Showing 1 - 20 results of 111 for search '(("topographic" OR ("cryptographic" OR "typography")) OR "tomographic")', query time: 0.12s Refine Results
  1. 1

    Tomorrow's Typography by van de Seyp, Vera

    Published 2024
    “…This thesis is an exploration for new tools for typography that investigates how emerging (AI) technologies can contribute to the type design practice in a meaningful way. …”
    Get full text
    Thesis
  2. 2

    Generation of good cryptographic substitution-boxes by Ong, Wee Hern

    Published 2020
    “…This research aimed to create a cryptographically strong and efficient 8-by-8 bit Sbox from numerous candidate 8-by-8 bit Sboxes. …”
    Get full text
    Final Year Project (FYP)
  3. 3
  4. 4

    Tomographic completeness and robustness of quantum reservoir networks by Krisnanda, Tanjung, Xu, Huawen, Ghosh, Sanjib, Liew, Timothy Chi Hin

    Published 2023
    “…We develop a method to assess a tomographic completeness criterion for arbitrary quantum reservoir architectures. …”
    Get full text
    Journal Article
  5. 5

    Mapping nanoscale topographic features in thick tissues with speckle diffraction tomography by Kang, Sungsam, Zhou, Renjie, Brelen, Marten, Mak, Heather K., Lin, Yuechuan, So, Peter T. C., Yaqoob, Zahid

    Published 2024
    “…Most importantly, we performed volumetric imaging of cornea inside an ex vivo rat eye and quantified its optical properties, including the mapping of nanoscale topographic features of Dua’s and Descemet’s membranes that had not been previously visualized.…”
    Get full text
    Article
  6. 6

    Typeical Singapore : tracing Singapore's history through vernacular typography by Effendy, Wynne Celina

    Published 2018
    “…Typography plays a part in shaping a nation’s identity. …”
    Get full text
    Final Year Project (FYP)
  7. 7

    Foundational Integration Verification of a Cryptographic Server by Erbsen, Andres, Philipoom, Jade, Jamner, Dustin, Lin, Ashley, Gruetter, Samuel, Pit-Claudel, Clément, Chlipala, Adam

    Published 2024
    “…Our case study is a simple cryptographic server for flipping of a bit of state through public-key authenticated network messages, and its proof shows total functional correctness including static bounds on memory usage. …”
    Get full text
    Article
  8. 8
  9. 9

    Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries by Blessing, Jenny, Specter, Michael A., Weitzner, Daniel J.

    Published 2024
    “…Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. …”
    Get full text
    Article
  10. 10
  11. 11

    Impact of hypertension on retinal capillary microvasculature using optical coherence tomographic angiography by Chua, Jacqueline, Chin, Calvin Woon Loong, Hong, Jimmy, Chee, Miao Li, Le, Thu-Thao, Ting, Daniel Shu Wei, Wong, Tien Yin, Schmetterer, Leopold

    Published 2020
    “…We measured the retinal capillary density using noninvasive optical coherence tomographic angiography (OCT-A) in adults with treated systemic hypertension and determined possible correlations with ambulatory blood pressure (BP) and renal parameters. …”
    Get full text
    Journal Article
  12. 12
  13. 13
  14. 14
  15. 15

    A computerized template-driven news-layout system for newspapers. by Kan, Hsin-Kuo

    Published 2009
    Subjects: “…Newspaper layout and typography Data processing…”
    Get full text
    Thesis
  16. 16

    Types unite by Chow, Yean Li

    Published 2023
    “…In this project, a literature review on bilingual typography and its related projects were conducted with concurrent fieldwork on Singapore’s bilingual typography landscape. …”
    Get full text
    Final Year Project (FYP)
  17. 17

    Development of a power-efficient low-cost cryptosystem for secured embedded systems by Pua, Yi Cheng.

    Published 2009
    “…As internet connectivity becomes more and more ubiquitous and the number of embedded devices that are able to connect to the internet keeps on growing, it is imperative that these devices are able to achieve a level of cryptographic security comparative to that of a desktop computer in order to perform transactions which require cryptographic protection, for example Internet Banking and online shopping. …”
    Get full text
    Final Year Project (FYP)
  18. 18

    Pseudo-randomness in cryptography by Bansal Arushi

    Published 2024
    “…The analysis reveals how these vulnerabilities can be exploited, undermining the security of their cryptographic applications. The paper also attacks the RC4 stream cipher, which relies on the randomness of its keystream for security, further illustrating the wide-ranging impact of insufficient pseudo-randomness on cryptographic integrity. …”
    Get full text
    Final Year Project (FYP)
  19. 19

    Topography-incorporated adjoint-state surface wave Traveltime tomography: method and a case study in Hawaii by Hao, Shijie, Chen, Jing, Xu, Mijian, Tong, Ping

    Published 2024
    “…Specifically, recognizing that large topographic variations and high surface wave frequencies can make the topographic effect too significant to ignore, we employ an elliptically anisotropic eikonal equation to describe the traveltime fields of surface waves on undulated topography. …”
    Get full text
    Journal Article
  20. 20

    DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers by Sim, Siang Meng, Jap, Dirmanto, Bhasin, Shivam

    Published 2021
    “…Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations. DPA is applicable to many cryptographic primitives, including block ciphers, stream ciphers and even hash-based message authentication code (HMAC). …”
    Get full text
    Journal Article