Skip to main content

Showing 1–10 of 10 results for author: Kermani, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.08008  [pdf, other

    cs.LG cs.CR

    An Interactive Framework for Implementing Privacy-Preserving Federated Learning: Experiments on Large Language Models

    Authors: Kasra Ahmadi, Rouzbeh Behnia, Reza Ebrahimi, Mehran Mozaffari Kermani, Jeremiah Birrell, Jason Pacheco, Attila A Yavuz

    Abstract: Federated learning (FL) enhances privacy by keeping user data on local devices. However, emerging attacks have demonstrated that the updates shared by users during training can reveal significant information about their data. This has greatly thwart the adoption of FL methods for training robust AI models in sensitive applications. Differential Privacy (DP) is considered the gold standard for safe… ▽ More

    Submitted 14 February, 2025; v1 submitted 11 February, 2025; originally announced February 2025.

  2. arXiv:2403.01215  [pdf, other

    cs.CR

    Efficient Algorithm Level Error Detection for Number-Theoretic Transform used for Kyber Assessed on FPGAs and ARM

    Authors: Kasra Ahmadi, Saeed Aghapour, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: Polynomial multiplication stands out as a highly demanding arithmetic process in the development of post-quantum cryptosystems. The importance of the number-theoretic transform (NTT) extends beyond post-quantum cryptosystems, proving valuable in enhancing existing security protocols such as digital signature schemes and hash functions. CRYSTALS-KYBER stands out as the sole public key encryption (P… ▽ More

    Submitted 18 September, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

  3. arXiv:2402.18033  [pdf, other

    cs.CR

    Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs

    Authors: Saeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: Whether stemming from malicious intent or natural occurrences, faults and errors can significantly undermine the reliability of any architecture. In response to this challenge, fault detection assumes a pivotal role in ensuring the secure deployment of cryptosystems. Even when a cryptosystem boasts mathematical security, its practical implementation may remain susceptible to exploitation through s… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 5 pages, 2 figures

  4. arXiv:2310.12037  [pdf, other

    cs.CR

    Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

    Authors: Saleh Darzi, Kasra Ahmadi, Saeed Aghapour, Attila Altay Yavuz, Mehran Mozaffari Kermani

    Abstract: The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the constructional design, structural vulnerabilities, and offer security assessments, implementation evaluations, and a particular focus on side-channel att… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  5. arXiv:2305.13544  [pdf, ps, other

    cs.CR

    Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security

    Authors: Alvaro Cintas Canto, Jasmin Kaur, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step forward towards scrutinizing the new standards for applications ranging from Metaverse, Web 3.0 to deeply-embedded systems. The rapid advances in… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  6. arXiv:2304.06222  [pdf, ps, other

    cs.CR cs.AR cs.CY

    A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard

    Authors: Jasmin Kaur, Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role in securing resource-constrained embedded systems such as deeply-embedded systems (implantable and wearable medical devices, smart fabrics, smart homes, and the like), radio frequency identification (RFID) tags, sensor networks, and privacy-constrain… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

  7. A hybrid algorithm based on Community Detection and Multi-Attribute Decision-Making for Influence Maximization

    Authors: Masoud Jalayer, Morvarid Azheian, Mehrdad Mohammad Ali Kermani

    Abstract: The influence maximization problem is trying to identify a set of K nodes by which the spread of influence, diseases, or information is maximized. The optimization of influence by finding such a set is an NP-hard problem and a key issue in analyzing complex networks. In this paper, a new greedy and hybrid approach based on a community detection algorithm and a MADM technique (TOPSIS) is proposed t… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    Comments: 30 pages, 20 figures

  8. arXiv:1804.06497  [pdf, ps, other

    cs.CR

    Lightweight Hardware Architectures for Efficient Secure Hash Functions ECHO and Fugue

    Authors: Mehran Mozaffari Kermani, Reza Azarderakhsh, Siavash Bayat-Sarmadi

    Abstract: In cryptographic engineering, extensive attention has been devoted to ameliorating the performance and security of the algorithms within. Nonetheless, in the state-of-the-art, the approaches for increasing the reliability of the efficient hash functions ECHO and Fugue have not been presented to date. We propose efficient fault detection schemes by presenting closed formulations for the predicted s… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

  9. arXiv:1804.06480  [pdf, ps, other

    cs.CR

    Towards Lightweight Error Detection Schemes for Implementations of MixColumns in Lightweight Cryptography

    Authors: Anita Aghaie, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: In this paper, through considering lightweight cryptography, we present a comparative realization of MDS matrices used in the VLSI implementations of lightweight cryptography. We verify the MixColumn/MixNibble transformation using MDS matrices and propose reliability approaches for thwarting natural and malicious faults. We note that one other contribution of this work is to consider not only line… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

  10. arXiv:1803.03332  [pdf, other

    cs.CR

    Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

    Authors: Fatemeh Tehranipoor, Nima Karimian, Mehran Mozaffari Kermani, Hamid Mahmoodi

    Abstract: This is the first work augmenting hardware attacks mounted on obfuscated circuits by incorporating deep recurrent neural network (D-RNN). Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction, and reverse engineering but vulnerable to attacks. There have been efficient schemes, e.g., satisfiability-checking (SAT) based attack, which can potentially compromise hard… ▽ More

    Submitted 8 March, 2018; originally announced March 2018.