry and Chemical Engineering, Hunan University, Changsha 410082, P. R. China
| | - Fan Xia
- Engineering Research Center of Nano-Geomaterials of Ministry of Education, Faculty of Materials Science and Chemistry, China University of Geosciences, 388 Lumo Road, Wuhan 430074, P. R. China
| | - Zhong Feng Gao
- Key Laboratory of Interfacial Reaction & Sensing Analysis in Universities of Shandong, School of Chemistry and Chemical Engineering, University of Jinan, Jinan 250022, P. R. China
| |
Collapse
|
3
|
Zan X, Chu L, Xie R, Su Y, Yao X, Xu P, Liu W. An image cryptography method by highly error-prone DNA storage channel. Front Bioeng Biotechnol 2023; 11:1173763. [PMID: 37152655 PMCID: PMC10154519 DOI: 10.3389/fbioe.2023.1173763] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/25/2023] [Accepted: 03/30/2023] [Indexed: 05/09/2023] Open
Abstract
Introduction: Rapid development in synthetic technologies has boosted DNA as a potential medium for large-scale data storage. Meanwhile, how to implement data security in the DNA storage system is still an unsolved problem. Methods: In this article, we propose an image encryption method based on the modulation-based storage architecture. The key idea is to take advantage of the unpredictable modulation signals to encrypt images in highly error-prone DNA storage channels. Results and Discussion: Numerical results have demonstrated that our image encryption method is feasible and effective with excellent security against various attacks (statistical, differential, noise, and data loss). When compared with other methods such as the hybridization reactions of DNA molecules, the proposed method is more reliable and feasible for large-scale applications.
Collapse
Affiliation(s)
- Xiangzhen Zan
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Ling Chu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Ranze Xie
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Yanqing Su
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Xiangyu Yao
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Peng Xu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
- School of Computer Science of Information Technology, Qiannan Normal University for Nationalities, Duyun, Guizhou, China
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, Guangdong, China
| | - Wenbin Liu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, Guangdong, China
| |
Collapse
|
4
|
Yao X, Xie R, Zan X, Su Y, Xu P, Liu W. A Novel Image Encryption Scheme for DNA Storage Systems Based on DNA Hybridization and Gene Mutation. Interdiscip Sci 2023:10.1007/s12539-023-00565-z. [PMID: 37016040 DOI: 10.1007/s12539-023-00565-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/02/2022] [Revised: 03/21/2023] [Accepted: 03/21/2023] [Indexed: 04/06/2023]
Abstract
With the rapid development of DNA (deoxyribonucleic acid) storage technologies, storing digital images in DNA is feasible. Meanwhile, the information security in DNA storage system is still a problem to solve. Therefore, in this paper, we propose a DNA storage-oriented image encryption algorithm utilizing the information processing mechanisms in molecule biology. The basic idea is to perform pixel replacement by gene hybridization, and implement dual diffusion by pixel diffusion and gene mutation. The ciphertext DNA image can be synthesized and stored in DNA storage system after encryption. Experimental results demonstrate it can resist common attacks, and shows a strong robustness against sequence loss and base substitution errors in the DNA storage channel. A DNA storage-oriented image encryption algorithm based on gene hybridization and gene mutation, First, we scramble rows and columns of the plaintext image by dynamic Josephus traversing. Second, we replace the pixels by gene hybridization. Finally, we diffuse the image matrix in binary domain and encode pixels into 8-base strands which are later further diffused by gene mutation. The ciphertext image can be synthesized according to the mutant gene codes and stored in any DNA storage system.
Collapse
Affiliation(s)
- Xiangyu Yao
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China
| | - Ranze Xie
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China
| | - Xiangzhen Zan
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China
| | - Yanqing Su
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China
| | - Peng Xu
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China.
