Loading...
Search for: azimi--s
0.004 seconds

    Photo-destruction of cancer cells by NIR irradiation and graphene nano-sheets

    , Article Technical Proceedings of the 2011 NSTI Nanotechnology Conference and Expo, NSTI-Nanotech 2011, 13 June 2011 through 16 June 2011, Boston, MA ; Volume 3 , 2011 , Pages 236-239 ; 9781439871386 (ISBN) Abdolahad, M ; Mohajerzadeh, S ; Janmaleki, M ; Akhavan, O ; Azimi, S ; Clean Technology and Sustainable Industries Organization (CTSI); European Patent Office; Greenberg Traurig; Innovation and Materials Science Institute; Jackson Walker L.L.P ; Sharif University of Technology
    2011
    Abstract
    The photo-thermal therapy using nano-materials has attracted great attention as an efficient strategy for the next generation of cancer treatments. Recently, photo-thermal therapy based on nano-materials that can be activated by a skin-penetrating NIR (Near Infra Red) irradiation has been suggested as a noninvasive, harmless, and highly efficient therapeutic technique. Graphene nano-layers synthesized by a bio-compatible method, with reduced toxicity, will be a suitable candidate for the photo-thermal therapeutic agent. A significant amount of heat is generated upon excitation with near-infrared light (NIR, 700-1100nm) which is transparent to biological species including skins. In this... 

    Impossible differential cryptanalysis of reduced-round TEA and XTEA

    , Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 58-63 ; 9781467376099 (ISBN) Hajari, M ; Azimi, S.A ; Aghdaie, P ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    TEA and XTEA are two lightweight Feistel block ciphers, each of which has a block size of 64 bits and a key size of 128 bits. These two ciphers have ARX structure, i.e. their round functions consist of modular addition, shift and XOR to be exact. Since each operation of TEA and XTEA can be done in a bitwise fashion, we are able to use early abort technique in the impossible differential attack that helps us to remove inappropriate pairs as soon as possible, hence decreasing time complexity. In this paper we present two new 15-round impossible differential characteristics, resulting in the first known impossible differential cryptanalysis mounted on 19 rounds of TEA and 25 rounds of XTEA  

    A computational model for estimation of mechanical parameters in chemotactic endothelial cells

    , Article Scientia Iranica ; Volume 23, Issue 1 , 2016 , Pages 260-267 ; 10263098 (ISSN) Kiyoumarsioskouei, A ; Shamloo, A ; Azimi, S ; Abeddoust, M ; Saidi, M.S ; Sharif University of Technology
    Sharif University of Technology 
    Abstract
    A cell migration numerical simulation is presented to mimic the motility of endothelial cells subjected to the concentration gradients of a Forebrain embryoniccortical neuron Conditioned Medium (CM). This factor was previously shflown to induce the directional chemotaxis of endothelial cells with an over-expressed G protein coupled receptor 124 (GPR 124). A cell simulator program incorporates basic elements of the cell cytoskeleton, including membrane, nucleus and cytoskeleton. The developed 2D cell model is capable of responding to concentration gradients of biochemical factors by changing the cytoskeleton arrangement. Random walk force, cell drag force and cell inertial effects are also... 

    Impossible differential cryptanalysis of reduced-round midori64 block cipher

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 31-36 ; 9781538665602 (ISBN) Rezaei Shahmirzadi, A ; Azimi, S. A ; Salmasizadeh, M ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Abstract
    Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both versions have key size equal to 128 bits.In this paper, we mainly study security of Midori64. To this end, we use various techniques such as early-abort, memory reallocation, miss-in-the-middle and turning to account the inadequate key schedule algorithm of Midori64. We first show two new 7-round impossible differential characteristics...