Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,891,883 papers from all fields of science
Search
Sign In
Create Free Account
Piling-up lemma
Known as:
Piling up lemma
In cryptanalysis, the piling-up lemma is a principle used in linear cryptanalysis to construct linear approximation to the action of block ciphers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Block cipher
Cryptanalysis
Hardware random number generator
Linear approximation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Mga Piling Pangatnig Bilang mga Pangkawing Lohikal: Panimulang Pag-aaral ng Wikang Filipino Gamit ang Semantiks na Modelo-Teoretik / Filipino Conjunctions as Logical Connectives: A Preliminary Study…
J. J. Joaquin
2014
Corpus ID: 171032672
Iminumungkahi ng pag-aaral na ito ang paggamit ng isang teknikal na aparato mula sa lohikang pormal/simboliko na tatawaging…
Expand
2012
2012
Compressive creep of reinforced polymeric piling
Amir Bozorg-Haddad
,
Magued Iskander
2012
Corpus ID: 137301020
Reinforced polymeric piling (RPP) is a sustainable piling product that is gaining attention for use instead of timber piling in…
Expand
2009
2009
PILING-UP LEMMA FOR MARKOV CHAINS
A. Simion
2009
Corpus ID: 45852251
The Piling-up Lemma for binary independent random variables is a very useful tool in linear cryptanalysis of block ciphers and in…
Expand
2008
2008
Application of Ubiquitous Computing Technology to the Steel-Plate Piling Process of Ship Construction
Hoon Oh
,
J. Heo
Agent and Multi-Agent Systems: Technologies and…
2008
Corpus ID: 34550904
A gigantic ship is constructed by assembling various types of ship blocks, each of which is made by the cut and paste of the…
Expand
2007
2007
Cryptanalysis of Achterbahn-128/80
Martin Hell
,
T. Johansson
IET Information Security
2007
Corpus ID: 21128035
A key recovery attack on the stream cipher Achterbahn-128/80, a cipher in the second phase of eSTREAM, is given. The key…
Expand
2007
2007
A Key-Recovery Attack on SOBER-128
K. Nyberg
,
Risto M. Hakala
Symmetric Cryptography
2007
Corpus ID: 18262873
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are…
Expand
Review
2002
Review
2002
Recent developments in FRP composite piling practice
Magued Iskander
2002
Corpus ID: 136173026
The deterioration of concrete, steel, and timber is a serious hindrance to construction in marine and corrosive environments…
Expand
1999
1999
The Piling-Up Lemma and Dependent Random Variables
Z. Kukorelly
IMA Conference on Cryptography and Coding
1999
Corpus ID: 46020335
In a linear cryptanalysis attack, several assumptions are made by the attacker. One of them is that the threefold sums used in…
Expand
1996
1996
Precise on-site positioning of a piling rig.
D. Seward
,
J. R. Ward
,
J. Findlay
,
H. Kinniburgh
1996
Corpus ID: 112310790
1987
1987
Timber Piling Barrier and Chemical Preservation Annual Costs Comparison.
D. Pendleton
,
T. O’Neill
1987
Corpus ID: 106618493
Abstract : The currently recommended means of controlling marine borer damage of timber piling by chemical preservative systems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE