Babak Sadeghian

Learn More
BACKGROUND This study aimed to assess the relationship of air pollution and plasma surrogate markers of endothelial dysfunction in the pediatric age group. METHODS This cross-sectional study was conducted in 2009-2010 among 125 participants aged 10-18 years. They were randomly selected from different areas of Isfahan city, the second large and(More)
OBJECTIVES Air pollution is a hazardous environmental problem with several adverse health effects including its impact on the development of chronic diseases as diabetes mellitus. This study aimed to investigate the association of geographical distribution of air quality index (AQI) and type 2 diabetes mellitus in an air-polluted city by using geographic(More)
Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show its application we combine ternary difference approach with conventional differential cryptanalysis and apply that to cryptanalysis the reduced round PRESENT. We also use ant colony(More)
Reconfigurable computing has grown to become an important and large field of research. It offers advantages over traditional hardware and software implementation of computational algorithms. In this paper, we implemented multiple cryptographic algorithms, namely DES, LOKI, DESX, Biham-DES, and S n DES on a reconfigurable hardware. Our implementation results(More)
The world is moving rapidly toward the deployment of information and communication systems. Nowadays, computing systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important(More)
Asynchronous designs have the potential to be robust with respect to changes in the physical environment. They also appear to consume less power and provide better performance compared to their synchronous counterparts. In this work, synchronous and asynchronous implementations of the modular multiplication that is the major part of the RSA algorithm is(More)
  • 1