Loading...
Search for: sarmadi--morteza
0.135 seconds

    Feasibility Study on Fabrication of Copper-Graphite and Copper-Babbitt Composites by Friction Stir Processing (FSP)

    , M.Sc. Thesis Sharif University of Technology Sarmadi, Hassan (Author) ; Kokabi, Amir Hossein (Supervisor) ; Seyed Reihani, Morteza (Supervisor)
    Abstract
    Because of low friction coefficient, Copper-Graphite and Copper-Babbitt composites can be used as brushes and bearing materials instead of materials containing lead which cause environmental problems. So far, many methods such as powder metallurgy and centrifugal casting have been used to fabricate Copper-Graphite composites. The most important problem of these methods is agglomeration of Graphite particles. Simultaneous stirring of samples during fabrication process which is one of the features of friction stir processing (FSP), can solve the problem. Recently, FSP has been used for fabricating surface composite for the purpose of producing hard and wear resistance layers on ductile... 

    Effects of Thickness and Compressive Strength on The Behavior of Corrugated Fiber-Reinforced Concrete Shear Wall in a Steel Frame

    , M.Sc. Thesis Sharif University of Technology Sarmadi, Shayan (Author) ; Mofid, Massoud (Supervisor)
    Abstract
    Seismic loads are still a challenge for structures and engineers invent and provide seismic resisting systems to resist better against it. Concrete shear walls are well-known seismic resisting system that has had an acceptable performance in occurred seismic events. This system costs noticeable amount of time and material. Fiber-reinforced concretes can be useful to reduce negative effects and provides more positive effects like tensile strength, ductility, impact resisting and etc. Also changes in wall appearance such as corrugating helps to improve shear wall performance as it improves other kinds of plates and shell shaped members in structures. In this thesis, the focus is on “corrugated... 

    Estimating the Price Elasticity of Residential Water Demand in Tehran

    , M.Sc. Thesis Sharif University of Technology Sarmadi, Ata (Author) ; Vesal, Mohammad (Supervisor)
    Abstract
    While Tehran’s urban water distribution network covers the entire city, not all areas within the city have a sewage collection network. As a result, citizens experience varying water prices. This study intends to estimate the price elasticity of water for household use by analyzing a significant increase in the sewage collection service fee that occurred in October 2015. The unequal access to the sewer network allows us to establish causal identification using the difference in differences method, while also giving us a way to control for the influence of endogeneity caused by block pricing. We estimate the price elasticity of water in Tehran to fall within the range of 0.067 to 0.080  

    Ant colony algorithm for the shortest loop design problem [electronic resource]

    , Article Computers and Industrial Engineering, Elsevier ; Volume 50, Issue 4, August 2006, Pages 358–366 Eshghi, K. (Kourosh) ; Kazemi, Morteza ; Sharif University of Technology
    Abstract
    In this paper, a new algorithm for solving the shortest loop design problem is presented. The shortest loop design problem is to find the shortest loop for an automated guided vehicle covering at least one edge of each department of a block layout. In this paper, first it is shown that this problem can be represented as a graph model. The properties of the presented model enable us to design a meta-heuristic based on ant colony system algorithm for solving the shortest loop design problem. Computational results show the efficiency of our algorithm in compare to the other techniques  

    High-throughput low-complexity systolic montgomery multiplication over GF(2m) Based on Trinomials

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 62, Issue 4 , January , 2015 , Pages 377-381 ; 15497747 (ISSN) Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Cryptographic computation exploits finite field arithmetic and, in particular, multiplication. Lightweight and fast implementations of such arithmetic are necessary for many sensitive applications. This brief proposed a low-complexity systolic Montgomery multiplication over GF(2m). Our complexity analysis shows that the area complexity of the proposed architecture is reduced compared with the previous work. This has also been confirmed through our application-specific integrated circuit area and time equivalent estimations and implementations. Hence, the proposed architecture appears to be very well suited for high-throughput low-complexity cryptographic applications  

    An efficient low-latency point-multiplication over curve25519

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 66, Issue 10 , 2019 , Pages 3854-3862 ; 15498328 (ISSN) Salarifard, R ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The elliptic curve cryptography (ECC) has gained attention mainly due to its lower complexity compared to other asymmetric methods while providing the same security level. The most performance critical operation in ECC is the point multiplication. Thus, its efficient implementation is desirable. One of the most secure and lightweight ECC curves, which satisfies all standard security criteria, is the Curve25519. In this paper, a low latency Karatsuba-Ofman-based field multiplier (KOM) and an efficient point multiplication over Curve25519 have been proposed. The improvements have been achieved mainly due to the proposed low latency pipelined KOM and efficient scheduling of field operations.... 

    Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE

    , Article 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020, 19 August 2020 through 20 August 2020 ; 2020 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade,... 

    Lightweight and fault-resilient implementations of binary ring-lwe for iot devices

    , Article IEEE Internet of Things Journal ; Volume 7, Issue 8 , 2020 , Pages 6970-6978 Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    While the Internet of Things (IoT) shapes the future of the Internet, communications among nodes must be secured by employing cryptographic schemes such as public-key encryption (PKE). However, classic PKE schemes, such as RSA and elliptic curve cryptography (ECC) suffer from both high complexity and vulnerability to quantum attacks. During the past decade, post-quantum schemes based on the learning with errors (LWEs) problem have gained high attention due to the lower complexity among PKE schemes. In addition to resistance against theoretical (quantum and classic) attacks, every practical implementation of any cryptosystem must also be evaluated against different side-channel attacks such... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 13 , 2021 , Pages 10706-10713 ; 23274662 (ISSN) Ebrahimi, S ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    User and device biometrics are proven to be a reliable source for authentication, especially for the Internet-of-Things (IoT) applications. One of the methods to employ biometric data in authentication are fuzzy extractors (FE) that can extract cryptographically secure and reproducible keys from noisy biometric sources with some entropy loss. It has been shown that one can reliably build an FE based on the learning parity with noise (LPN) problem with higher error-tolerance than previous FE schemes. However, the only available LPN-based FE implementation suffers from extreme resource demands that are not practical for IoT devices. This article proposes a lightweight hardware/software (HW/SW)... 

    MISC: multi-input secure two-party computation

    , Article ISeCure ; Volume 15, Issue 2 , 2023 ; 20082045 (ISSN) Taheri, F ; Bayat Sarmadi, S ; Sharif University of Technology
    Iranian Society of Cryptology  2023
    Abstract
    Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use Yao’s garbled circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocol. In this paper, we propose MISC, a multi-input secure computation protocol, by combining GC and GMW in a novel way. MISC can evaluate multi-input AND gates, which can reduce the round complexity. Moreover, MISC reduces the communication overhead by 1.7× and 2.4× for 2-input and by 2× and 2.8× for 4-input AND gates compared to the state-of-the-art GMW-style and GC-style protocols, respectively. In order to use the MISC efficiently in different applications, we... 

    Utilization of molecular dynamics simulation coupled with experimental assays to optimize biocompatibility of an electrospun PCL/PVA scaffold

    , Article PLoS ONE ; Volume 12, Issue 1 , 2017 ; 19326203 (ISSN) Sarmadi, M ; Shamloo, A ; Mohseni, M ; Sharif University of Technology
    Public Library of Science  2017
    Abstract
    The main focus of this study is to address the possibility of using molecular dynamics (MD) simulation, as a computational framework, coupled with experimental assays, to optimize composite structures of a particular electrospun scaffold. To this aim, first, MD simulations were performed to obtain an initial theoretical insight into the capability of heterogeneous surfaces for protein adsorption. The surfaces were composed of six different blends of PVA (polyvinyl alcohol) and PCL (polycaprolactone) with completely unlike hydrophobicity. Next, MTT assay was performed on the electrospun scaffolds made from the same percentages of polymers as in MD models to gain an understanding of the... 

    A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

    , M.Sc. Thesis Sharif University of Technology Shekofteh, Nastaran (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Hardware Trojans have emerged as a major concern for integrated circuits in recent years. As a result, detecting Trojans has become an important issue in critical applications, such as finance and health. In this work, a trusted platform for detecting Trojans in FPGA bitstreams is presented. The proposed methodology takes advantage of increased Trojan activation, caused by transition aware partitioning of the circuit, while it benefits partial reconfiguration feature of FPGAs to reduce area overhead. Simulation results, performed for the transition probability thresholds of 〖10〗^(-4) and 〖2×10〗^(-5), show that this method increases the ratio of the number of transitions in the Trojan... 