- School of Computer Science of Information Technology, Qiannan Normal University for Nationalities, Duyun, 558000, Guizhou, China.
| | - Wenbin Liu
- Institution of Computational Science and Technology, Guangzhou University, Guangzhou, 510006, Guangdong, China.
| |
Collapse
|
5
|
Shi Q, Zhou X, Xu J, Zhang J, Wang N, Zhang G, Hu J, Liu S. Dendritic Quaternary-Encoded Oligourethanes for Data Encryption. Angew Chem Int Ed Engl 2023; 62:e202214695. [PMID: 36412223 DOI: 10.1002/anie.202214695] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/06/2022] [Revised: 11/10/2022] [Accepted: 11/22/2022] [Indexed: 11/23/2022]
Abstract
The use of sequence-defined digital polymers for data storage and encryption has received increasing attention due to their precision structures similar to natural biomacromolecules (e.g., DNA) but increased stability. However, the rapid development of sequencing techniques raises the concern of information leakage. Herein, dendritic quaternary-encoded oligourethanes bearing a photoresponsive trigger, self-immolative backbones, and a mass spectrometry tag of PEG dendron have been developed for data encryption. Although the sequence information in linear analogs can be readily deciphered by mass spectrometry, sequencing of dendritic oligourethanes cannot be achieved by either primary MS or tandem MS/MS owing to the unique spatial conformation. Intriguingly, the fragmentation pathways of a quaternary dendrimer under MS/MS conditions can be converted to 2772-bit 2D matrices with ≈1.98×1087 permutations, serving as high-strength encryption keys for highly reliable data encryption.
Collapse
Affiliation(s)
- Qiangqiang Shi
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Xin Zhou
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Jie Xu
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Jialin Zhang
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Ning Wang
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Guoying Zhang
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Jinming Hu
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| | - Shiyong Liu
- Department of Pharmacy, The First Affiliated Hospital of USTC, Division of Life Sciences and Medicine, CAS Key Laboratory of Soft Matter Chemistry, Department of Polymer Science and Engineering, University of Science and Technology of China, 96 Jinzhai Road, Hefei, Anhui, 230026, China
| |
Collapse
|
6
|
Zhu E, Luo X, Liu C, Chen C. An Operational DNA Strand Displacement Encryption Approach. NANOMATERIALS 2022; 12:nano12050877. [PMID: 35269365 PMCID: PMC8912636 DOI: 10.3390/nano12050877] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/14/2022] [Revised: 02/21/2022] [Accepted: 03/03/2022] [Indexed: 11/17/2022]
Abstract
DeoxyriboNucleic Acid (DNA) encryption is a new encryption method that appeared along with the research of DNA nanotechnology in recent years. Due to the complexity of biology in DNA nanotechnology, DNA encryption brings in an additional difficulty in deciphering and, thus, can enhance information security. As a new approach in DNA nanotechnology, DNA strand displacement has particular advantages such as being enzyme free and self-assembly. However, the existing research on DNA-strand-displacement-based encryption has mostly stayed at a theoretical or simulation stage. To this end, this paper proposes a new DNA-strand-displacement-based encryption framework. This encryption framework involves three main strategies. The first strategy was a tri-phase conversion from plaintext to DNA sequences according to a Huffman-coding-based transformation rule, which enhances the concealment of the information. The second strategy was the development of DNA strand displacement molecular modules, which produce the initial key for information encryption. The third strategy was a cyclic-shift-based operation to extend the initial key long enough, and thus increase the deciphering difficulty. The results of simulation and biological experiments demonstrated the feasibility of our scheme for encryption. The approach was further validated in terms of the key sensitivity, key space, and statistic characteristic. Our encryption framework provides a potential way to realize DNA-strand-displacement-based encryption via biological experiments and promotes the research on DNA-strand-displacement-based encryption.
Collapse
Affiliation(s)
- Enqiang Zhu
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou 510006, China; (E.Z.); (X.L.)
| | - Xianhang Luo
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou 510006, China; (E.Z.); (X.L.)
| | - Chanjuan Liu
- School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
- Correspondence:
| | - Congzhou Chen
- School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China;
| |
Collapse
|
7
|
Peng W, Cui S, Song C. One-time-pad cipher algorithm based on confusion mapping and DNA storage technology. PLoS One 2021; 16:e0245506. [PMID: 33471849 PMCID: PMC7817086 DOI: 10.1371/journal.pone.0245506] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2020] [Accepted: 12/31/2020] [Indexed: 11/21/2022] Open
Abstract
In order to solve the problems of low computational security in the encoding mapping and difficulty in practical operation of biological experiments in DNA-based one-time-pad cryptography, we proposed a one-time-pad cipher algorithm based on confusion mapping and DNA storage technology. In our constructed algorithm, the confusion mapping methods such as chaos map, encoding mapping, confusion encoding table and simulating biological operation process are used to increase the key space. Among them, the encoding mapping and the confusion encoding table provide the realization conditions for the transition of data and biological information. By selecting security parameters and confounding parameters, the algorithm realizes a more random dynamic encryption and decryption process than similar algorithms. In addition, the use of DNA storage technologies including DNA synthesis and high-throughput sequencing ensures a viable biological encryption process. Theoretical analysis and simulation experiments show that the algorithm provides both mathematical and biological security, which not only has the difficult advantage of cracking DNA biological experiments, but also provides relatively high computational security.
