Loading...
Search for: sarmadi--hassan
0.113 seconds

    Effects of Thickness and Compressive Strength on The Behavior of Corrugated Fiber-Reinforced Concrete Shear Wall in a Steel Frame

    , M.Sc. Thesis Sharif University of Technology Sarmadi, Shayan (Author) ; Mofid, Massoud (Supervisor)
    Abstract
    Seismic loads are still a challenge for structures and engineers invent and provide seismic resisting systems to resist better against it. Concrete shear walls are well-known seismic resisting system that has had an acceptable performance in occurred seismic events. This system costs noticeable amount of time and material. Fiber-reinforced concretes can be useful to reduce negative effects and provides more positive effects like tensile strength, ductility, impact resisting and etc. Also changes in wall appearance such as corrugating helps to improve shear wall performance as it improves other kinds of plates and shell shaped members in structures. In this thesis, the focus is on “corrugated... 

    Estimating the Price Elasticity of Residential Water Demand in Tehran

    , M.Sc. Thesis Sharif University of Technology Sarmadi, Ata (Author) ; Vesal, Mohammad (Supervisor)
    Abstract
    While Tehran’s urban water distribution network covers the entire city, not all areas within the city have a sewage collection network. As a result, citizens experience varying water prices. This study intends to estimate the price elasticity of water for household use by analyzing a significant increase in the sewage collection service fee that occurred in October 2015. The unequal access to the sewer network allows us to establish causal identification using the difference in differences method, while also giving us a way to control for the influence of endogeneity caused by block pricing. We estimate the price elasticity of water in Tehran to fall within the range of 0.067 to 0.080  

    High-throughput low-complexity systolic montgomery multiplication over GF(2m) Based on Trinomials

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 62, Issue 4 , January , 2015 , Pages 377-381 ; 15497747 (ISSN) Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Cryptographic computation exploits finite field arithmetic and, in particular, multiplication. Lightweight and fast implementations of such arithmetic are necessary for many sensitive applications. This brief proposed a low-complexity systolic Montgomery multiplication over GF(2m). Our complexity analysis shows that the area complexity of the proposed architecture is reduced compared with the previous work. This has also been confirmed through our application-specific integrated circuit area and time equivalent estimations and implementations. Hence, the proposed architecture appears to be very well suited for high-throughput low-complexity cryptographic applications  

    An efficient low-latency point-multiplication over curve25519

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 66, Issue 10 , 2019 , Pages 3854-3862 ; 15498328 (ISSN) Salarifard, R ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The elliptic curve cryptography (ECC) has gained attention mainly due to its lower complexity compared to other asymmetric methods while providing the same security level. The most performance critical operation in ECC is the point multiplication. Thus, its efficient implementation is desirable. One of the most secure and lightweight ECC curves, which satisfies all standard security criteria, is the Curve25519. In this paper, a low latency Karatsuba-Ofman-based field multiplier (KOM) and an efficient point multiplication over Curve25519 have been proposed. The improvements have been achieved mainly due to the proposed low latency pipelined KOM and efficient scheduling of field operations.... 

    Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE

    , Article 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020, 19 August 2020 through 20 August 2020 ; 2020 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade,... 

    Lightweight and fault-resilient implementations of binary ring-lwe for iot devices

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 8 , 2020 , Pages 6970-6978 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    While the Internet of Things (IoT) shapes the future of the Internet, communications among nodes must be secured by employing cryptographic schemes such as public-key encryption (PKE). However, classic PKE schemes, such as RSA and elliptic curve cryptography (ECC) suffer from both high complexity and vulnerability to quantum attacks. During the past decade, post-quantum schemes based on the learning with errors (LWEs) problem have gained high attention due to the lower complexity among PKE schemes. In addition to resistance against theoretical (quantum and classic) attacks, every practical implementation of any cryptosystem must also be evaluated against different side-channel attacks such... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 13 , 2021 , Pages 10706-10713 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    User and device biometrics are proven to be a reliable source for authentication, especially for the Internet-of-Things (IoT) applications. One of the methods to employ biometric data in authentication are fuzzy extractors (FE) that can extract cryptographically secure and reproducible keys from noisy biometric sources with some entropy loss. It has been shown that one can reliably build an FE based on the learning parity with noise (LPN) problem with higher error-tolerance than previous FE schemes. However, the only available LPN-based FE implementation suffers from extreme resource demands that are not practical for IoT devices. This article proposes a lightweight hardware/software (HW/SW)... 

