Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter ....Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area. Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is ....Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Timed Commitment Schemes to Smooth Internet Bottlenecks, Defend against Denial of Service Attacks, and Bypass Some Legal Problems of Enccryption. Bottlenecks on the Internet and Denial of Service attacks on a server are both caused by excessive demands made on a system. This proposal is to reduce the ill-effects of either by building on our previous theoretical work on strongboxes of combinatorial designs. In the case of bottlenecks, the demands are legitimate but badly timed, and our approach ....Timed Commitment Schemes to Smooth Internet Bottlenecks, Defend against Denial of Service Attacks, and Bypass Some Legal Problems of Enccryption. Bottlenecks on the Internet and Denial of Service attacks on a server are both caused by excessive demands made on a system. This proposal is to reduce the ill-effects of either by building on our previous theoretical work on strongboxes of combinatorial designs. In the case of bottlenecks, the demands are legitimate but badly timed, and our approach will redistribute the demands more evenly. In the case of Denial of Service attacks, the demands are malicious, and our approach will respond in such a way as to deplete the resources of the attacker.Read moreRead less
Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less