Collapse
Affiliation(s)
- Weiping Peng
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
| | - Shuang Cui
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
- * E-mail:
| | - Cheng Song
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
| |
Collapse
|
8
|
Peng W, Cheng D, Song C. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure. PLoS One 2018; 13:e0206612. [PMID: 30399178 PMCID: PMC6219780 DOI: 10.1371/journal.pone.0206612] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/08/2018] [Accepted: 10/16/2018] [Indexed: 11/18/2022] Open
Abstract
The security strength of the traditional one-time-pad encryption system depends on the randomness of the secret key. However, It can hardly to generatea truerandom key by using the existing technologies and methods, and it is also difficult to issue and store the random keywhich is at least as long as the plaintext. Therefore, we pay more attention to the logical operation used in the encryption and decryption but not to how to generate the random key. The calculator, a three-dimensional DNA self-assembly pyramid structure, is designed to construct four common logical operations (AND, OR, NOT, XOR) by programming DNA interactions. And two novel one-time-pad cryptography schemes, a single-bit one-time-pad algorithm and improved double-bit one-time-pad algorithm, are proposed based on the calculator. The security fragments, used to construct the three-dimensional DNA self-assembly pyramid structure, are intercepted from a reference chain which is selected from the DNA database. All of the interception parameters are transmitted to recipient by hiding in DNA sequences. Only the authorized user can get all secret parameters to reconstruct the structure. The secret random key sequences for the two one-time-pad cryptography algorithms are generated by using logistic map. It only needs to share two parameters and thresholding function in sender and recipient without code books. The simulation results and security analysis show that the encryption algorithms are effective and can provide higher computational complexity as well as a reduced cracking probability except for the difficult of biological experiments.
Collapse
Affiliation(s)
- Weiping Peng
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
- * E-mail:
| | - Danhua Cheng
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
| | - Cheng Song
- School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, China
| |
Collapse
|
9
|
Boukis AC, Reiter K, Frölich M, Hofheinz D, Meier MAR. Multicomponent reactions provide key molecules for secret communication. Nat Commun 2018; 9:1439. [PMID: 29651145 PMCID: PMC5897361 DOI: 10.1038/s41467-018-03784-x] [Citation(s) in RCA: 122] [Impact Index Per Article: 20.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/27/2017] [Accepted: 03/13/2018] [Indexed: 01/24/2023] Open
Abstract
A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.
Collapse
Affiliation(s)
- Andreas C Boukis
- Laboratory of Applied Chemistry, Institute of Organic Chemistry (IOC), Karlsruhe Institute of Technology (KIT), Straße am Forum 7, Karlsruhe, 76131, Germany
| | - Kevin Reiter
- Institute of Nano Technology (INT), Karlsruhe Institute of Technology (KIT), Hermann-von-Helmholtz-Platz 1, Eggenstein-Leopoldshafen, 76344, Germany
| | - Maximiliane Frölich
- Laboratory of Applied Chemistry, Institute of Organic Chemistry (IOC), Karlsruhe Institute of Technology (KIT), Straße am Forum 7, Karlsruhe, 76131, Germany
| | - Dennis Hofheinz
- Institute for Theoretical Informatics (ITI), Karlsruhe Institute of Technology (KIT), Am Fasanengarten 5, Karlsruhe, 76131, Germany
| | - Michael A R Meier
- Laboratory of Applied Chemistry, Institute of Organic Chemistry (IOC), Karlsruhe Institute of Technology (KIT), Straße am Forum 7, Karlsruhe, 76131, Germany.
| |
Collapse
|