    MISC: multi-input secure two-party computation

    , Article ISeCure ; Volume 15, Issue 2 , 2023 ; 20082045 (ISSN) Taheri, F ; Bayat Sarmadi, S ; Sharif University of Technology
    Iranian Society of Cryptology  2023
    Abstract
    Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use Yao’s garbled circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocol. In this paper, we propose MISC, a multi-input secure computation protocol, by combining GC and GMW in a novel way. MISC can evaluate multi-input AND gates, which can reduce the round complexity. Moreover, MISC reduces the communication overhead by 1.7× and 2.4× for 2-input and by 2× and 2.8× for 4-input AND gates compared to the state-of-the-art GMW-style and GC-style protocols, respectively. In order to use the MISC efficiently in different applications, we... 

    Utilization of molecular dynamics simulation coupled with experimental assays to optimize biocompatibility of an electrospun PCL/PVA scaffold

    , Article PLoS ONE ; Volume 12, Issue 1 , 2017 ; 19326203 (ISSN) Sarmadi, M ; Shamloo, A ; Mohseni, M ; Sharif University of Technology
    Public Library of Science  2017
    Abstract
    The main focus of this study is to address the possibility of using molecular dynamics (MD) simulation, as a computational framework, coupled with experimental assays, to optimize composite structures of a particular electrospun scaffold. To this aim, first, MD simulations were performed to obtain an initial theoretical insight into the capability of heterogeneous surfaces for protein adsorption. The surfaces were composed of six different blends of PVA (polyvinyl alcohol) and PCL (polycaprolactone) with completely unlike hydrophobicity. Next, MTT assay was performed on the electrospun scaffolds made from the same percentages of polymers as in MD models to gain an understanding of the... 

    A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

    , M.Sc. Thesis Sharif University of Technology Shekofteh, Nastaran (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Hardware Trojans have emerged as a major concern for integrated circuits in recent years. As a result, detecting Trojans has become an important issue in critical applications, such as finance and health. In this work, a trusted platform for detecting Trojans in FPGA bitstreams is presented. The proposed methodology takes advantage of increased Trojan activation, caused by transition aware partitioning of the circuit, while it benefits partial reconfiguration feature of FPGAs to reduce area overhead. Simulation results, performed for the transition probability thresholds of 〖10〗^(-4) and 〖2×10〗^(-5), show that this method increases the ratio of the number of transitions in the Trojan... 

    Performance Evaluation of Physical Unclonable Functions and Proposing a Scheme on FPGA

    , M.Sc. Thesis Sharif University of Technology Ramezani, Alireza (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    In recent years, in addition to traditional cryptographic blocks, a hardware blocks in this work namely PUF, has been used mostly for chip ID generation, authentication and so on. In this work we study recent proposed PUFs and their implementations on FPGA, and the measurement of quality metrics on them. Some of most important characteristics of PUFs are unpredictability, reliability, number of challenge response pairs and area. According to experiments that have been performed in this study and also according to previous work, one high-quality PUF in term of uniqueness and reliability is Ring Oscillator PUF. However, the disadvantage of this PUF is small number of challenge and response... 

    Increasing BIOS Trust in Personal Computers Using Reconfigurable Devices

    , M.Sc. Thesis Sharif University of Technology Eslampanah, Marziye (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the expansion of digital system threats, trusted computation with a new approach for countering such threats has emerged. This approach is based on using a hardware module for implementing a trusted platform (TPM). TPM includes a chipset and the trusted systems core. Nowadays many of mobile computers do include this technology. This hardware creates trust using a trust chain and expanding this trust to other parts of the system. The starting point in this chain is the computer BIOS. BIOS is the first code that the system usually executes. One of the most powerful recent attacks on computer systems is to infect the BIOS and other firmware. One of such complicated attacks is the rootkit... 

    Efficient Implementation of Post-Quantum Cryptography Based on Learning with Errors

    , Ph.D. Dissertation Sharif University of Technology Ebrahimi, Shahriar (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Public key encryption (PKE) cryptography plays a big role in securing communication channels of internet. The security of every PKE scheme is usually based on a hard problem that has no polynomial time solution using any computational structure. However, widely used classic PKE schemes such as RSA or ECC, are based on hard problems that have polynomial solutions using a quantum computer. Therefore, such PKE schemes will not be secure in post-quantum era. Among quantum-resistant schemes, lattice-based cryptography and especially learning with errors (LWE) problem have gained high attention due to their low computational complexity. In this thesis, different LWE-based cryptosystems are... 

