Skip to main content

Showing 1–10 of 10 results for author: Aghapour, S

.
  1. arXiv:2405.12602  [pdf, other

    gr-qc math-ph physics.atom-ph

    Interacting Kerr-Newman Electromagnetic Fields

    Authors: Sajad Aghapour, Lars Andersson, Kjell Rosquist, Tomasz Smołka

    Abstract: In this paper, we study some of the properties of the $G \to 0$ limit of the Kerr-Newman solution of Einstein-Maxwell equations. Noting Carter's observation of the near equality between the $g = 2$ gyromagnetic ratio in the Kerr-Newman solution and that of the electron, we discuss additional such coincidences relating to the Kerr-Newman multipoles and properties of the electron. In contrast to the… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 24 pages, 11 figures, 3 tables

  2. arXiv:2403.01215  [pdf, ps, other

    cs.CR

    Efficient Algorithm Level Error Detection for Number-Theoretic Transform Assessed on FPGAs

    Authors: Kasra Ahmadi, Saeed Aghapour, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: Polynomial multiplication stands out as a highly demanding arithmetic process in the development of post-quantum cryptosystems. The importance of number-theoretic transform (NTT) extends beyond post-quantum cryptosystems, proving valuable in enhancing existing security protocols such as digital signature schemes and hash functions. Due to the potential for errors to significantly disrupt the opera… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 5 Pages, 4 Figures, and 3 Tables

  3. arXiv:2402.18033  [pdf, other

    cs.CR

    Efficient Fault Detection Architectures for Modular Exponentiation Targeting Cryptographic Applications Benchmarked on FPGAs

    Authors: Saeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh

    Abstract: Whether stemming from malicious intent or natural occurrences, faults and errors can significantly undermine the reliability of any architecture. In response to this challenge, fault detection assumes a pivotal role in ensuring the secure deployment of cryptosystems. Even when a cryptosystem boasts mathematical security, its practical implementation may remain susceptible to exploitation through s… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 5 pages, 2 figures

  4. arXiv:2310.12037  [pdf, other

    cs.CR

    Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

    Authors: Saleh Darzi, Kasra Ahmadi, Saeed Aghapour, Attila Altay Yavuz, Mehran Mozaffari Kermani

    Abstract: The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the constructional design, structural vulnerabilities, and offer security assessments, implementation evaluations, and a particular focus on side-channel att… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  5. arXiv:2307.12374  [pdf

    cs.CR

    An Efficient Authentication Protocol for Smart Grid Communication Based on On-Chip-Error-Correcting Physical Unclonable Function

    Authors: Masoud Kaveh, Mohammad Reza Mosavi, Diego Martin, Saeed Aghapour

    Abstract: Security has become a main concern for the smart grid to move from research and development to industry. The concept of security has usually referred to resistance to threats by an active or passive attacker. However, since smart meters (SMs) are often placed in unprotected areas, physical security has become one of the important security goals in the smart grid. Physical unclonable functions (PUF… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

  6. arXiv:2012.12566  [pdf, ps, other

    physics.optics hep-th

    Helicity, Spin, and Infra-zilch of Light: a Lorentz Covariant Formulation

    Authors: Sajad Aghapour, Lars Andersson, Kjell Rosquist

    Abstract: In this paper, a novel conserved Lorentz covariant tensor, termed the helicity tensor, is introduced in Maxwell theory. The conservation of the helicity tensor expresses the conservation laws contained in the helicity array, introduced by Cameron et al., including helicity, spin, and the spin-flux or infra-zilch. The Lorentz covariance of the helicity tensor is in contrast to previous formulations… ▽ More

    Submitted 18 February, 2021; v1 submitted 23 December, 2020; originally announced December 2020.

    Comments: 13 pages, 1 table, no figures

  7. arXiv:1904.08639  [pdf, ps, other

    math-ph hep-th physics.optics

    The Zilch Electromagnetic Conservation Law Revisited

    Authors: Sajad Aghapour, Lars Andersson, Kjell Rosquist

    Abstract: It is shown that the zilch conservation law arises as the Noether current corresponding to a variational symmetry of a duality-symmetric Maxwell Lagrangian. The action of the corresponding symmetry generator on the duality-symmetric Lagrangian, while non-vanishing, is a total divergence as required by the Noether theory. The variational nature of the zilch conservation law was previously known onl… ▽ More

    Submitted 20 January, 2021; v1 submitted 18 April, 2019; originally announced April 2019.

    Comments: 15 pages, 1 table, no figures

    Journal ref: Journal of Mathematical Physics 61, 122902 (2020)

  8. arXiv:1812.03292  [pdf, ps, other

    gr-qc physics.optics

    Helicity and spin conservation in Maxwell theory and Linearized Gravity

    Authors: Sajad Aghapour, Lars Andersson, Reebhu Bhattacharyya

    Abstract: A duality symmetric formulation of linearized gravity has been introduced by Barnett and used to show the conservation of helicity. However, the relation between helicity and spin as well as the separate conservation of the spin and orbital parts of angular momentum, which is known to hold in Maxwell theory, was not considered. These conservation laws are known to follow from the conservation of t… ▽ More

    Submitted 4 September, 2019; v1 submitted 8 December, 2018; originally announced December 2018.

    Comments: 15 pages, no figures

  9. arXiv:1808.07352  [pdf, ps, other

    gr-qc hep-th math-ph

    On variational principle and canonical structure of gravitational theory in double-foliation formalism

    Authors: Sajad Aghapour, Ghadir Jafari, Mehdi Golshani

    Abstract: In this paper, we analyze the variation of the gravitational action on a bounded region of spacetime whose boundary contains segments with various characters, including null. We develop a systematic approach to decompose the derivative of metric variations into orthogonal and tangential components with respect to the boundary and express them in terms of variations of geometric objects associated… ▽ More

    Submitted 1 September, 2018; v1 submitted 22 August, 2018; originally announced August 2018.

    Comments: 23 pages, Mathematica file included

  10. Black Hole Entropy from Entropy of Hawking Radiation

    Authors: Sajad Aghapour, Kamal Hajian

    Abstract: We provide a simple way for calculating the entropy of a Schwarzschild black hole from the entropy of its Hawking radiation. To this end, we show that if a thermodynamic system loses its energy only through the black body radiation, its loss of entropy is always 3/4 of the entropy of the emitted radiation. This proposition enables us to relate the entropy of an evaporating black hole to the entrop… ▽ More

    Submitted 12 November, 2016; v1 submitted 9 March, 2016; originally announced March 2016.

    Comments: 7 pages, published version

    Report number: IPM/P-2016/009

    Journal ref: Journal of Modern Physics, Volume 7, (2016), pp 2063-2070