Search alternatives:
"topographic" » "topography" (Expand Search), "holographic" (Expand Search), "ethnographic" (Expand Search)
"cryptographic" » "cryptography" (Expand Search), "crystallographic" (Expand Search)
"typography" » "topography" (Expand Search), "tomography" (Expand Search), "cryptography" (Expand Search)
"tomographic" » "demographic" (Expand Search), "tomography" (Expand Search), "holographic" (Expand Search)
"topographic" » "topography" (Expand Search), "holographic" (Expand Search), "ethnographic" (Expand Search)
"cryptographic" » "cryptography" (Expand Search), "crystallographic" (Expand Search)
"typography" » "topography" (Expand Search), "tomography" (Expand Search), "cryptography" (Expand Search)
"tomographic" » "demographic" (Expand Search), "tomography" (Expand Search), "holographic" (Expand Search)
-
1
Tomorrow's Typography
Published 2024“…This thesis is an exploration for new tools for typography that investigates how emerging (AI) technologies can contribute to the type design practice in a meaningful way. …”
Get full text
Thesis -
2
Generation of good cryptographic substitution-boxes
Published 2020“…This research aimed to create a cryptographically strong and efficient 8-by-8 bit Sbox from numerous candidate 8-by-8 bit Sboxes. …”
Get full text
Final Year Project (FYP) -
3
-
4
Tomographic completeness and robustness of quantum reservoir networks
Published 2023“…We develop a method to assess a tomographic completeness criterion for arbitrary quantum reservoir architectures. …”
Get full text
Journal Article -
5
Mapping nanoscale topographic features in thick tissues with speckle diffraction tomography
Published 2024“…Most importantly, we performed volumetric imaging of cornea inside an ex vivo rat eye and quantified its optical properties, including the mapping of nanoscale topographic features of Dua’s and Descemet’s membranes that had not been previously visualized.…”
Get full text
Article -
6
Typeical Singapore : tracing Singapore's history through vernacular typography
Published 2018“…Typography plays a part in shaping a nation’s identity. …”
Get full text
Final Year Project (FYP) -
7
Foundational Integration Verification of a Cryptographic Server
Published 2024“…Our case study is a simple cryptographic server for flipping of a bit of state through public-key authenticated network messages, and its proof shows total functional correctness including static bounds on memory usage. …”
Get full text
Article -
8
Cryptographically Secure Shield for Security IPs Protection
Published 2017Subjects: “…Cryptographically secure shield…”
Get full text
Get full text
Journal Article -
9
Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
Published 2024“…Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. …”
Get full text
Article -
10
Cache refinement type for side-channel detection of cryptographic software
Published 2023Get full text
Conference Paper -
11
Impact of hypertension on retinal capillary microvasculature using optical coherence tomographic angiography
Published 2020“…We measured the retinal capillary density using noninvasive optical coherence tomographic angiography (OCT-A) in adults with treated systemic hypertension and determined possible correlations with ambulatory blood pressure (BP) and renal parameters. …”
Get full text
Journal Article -
12
Optical tomographic system based on complementary metal oxide semiconductor area image sensor /
Published 2016software, multimedia -
13
Photo-acoustic tomographic image reconstruction from reduced data using physically inspired regularization
Published 2021Get full text
Journal Article -
14
Optical tomographic system based on complementary metal oxide semiconductor area image sensor [electronic resource] /
Published 2016software, multimedia -
15
A computerized template-driven news-layout system for newspapers.
Published 2009Subjects: “…Newspaper layout and typography Data processing…”
Get full text
Thesis -
16
Types unite
Published 2023“…In this project, a literature review on bilingual typography and its related projects were conducted with concurrent fieldwork on Singapore’s bilingual typography landscape. …”
Get full text
Final Year Project (FYP) -
17
Development of a power-efficient low-cost cryptosystem for secured embedded systems
Published 2009“…As internet connectivity becomes more and more ubiquitous and the number of embedded devices that are able to connect to the internet keeps on growing, it is imperative that these devices are able to achieve a level of cryptographic security comparative to that of a desktop computer in order to perform transactions which require cryptographic protection, for example Internet Banking and online shopping. …”
Get full text
Final Year Project (FYP) -
18
Pseudo-randomness in cryptography
Published 2024“…The analysis reveals how these vulnerabilities can be exploited, undermining the security of their cryptographic applications. The paper also attacks the RC4 stream cipher, which relies on the randomness of its keystream for security, further illustrating the wide-ranging impact of insufficient pseudo-randomness on cryptographic integrity. …”
Get full text
Final Year Project (FYP) -
19
Topography-incorporated adjoint-state surface wave Traveltime tomography: method and a case study in Hawaii
Published 2024“…Specifically, recognizing that large topographic variations and high surface wave frequencies can make the topographic effect too significant to ignore, we employ an elliptically anisotropic eikonal equation to describe the traveltime fields of surface waves on undulated topography. …”
Get full text
Journal Article -
20
DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers
Published 2021“…Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations. DPA is applicable to many cryptographic primitives, including block ciphers, stream ciphers and even hash-based message authentication code (HMAC). …”
Get full text
Journal Article