    Implementation of an IoT Edge Computing Module in Compliance with TPM Standards

    , M.Sc. Thesis Sharif University of Technology Hasanizadeh, Parisa (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Cloud computing has a significant role in expanding applications of the Internet of Things (IoT). Currently, applications such as virtual reality and augmented reality require low latency, which is not achievable using traditional cloud computing in some scenarios. Edge computing is a new approach in IoT, which solves some of the limitations of the cloud computing by extending and developing its operations. Reducing response time and network traffic are some of the most important achievements of edge computing. Despite of its numerous advantages over cloud computing, edge computing faces serious challenges such as virtualization, implementation infrastructure, resource allocation and task... 

    Improving Remote Attestation Techniques for IoT Devices using Physical Model

    , M.Sc. Thesis Sharif University of Technology Salehi, Mohsen (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the widespread growth in the use of IoT devices, authors consider these devices as an attractive target platform. Several approaches have been proposed to defend IoT devices against various attacks. However, most of them suffer from some shortcomings such as being computationally expensive, not being general, or not being robust enough.Due to the attacks such as firmware modification and the existence of computational limitations, the use of local approaches is inefficient. Another approach is to use remote attestation techniques, which are divided into two categories, static and dynamic. However, static detection techniques are vulnerable to runtime attacks. Furthermore, existing... 

    Customizing a Privacy-Preserving Blockchain-Based Distributed Ledger for Second-Price Auction Smart Contract

    , M.Sc. Thesis Sharif University of Technology Mirzaei, Amir (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    A distributed ledger is a method of digital data storage and sharing in different places, and the blockchain technology is a way of implementing a distributed ledger. This technology has been employed in many of the cryptocurrencies like Ethereum to store transactions. In addition to storing transactions, Ethereum deploys scripts called smart contracts that are automatically executable. These scripts execute transparently and without preserving the privacy of participants. On the other hand, confidentiality and privacy are among the important components in data, network, and system security. Models such as Hawk and Enigma have been presented to obtain privacy-preserving in smart contracts;... 

    Network Traffic Reduction in Internet of Things Using Reconfigurable Cache based on Workload Characterization

    , M.Sc. Thesis Sharif University of Technology Rezaei, Rezvan (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Nowadays, with the advancement of internet of things, The number of nodes within the network has increased and there is huge traffic in these networks despite the small volume of data sent and received each node. The current architecture of the Internet network does not have the functionality required for Internet of things, as a result of designing a new architecture for Internet - based Internet of things. Content - based network is a new architecture introduced to the Internet, and its purpose is to change the network from host-centric to content-centric. One of the features of content-based networks is the use of in network caching that helps increase productivity and reduce the traffic... 

    Implementation of Remote Attestation Mechanism on Internet of Things End-Nodes using TPM

    , M.Sc. Thesis Sharif University of Technology Daghlavi, Khaled (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Today Internet of Things (IoT) applications are growing rapidly around us and alongside this trend, the topics of security and trust in this field are getting more serious. A big part of this field is composed of embedded systems. Remote attestation is a prominent security option in regards of attesting to the integrity of these type of systems and consequently establishing trust remotely. Remote attestation has been an active field of research to attest different type of systems against various types of threats. A noteworthy security hardware, enabling this type of process, is the Trusted Platform Module (TPM). Incorporating this chip in traditional personal computers for security purposes... 

    Structural Design of a Launch Vehicle with Reusable First Stage

    , M.Sc. Thesis Sharif University of Technology Hassan Jamaklu (Author) ; Haddadpour, Hassan (Supervisor)
    Abstract
    Aerodynamics loads and aeroheating during reentry, are one of the challenging issues in designing One of the main challenges in the design and application of reusable spacecrafts is the aerodynamic and thermal loads acting on their structures during reentry into the atmosphere. For this reason, all the concepts/prototypes presented in the 20th century were either not fully reusable, or were partially canceled, or did not have economic justification. In this report, the aerodynamic loads on the first stage of a launch vehicle during the launch and return phases have been investigated. Due to the fact that the main part of the first stage of the vehicle includes fuel and oxidizer tanks, the...