Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Devising sophisticated computational comparative genomic analysis strategies for animal and plant genomes. Given the significance of comparative genomic analysis, this research proposal brings together Australian scientists with a track record in comparative genomic analysis, bioinformatics, molecular biology and statistics to work on consolidating a computational framework for comparative genomic analysis and investigating transcriptome data by capitalising on international collaborations and i ....Devising sophisticated computational comparative genomic analysis strategies for animal and plant genomes. Given the significance of comparative genomic analysis, this research proposal brings together Australian scientists with a track record in comparative genomic analysis, bioinformatics, molecular biology and statistics to work on consolidating a computational framework for comparative genomic analysis and investigating transcriptome data by capitalising on international collaborations and involvement. The outcomes of this research will be of benefit to the national community through technology transfer (such as the identification of novel and functional genomic non-coding sequences), training (in bioinformatics related activities) and national coordination (of bioinformatics activities).Read moreRead less
Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results ....Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results pertaining to constrained control to estimation problems. (iii) Problems with mixed constraints, for example, interval and finite set constraints. (iv) Fundamental limitations imposed by constraints to filtering and control problems.Read moreRead less
Knowledge Based Model Updating for the Correctness of Security Protocols. This project will fundamentally provide a new paradigm of the security protocol verification and modification. As such, it will significantly enhance Australia's already leading role in the cutting edge research on information security. By applying the new methodology and technology, Australian IT industry will be able to develop more secure communication systems in real world domains. With a very strong research team acro ....Knowledge Based Model Updating for the Correctness of Security Protocols. This project will fundamentally provide a new paradigm of the security protocol verification and modification. As such, it will significantly enhance Australia's already leading role in the cutting edge research on information security. By applying the new methodology and technology, Australian IT industry will be able to develop more secure communication systems in real world domains. With a very strong research team across different areas such as knowledge reasoning, temporal logics and information security, and a collaborative research training environment, this project will further enhance Australia's international reputation as a leader in computing and IT research.Read moreRead less
Coarse Grained Parallel Algorithms. Various fields of research face barriers created by problems that are computationally hard and/or require processing of large amounts of data. For example, some computational biochemistry methods on protein or gene sequences can not be scaled up to data sets required for human health research because of performance problems. Parallel computing enables new research by increasing the size of solvable problems. In addition to fundamental parallel computing resear ....Coarse Grained Parallel Algorithms. Various fields of research face barriers created by problems that are computationally hard and/or require processing of large amounts of data. For example, some computational biochemistry methods on protein or gene sequences can not be scaled up to data sets required for human health research because of performance problems. Parallel computing enables new research by increasing the size of solvable problems. In addition to fundamental parallel computing research, this project studies parallel algorithms for structure-based drug design and protein-protein interaction prediction that will enable new biochemistry research, as well as parallel algorithms for data cubes that will help enable the next generation of very large data warehouses.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Pattern-Based Video Coding Techniques for Real-Time Low Bit-Rate and Low Complexity Encoding Applications. This project will benefit the National Research Priority on Frontier Technology with applications in video surveillance, smart home design, and patient monitoring. It will enable Australia to lead the world in setting up coding standards and thus impact directly on the manufacturing initiatives of the multimedia communication and entertainment industries. Telecommunication industries will b ....Pattern-Based Video Coding Techniques for Real-Time Low Bit-Rate and Low Complexity Encoding Applications. This project will benefit the National Research Priority on Frontier Technology with applications in video surveillance, smart home design, and patient monitoring. It will enable Australia to lead the world in setting up coding standards and thus impact directly on the manufacturing initiatives of the multimedia communication and entertainment industries. Telecommunication industries will be the immediate beneficiary by enabling quality live video transmissions at low bit rates in a cost-effective manner. This project will improve the ability of large organisations to operate virtually across huge distances in Australia with the aid of reliable multimedia communications using distributed devices of limited power and processing capacity.Read moreRead less
Adapting the Bulk Synchronous Parallel processing model to Peer-to-Peer Networked Computing. Advances in distributed computing have shown that data parallel and parametric applications domains are amenable to wide area distribution. The project will advance the Bulk Synchronous Parallel processing model to describe innovative applications from the loosely synchronous domain, e.g. fluid dynamics, strategy algorithms and N-body problems are challenges that have significant scientific and industria ....Adapting the Bulk Synchronous Parallel processing model to Peer-to-Peer Networked Computing. Advances in distributed computing have shown that data parallel and parametric applications domains are amenable to wide area distribution. The project will advance the Bulk Synchronous Parallel processing model to describe innovative applications from the loosely synchronous domain, e.g. fluid dynamics, strategy algorithms and N-body problems are challenges that have significant scientific and industrial value. The project specializes the exciting peer-to-peer paradigm, a frontier of inter-networking technology. By using the latest techniques and taking advantage of the technology implosion caused by low cost parallel infrastructure, the project outcomes will give Australia a strong position in the future of parallel technology.Read moreRead less