Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,199 papers from all fields of science
Search
Sign In
Create Free Account
Piling-up lemma
Known as:
Piling up lemma
In cryptanalysis, the piling-up lemma is a principle used in linear cryptanalysis to construct linear approximation to the action of block ciphers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Block cipher
Cryptanalysis
Hardware random number generator
Linear approximation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Compressive creep of reinforced polymeric piling
Amir Bozorg-Haddad
,
Magued Iskander
2012
Corpus ID: 137301020
Reinforced polymeric piling (RPP) is a sustainable piling product that is gaining attention for use instead of timber piling in…
Expand
2011
2011
Ang Pagbenta sa Imahen ng Kalalakihan sa mga Piling Tindahang Pandamit sa Pilipinas (Selling the Image of Masculinity Among Selected Philippine Clothing Stores)
R. Cañete
2011
Corpus ID: 110677134
The concept of space as "neutral" has been critiqued in the contemporary period as a form of occlusion for other acts that are…
Expand
2009
2009
PILING-UP LEMMA FOR MARKOV CHAINS
A. Simion
2009
Corpus ID: 45852251
The Piling-up Lemma for binary independent random variables is a very useful tool in linear cryptanalysis of block ciphers and in…
Expand
2008
2008
Application of Ubiquitous Computing Technology to the Steel-Plate Piling Process of Ship Construction
Hoon Oh
,
J. Heo
Agent and Multi-Agent Systems: Technologies and…
2008
Corpus ID: 34550904
A gigantic ship is constructed by assembling various types of ship blocks, each of which is made by the cut and paste of the…
Expand
2007
2007
Cryptanalysis of Achterbahn-128/80
Martin Hell
,
T. Johansson
IET Information Security
2007
Corpus ID: 21128035
A key recovery attack on the stream cipher Achterbahn-128/80, a cipher in the second phase of eSTREAM, is given. The key…
Expand
2007
2007
A Key-Recovery Attack on SOBER-128
K. Nyberg
,
Risto M. Hakala
Symmetric Cryptography
2007
Corpus ID: 18262873
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are…
Expand
2002
2002
Ugat-Ugnayan: Hermeneutika ng mga Piling Awiting-Bayan
Erlinda Bragado
2002
Corpus ID: 170209954
Buong siglang tumutugtog ang Banda '96, bantog na musikong bumbong ng Cabiao, Nueva Ecija. Patungo ang mga ito sa Bahay…
Expand
Review
2002
Review
2002
Recent developments in FRP composite piling practice
Magued Iskander
2002
Corpus ID: 136173026
The deterioration of concrete, steel, and timber is a serious hindrance to construction in marine and corrosive environments…
Expand
1999
1999
The Piling-Up Lemma and Dependent Random Variables
Z. Kukorelly
IMA Conference on Cryptography and Coding
1999
Corpus ID: 46020335
In a linear cryptanalysis attack, several assumptions are made by the attacker. One of them is that the threefold sums used in…
Expand
1987
1987
Timber Piling Barrier and Chemical Preservation Annual Costs Comparison.
D. Pendleton
,
T. O’Neill
1987
Corpus ID: 106618493
Abstract : The currently recommended means of controlling marine borer damage of timber piling by chemical preservative systems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE