Browsing Theses by Title
Now showing items 12887-12906 of 15526
-
Side Channel Analysis of a Java-based Contactless Smart Card
(University of Waterloo, 2012-04-30)Smart cards are widely used in different areas of modern life including identification, banking, and transportation cards. Some types of cards are able to store data and process information as well. A number of them can ... -
Side Channel Attack on Low Power FPGA Platform
(University of Waterloo, 2016-08-31)In today's advanced electronic age, people have become accustomed to using electronic devices to store and process their information. There is a general belief that the information is safe, due to the use of mathematically ... -
Side Channel Information Leakage: Design and Implementation of Hardware Countermeasure
(University of Waterloo, 2010-01-21)Deployment of Dynamic Differential Logics (DDL) appears to be a promising choice for providing resistance against leakage of side channel information. However, the resistance provided by these logics is too costly for ... -
Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging
(University of Waterloo, 2013-05-01)Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile ... -
Side-Channel Monitoring of Contactless Java Cards
(University of Waterloo, 2008-01-24)Smart cards are small, portable, tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks, which use clues from timing, ... -
The Sidney Effect: Competitive Youth Hockey and Fantasy Relationships
(University of Waterloo, 2009-04-30)This thesis explores how a group of 17 male youth athletes, and their families, experience competitive hockey. Many of the youths seem to forge fantasy relationships with hockey celebrities, heroes, and stars -- e.g. ... -
Sidon and Kronecker-like sets in compact abelian groups
(University of Waterloo, 2019-06-07)Let $G$ be a compact abelian group and $\Ga$ be its discrete dual group. In this thesis we study various types of interpolation sets. A subset $E \subset \Ga$ is Sidon if every bounded function on $E$ can be interpolated ... -
Sift
(University of Waterloo, 2015-05-01)Sift is a suite of drawings that serves as a personal record of a long hike in Iceland. Through an exploration of sediment as a metaphor, and the use of sedimentation as a drawing process, I am sifting through matter and ... -
Sift: Achieving Resource-Efficient Consensus with RDMA
(University of Waterloo, 2019-04-30)Sift is a new consensus protocol for replicating state machines. It disaggregates CPU and memory consumption by creating a novel system architecture enabled by one-sided RDMA operations. We show that this system architecture ... -
SiGe/Si Heterojunction Internal Photoemission Separate Absorption and Multiplication Avalanche Middle Wavelength Infrared Photodiode
(University of Waterloo, 2014-08-29)Separate-absorption-and-multiplication (SAM) Avalanche PhotoDiode (APD) is widely accepted in optical communication systems due to the presence of large photocurrent gain. In this thesis, a designed SAM middle wavelength ... -
The Sigma-Delta Modulator as a Chaotic Nonlinear Dynamical System
(University of Waterloo, 2007-01-23)The sigma-delta modulator is a popular signal amplitude quantization error (or noise) shaper used in oversampling analogue-to-digital and digital-to-analogue converter systems. The shaping of the noise frequency spectrum ... -
Signal Processing for Trace-based Anomaly Detection in Embedded Software
(University of Waterloo, 2016-01-21)Embedded operating systems generate a log of operating system function calls which we refer to as traces. Trace-based anomaly detection deals with the problem of determining whether or not an instance of traces represents ... -
Signaling in Frequency Selective Gaussian Interference Channels
(University of Waterloo, 2013-08-22)Sharing communication resources in wireless communication networks, due to the ever increasing growth in the number of users and the growing demand for higher data rates, appears to be inevitable. Consequently, present ... -
Signature Event C*ntext
(University of Waterloo, 2008-01-25)This thesis examines how context in Derridean signature theory is taboo and underutilized, and calls signature theory to embrace the contaminating mark of context. Signature theory, as proposed by Jacques Derrida and Peggy ... -
Signature Schemes in the Quantum Random-Oracle Model
(University of Waterloo, 2017-04-25)A signature scheme is a fundamental component in modern digital communication. It allows for authenticated messages, without which it would be nearly impossible to ensure security when using most modern technologies. ... -
Signatures of New Physics from the Primordial Universe
(University of Waterloo, 2007-08-29)During inflation quantum fluctuations of the field driving inflation, known as inflaton, were stretched by inflationary expansion to galactic size scales or even larger. A possible implication of inflation -- if it is ... -
Significance of Methylthioadenosine Metabolism to Plant Growth and Development
(University of Waterloo, 2012-01-24)Arabidopsis thaliana contains two genes annotated as methylthioadenosine nucleosidases (MTN): MTN1, At4g38800 and MTN2, At4g34840. This enzyme activity hydrolyzes the methylthioadenosine (MTA) produced by nicotianamine ... -
The Significance of Place in the Contemporary Theological Discourse of Heaven
(University of Waterloo, 2015-01-07)This study will offer a critical assessment of the hearings of heaven in contemporary theological discourse. After engaging with various eschatological perspectives that pertain to the contemporary discussion of heaven, I ... -
Significant Feature Clustering
(University of Waterloo, 2006)In this thesis, we present a new clustering algorithm we call <em>Significance Feature Clustering</em>, which is designed to cluster text documents. Its central premise is the mapping of raw frequency count vectors ... -
Signing with Codes
(University of Waterloo, 2014-01-22)Code-based cryptography is an area of classical cryptography in which cryptographic primitives rely on hard problems and trapdoor functions related to linear error-correcting codes. Since its inception in 1978, the area ...