Search for: standard-technology
0.005 seconds

    Reliable hardware architectures for efficient secure hash functions ECHO and fugue

    , Article 15th ACM International Conference on Computing Frontiers, CF 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 204-207 ; 9781450357616 (ISBN) Mozaffari Kermani, M ; Azarderakhsh, R ; Bayat Sarmadi, S ; ACM Special Interest Group on Microarchitectural Research and Processing (SIGMICRO) ; Sharif University of Technology
    Association for Computing Machinery, Inc  2018
    In cryptographic engineering, extensive attention has been devoted to ameliorating the performance and security of the algorithms within. Nonetheless, in the state-of-the-art, the approaches for increasing the reliability of the efficient hash functions ECHO and Fugue have not been presented to date.We propose efficient fault detection schemes by presenting closed formulations for the predicted signatures of different transformations in these algorithms. These signatures are derived to achieve low overhead for the specific transformations and can be tailored to include byte/word-wide predicted signatures. Through simulations, we show that the proposed fault detection schemes are... 

    A provably secure code-based concurrent signature scheme

    , Article IET Information Security ; Volume 12, Issue 1 , 2018 ; 17518709 (ISSN) Rajabzadeh Asaar, M ; Ameri, M. H ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Concurrent signatures allow two entities to generate two signatures in such a way that both signatures are ambiguous till some information is revealed by one of the parties. This kind of signature is useful in auction protocols and in a wide range of scenarios in which involving participants are mutually distrustful. In this study, to have quantum-attack-resistant concurrent signatures as recommended by National Institute of Standards and Technology (NISTIR 8105), the first concurrent signature scheme based on coding theory is proposed. Then, its security is proved under Goppa Parameterized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model. In... 

    Integrated photonic neural network based on silicon metalines

    , Article Optics Express ; Volume 28, Issue 24 , 2020 , Pages 36668-36684 Zarei, S ; Marzban, M. R ; Khavasi, A ; Sharif University of Technology
    OSA - The Optical Society  2020
    An integrated photonic neural network is proposed based on on-chip cascaded one-dimensional (1D) metasurfaces. High-contrast transmitarray metasurfaces, termed as metalines in this paper, are defined sequentially in the silicon-on-insulator substrate with a distance much larger than the operation wavelength. Matrix-vector multiplications can be accomplished in parallel and with low energy consumption due to intrinsic parallelism and low-loss of silicon metalines. The proposed on-chip whole-passive fully-optical meta-neural-network is very compact and works at the speed of light, with very low energy consumption. Various complex functions that are performed by digital neural networks can be... 

    Effect of high-efficient electric motors on efficiency improvement and electric energy saving

    , Article 3rd International Conference on Deregulation and Restructuring and Power Technologies, DRPT 2008, Nanjing, 6 April 2008 through 9 April 2008 ; 2008 , Pages 533-538 ; 9787900714138 (ISBN) Zabardast, A ; Mokhtari, H ; Sharif University of Technology
    In this paper, advantages of energy-efficient motors over standard-motors in terms of electrical energy saving and demand reduction in a tire-rubber factory are thoroughly evaluated. Energy-efficient motors reduce losses because of their better design, materials, and manufacturing. These motors are 2 to 8% more efficient than standard ones. Lengthening the core and using lower-electrical-loss steel, thinner stator laminations, and more copper in the windings reduce electrical losses. Because a motor consumes energy worth 4 to 10 times its own cost each year, energy-efficient motors often make economic sense in a wide variety of applications. At the end of this study, the amount of energy... 

    Notice of violation of IEEE publication principles: Promoting B2B integration with semantic web service technologies

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 65-70 ; 9780769531366 (ISBN) Rokni Dezfouli, S. A ; Habibi, J ; Yeganeh, S. H ; Sharif University of Technology
    Several e-business frameworks are developed to define standards for information sharing within and between companies. These frameworks only standardize structure of messages and aren't able to define semantics. It leads to slow and costly dynamic Business-to-Business (B2B) integration. The use of Semantic Web Senice (SWS) technologies has been suggested to enable more dynamic B2B integration of heterogeneous systems and partners. We present a semantic B2B mediator based on the WSMX -a SWS execution environment, to tackle heterogeneities in B2B services. We particularly show how WSMX can be made to support the RosettaNet e-business framework and how it can add dynamics to B2B interactions by... 

    Optimal PMU placement for power system observability considering secondary voltage control

    , Article IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2008, Niagara Falls, ON, 4 May 2008 through 7 May 2008 ; 2008 , Pages 365-368 ; 08407789 (ISSN) ; 9781424416431 (ISBN) Mohammadi Ivatloo, B ; Hosseini, S. H ; Sharif University of Technology
    This paper presents an optimal phasor measurement units (PMUs) placement algorithm for the purpose of power system observability and also increasing the performance of secondary voltage control scheme. The optimal placement problem (OPP) is formulated such that to minimize the number of PMU installations subject to full network observability and monitoring pilot buses of the system to improve secondary voltage control performance. The branch and bound optimization method is adopted to solve the OPP problem which is suitable for problems with integer and boolean variables. Topology-based algorithm is used for observability analysis. Constraint functions considering adjacent zero-injection...