Showing 1 - 20 results of 121 for search '(("topographic" OR ("typographic" OR "cryptography")) OR "tomographic")', query time: 0.12s Refine Results
  1. 1

    Pseudo-randomness in cryptography by Bansal Arushi

    Published 2024
    Subjects:
    Get full text
    Final Year Project (FYP)
  2. 2

    Tomographic completeness and robustness of quantum reservoir networks by Krisnanda, Tanjung, Xu, Huawen, Ghosh, Sanjib, Liew, Timothy Chi Hin

    Published 2023
    “…We develop a method to assess a tomographic completeness criterion for arbitrary quantum reservoir architectures. …”
    Get full text
    Journal Article
  3. 3

    Mapping nanoscale topographic features in thick tissues with speckle diffraction tomography by Kang, Sungsam, Zhou, Renjie, Brelen, Marten, Mak, Heather K., Lin, Yuechuan, So, Peter T. C., Yaqoob, Zahid

    Published 2024
    “…Most importantly, we performed volumetric imaging of cornea inside an ex vivo rat eye and quantified its optical properties, including the mapping of nanoscale topographic features of Dua’s and Descemet’s membranes that had not been previously visualized.…”
    Get full text
    Article
  4. 4

    Black-box cryptography is dangerous III by Lee, Esther Yu Ling.

    Published 2013
    Subjects: “…DRNTU::Library and information science::Cryptography…”
    Get full text
    Final Year Project (FYP)
  5. 5
  6. 6

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This problem can be solved by encrypting the bitstream using Elliptic Curve Cryptography (ECC). In this project, an efficient ECC-based cryptosystem on FPGA is designed and implemented. …”
    Get full text
    Final Year Project (FYP)
  7. 7
  8. 8

    Impact of hypertension on retinal capillary microvasculature using optical coherence tomographic angiography by Chua, Jacqueline, Chin, Calvin Woon Loong, Hong, Jimmy, Chee, Miao Li, Le, Thu-Thao, Ting, Daniel Shu Wei, Wong, Tien Yin, Schmetterer, Leopold

    Published 2020
    “…We measured the retinal capillary density using noninvasive optical coherence tomographic angiography (OCT-A) in adults with treated systemic hypertension and determined possible correlations with ambulatory blood pressure (BP) and renal parameters. …”
    Get full text
    Journal Article
  9. 9

    Post-quantum attacks against symmetric-key cryptography systems by Pham, Thi Minh Phuong

    Published 2024
    “…Contemporary cryptography plays an essential role in the security of digital communication, internet, and data storage. …”
    Get full text
    Thesis-Doctor of Philosophy
  10. 10
  11. 11
  12. 12
  13. 13

    Speeding up secure web transactions using elliptic curve cryptography by Lim, Lai Koon.

    Published 2010
    “…Elliptic Curve Cryptography (ECC) is becoming an attractive alternative to traditional public-key cryptography systems like RSA, Digital Signature Algorithm (DSA) and Diffie-Hellman (DH) as ECC provides similar level of security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth savings. …”
    Get full text
    Final Year Project (FYP)
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    The do's and don'ts of quantum memory in cryptanalysis by Jaques, S

    Published 2023
    Subjects: “…cryptography…”
    Thesis
  20. 20

    Mastering Blockchain : Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3 / by Bashir, Imran, author 396608

    Published 2023
    “…Throughout the book, you’ll explore blockchain solutions beyond cryptocurrencies, such as the IoT with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology.By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios.What you will learnGrasp the mechanisms behind Bitcoin, Ethereum, and other cryptocurrenciesUnderstand cryptography and its usage in blockchainBecome familiar with the theoretical foundations of smart contracts and blockchain consensusDevelop DApps using Solidity, Remix, Truffle, and GanacheSolve issues relating to privacy, identity, scalability, and security in enterprise blockchainsDive into the architecture of Ethereum 2.0Delve into emerging trends like DeFi, NFTs, and MetaverseExplore various applications, research topics, and future directions of blockchain Who this book is for. …”
    Get full text
    Get full text
    software, multimedia