Loading...
Search for:
moradi--a
0.007 seconds
Improving the energy efficiency of reversible logic circuits by the combined use of adiabatic styles
, Article Integration, the VLSI Journal ; Volume 44, Issue 1 , January , 2011 , Pages 12-21 ; 01679260 (ISSN) ; Ejlali, A ; Moradi, A ; Sharif University of Technology
2011
Abstract
One of the most prominent issues in fully adiabatic circuits is the breaking reversibility problem; i.e., non-adiabatic energy dissipation in the last stage adiabatic gates whose outputs are connected to external circuits. In this paper, we show that the breaking reversibility problem can result in significant energy dissipation. Subsequently, we propose an efficient technique to address the breaking reversibility problem, which is applicable to the usual fully adiabatic logic such as 2LAL, SCRL, and RERL. Detailed SPICE simulations are used to evaluate the proposed technique. The experimental results show that the proposed technique can considerably reduce (e.g., about 74% for RERL, 35% for...
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems
, Article Security and Communication Networks ; Volume 6, Issue 2 , 2013 , Pages 161-172 ; 19390122 (ISSN) ; Salmasizadeh, M ; Mohajeri, J ; Moradi, A ; Sharif University of Technology
2013
Abstract
In pseudonym systems, users by means of pseudonyms anonymously interact with organizations to obtain credentials. The credential scheme constructed by Lysyanskaya and Camenisch is among the most complete credential systems, in which "all-or-nothing" sharing scheme is used to prevent users sharing their credentials. If a user cannot directly show a credential issued by an organization, she or he has to give her or his own secret key to someone else as a proxy; afterward, the proxy can show the credential on behalf of the user. Thus, according to the all-or-nothing property of the system, having the user's secret key, the proxy can use all credentials of the user for itself. To solve this...
Control of planar motion of a magnetic microrobot using a novel electromagnetic actuation system
, Article 4th International Conference on Manipulation, Automation, and Robotics at Small Scales, MARSS 2019, 1 July 2019 through 5 July 2019 ; 2019 ; 9781728109473 (ISBN) ; Moradi, A ; Nejat Pishkenari, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
A magnetic actuation system is a promising tool for untethered manipulation at the microscale that medical treatment can benefit from. This paper proposes a new magnetic actuation system that comprises of two coaxial coils on a rotary table. A fixed workspace is placed between coils. The proposed system is able to generate magnetic force with desired direction and magnitude in a plane. The conducted simulation and experiment confirm the capability of the proposed system to control the position of the microrobot. © 2019 IEEE
A secure and low-energy logic style using charge recovery approach
, Article ISLPED'08: 13th ACM/IEEE International Symposium on Low Power Electronics and Design, Bangalore, 11 August 2008 through 13 August 2008 ; 2008 , Pages 259-264 ; 15334678 (ISSN); 9781605581095 (ISBN) ; Moradi, A ; Ejlali, A ; Manzuri Shalmani, M. T ; Salmasizadeh, M ; Sharif University of Technology
2008
Abstract
The charge recovery logic families have been designed several years ago not in order to eliminate the side-channel leakage but to reduce the power consumption. However, in this article we present a new charge recovery logic style not only to gain high energy efficiency but also to achieve the resistance against side-channel attacks especially against differential power analysis attacks. Our approach is a modified version of a classical charge recovery logic style namely 2N-2N2P. Simulation results show a significant improvement in DPA-resistance level as well as in power consumption reduction in comparison with 2N-2N2P and other DPA-resistant logic styles. Copyright 2008 ACM
Compact and secure design of masked AES S-box
, Article 9th International Conference on Information and Communications Security, ICICS 2007, Zhengzhou, 12 December 2007 through 15 December 2007 ; Volume 4861 LNCS , 2007 , Pages 216-229 ; 03029743 (ISSN); 9783540770473 (ISBN) ; Salmasizadeh, M ; Moradi, A ; Tabandeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
Springer Verlag
2007
Abstract
Composite field arithmetic is known as an alternative method for lookup tables in implementation of S-box block of AES algorithm. The idea is to breakdown the computations to lower order fields and compute the inverse there. Recently this idea have been used both for reducing the area in implementation of S-boxes and masking implementations of AES algorithm. The most compact design using this technique is presented by Canright using only 92 gates for an S-box block. In another approach, IAIK laboratory has presented a masked implementation of AES algorithm with higher security comparing common masking methods using Composite field arithmetic. Our work in this paper is to use basic ideas of...