    Performance Evaluation of Physical Unclonable Functions and Proposing a Scheme on FPGA

    , M.Sc. Thesis Sharif University of Technology Ramezani, Alireza (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    In recent years, in addition to traditional cryptographic blocks, a hardware blocks in this work namely PUF, has been used mostly for chip ID generation, authentication and so on. In this work we study recent proposed PUFs and their implementations on FPGA, and the measurement of quality metrics on them. Some of most important characteristics of PUFs are unpredictability, reliability, number of challenge response pairs and area. According to experiments that have been performed in this study and also according to previous work, one high-quality PUF in term of uniqueness and reliability is Ring Oscillator PUF. However, the disadvantage of this PUF is small number of challenge and response... 

    Increasing BIOS Trust in Personal Computers Using Reconfigurable Devices

    , M.Sc. Thesis Sharif University of Technology Eslampanah, Marziye (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the expansion of digital system threats, trusted computation with a new approach for countering such threats has emerged. This approach is based on using a hardware module for implementing a trusted platform (TPM). TPM includes a chipset and the trusted systems core. Nowadays many of mobile computers do include this technology. This hardware creates trust using a trust chain and expanding this trust to other parts of the system. The starting point in this chain is the computer BIOS. BIOS is the first code that the system usually executes. One of the most powerful recent attacks on computer systems is to infect the BIOS and other firmware. One of such complicated attacks is the rootkit... 

    Efficient Implementation of Post-Quantum Cryptography Based on Learning with Errors

    , Ph.D. Dissertation Sharif University of Technology Ebrahimi, Shahriar (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Public key encryption (PKE) cryptography plays a big role in securing communication channels of internet. The security of every PKE scheme is usually based on a hard problem that has no polynomial time solution using any computational structure. However, widely used classic PKE schemes such as RSA or ECC, are based on hard problems that have polynomial solutions using a quantum computer. Therefore, such PKE schemes will not be secure in post-quantum era. Among quantum-resistant schemes, lattice-based cryptography and especially learning with errors (LWE) problem have gained high attention due to their low computational complexity. In this thesis, different LWE-based cryptosystems are... 

    Implementation of an IoT Edge Computing Module in Compliance with TPM Standards

    , M.Sc. Thesis Sharif University of Technology Hasanizadeh, Parisa (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Cloud computing has a significant role in expanding applications of the Internet of Things (IoT). Currently, applications such as virtual reality and augmented reality require low latency, which is not achievable using traditional cloud computing in some scenarios. Edge computing is a new approach in IoT, which solves some of the limitations of the cloud computing by extending and developing its operations. Reducing response time and network traffic are some of the most important achievements of edge computing. Despite of its numerous advantages over cloud computing, edge computing faces serious challenges such as virtualization, implementation infrastructure, resource allocation and task... 

    Improving Remote Attestation Techniques for IoT Devices using Physical Model

    , M.Sc. Thesis Sharif University of Technology Salehi, Mohsen (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the widespread growth in the use of IoT devices, authors consider these devices as an attractive target platform. Several approaches have been proposed to defend IoT devices against various attacks. However, most of them suffer from some shortcomings such as being computationally expensive, not being general, or not being robust enough.Due to the attacks such as firmware modification and the existence of computational limitations, the use of local approaches is inefficient. Another approach is to use remote attestation techniques, which are divided into two categories, static and dynamic. However, static detection techniques are vulnerable to runtime attacks. Furthermore, existing... 

    Customizing a Privacy-Preserving Blockchain-Based Distributed Ledger for Second-Price Auction Smart Contract

    , M.Sc. Thesis Sharif University of Technology Mirzaei, Amir (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    A distributed ledger is a method of digital data storage and sharing in different places, and the blockchain technology is a way of implementing a distributed ledger. This technology has been employed in many of the cryptocurrencies like Ethereum to store transactions. In addition to storing transactions, Ethereum deploys scripts called smart contracts that are automatically executable. These scripts execute transparently and without preserving the privacy of participants. On the other hand, confidentiality and privacy are among the important components in data, network, and system security. Models such as Hawk and Enigma have been presented to obtain privacy-preserving in smart contracts;... 

    Network Traffic Reduction in Internet of Things Using Reconfigurable Cache based on Workload Characterization

    , M.Sc. Thesis Sharif University of Technology Rezaei, Rezvan (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Nowadays, with the advancement of internet of things, The number of nodes within the network has increased and there is huge traffic in these networks despite the small volume of data sent and received each node. The current architecture of the Internet network does not have the functionality required for Internet of things, as a result of designing a new architecture for Internet - based Internet of things. Content - based network is a new architecture introduced to the Internet, and its purpose is to change the network from host-centric to content-centric. One of the features of content-based networks is the use of in network caching that helps increase productivity and reduce the traffic...