Error reduction using prediction residual matrices in fast block motion estimation
, Article 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, 18 December 2005 through 21 December 2005 ; Volume 2005 , 2005 , Pages 595-599 ; Moradi, A ; Kasaei, S ; Manzuri Shalmani, M. T ; Sharif University of Technology
2005
Abstract
In this paper, we have introduced a new approach to deal with motion estimation block distortion measure (BDM) which has a great role in performance comparison of various methods. The proposed method generates lower BDM, by employing transformed matrices of original frames to compute motion vectors regardless of the algorithm employed as motion estimator. Our experimental results that use the semi DPCM predictor residual matrices as the transformation tool, justify the proposed approach. © 2005 IEEE
On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme
, Article 28th Annual International Cryptology Conference, CRYPTO 2008, Santa Barbara, CA, 17 August 2008 through 21 August 2008 ; Volume 5157 LNCS , 2008 , Pages 203-220 ; 03029743 (ISSN) ; 3540851739 (ISBN); 9783540851738 (ISBN) ; Kasper, T ; Moradi, A ; Paar, C ; Salmasizadeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
2008
Abstract
KeeLoq remote keyless entry systems are widely used for access control purposes such as garage openers or car door systems. We present the first successful differential power analysis attacks on numerous commercially available products employing KeeLoq code hopping. Our new techniques combine side-channel cryptanalysis with specific properties of the KeeLoq algorithm. They allow for efficiently revealing both the secret key of a remote transmitter and the manufacturer key stored in a receiver. As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in few minutes. After extracting the manufacturer key once, with similar techniques, we...
Antitumor effect of therapeutic HPV DNA vaccines with chitosan-based nanodelivery systems
, Article Journal of Biomedical Science ; Vol. 21, issue. 1 , July , 2014 ; ISSN: 10217770 ; Ghaemi, A ; Gorji, A ; Kalhor, H. R ; Sajadian, A ; Tabarraei, A ; Moradi, A ; Atyabi, F ; Kelishadi, M ; Sharif University of Technology
Abstract
Cervical cancer is the second-most-common cause of malignancies in women worldwide, and the oncogenic activity of the human papilloma virus types (HPV) E7 protein has a crucial role in anogenital tumors. In this study, we have designed a therapeutic vaccine based on chitosan nanodelivery systems to deliver HPV-16 E7 DNA vaccine, considered as a tumor specific antigen for immunotherapy of HPV-associated cervical cancer. We have developed a Nano-chitosan (NCS) as a carrier system for intramuscular administration using a recombinant DNA vaccine expressing HPV-16 E7 (NCS-DNA E7 vaccine). NCS were characterized in vitro for their gene transfection ability. Results: The transfection of CS-pEGFP...
Folic acid-adorned curcumin-loaded iron oxide nanoparticles for cervical cancer
, Article ACS Applied Bio Materials ; Volume 5, Issue 3 , 2022 , Pages 1305-1318 ; 25766422 (ISSN) ; Azarian, M ; Heydari Sheikh Hossein, H ; Abdolvahabi, Z ; Mohammadi Abgarmi, Z ; Moradi, A ; Mousavi, S. M ; Ashrafizadeh, M ; Makvandi, P ; Saeb, M. R ; Rabiee, N ; Sharif University of Technology
American Chemical Society
2022
Abstract
Cancer is a deadly disease that has long plagued humans and has become more prevalent in recent years. The common treatment modalities for this disease have always faced many problems and complications, and this has led to the discovery of strategies for cancer diagnosis and treatment. The use of magnetic nanoparticles in the past two decades has had a significant impact on this. One of the objectives of the present study is to introduce the special properties of these nanoparticles and how they are structured to load and transport drugs to tumors. In this study, iron oxide (Fe3O4) nanoparticles with 6 nm sizes were coated with hyperbranched polyglycerol (HPG) and folic acid (FA). The...