Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome w ....Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome will be advancing our theoretical knowledge about several major cryptosystems. The project will extend and enrich the area of applications of mathematics to cryptography and related areas.Read moreRead less
Interconnection Network Routing and Graph Symmetry. Efficient routing schemes are of fundamental importance to both
traditional and optical interconnection networks. To achieve high
performance it is recommended that the graph modelling the network be vertex-transitive, meaning that it looks the same viewed from any vertex. In this project we will conduct a systematic study of the routing problem for such networks. We will focus on the effect of vertex-transitivity and some other symmetry pro ....Interconnection Network Routing and Graph Symmetry. Efficient routing schemes are of fundamental importance to both
traditional and optical interconnection networks. To achieve high
performance it is recommended that the graph modelling the network be vertex-transitive, meaning that it looks the same viewed from any vertex. In this project we will conduct a systematic study of the routing problem for such networks. We will focus on the effect of vertex-transitivity and some other symmetry properties on the efficiency of routing schemes measured by the vertex- and edge-congestions, and the minimum number of wavelengths needed in optical networks.Read moreRead less
Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologi ....Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologies. The new knowledge will then be utilised in the construction of large graphs with respect to given maximum degree and distance constraints.Read moreRead less
Combinatorial structures for computer security and communication. Hadamard matrices in their various guises arise many times in the study of reliable communications and secure communications. The aim of this research project is to use the theory of cyclotomy in both fields and rings to find new number theoretic results which will then be used to obtain new with zero or small autocorrelation functions.
The significance of this research is to propose new construction of Hadamard matrices and bloc ....Combinatorial structures for computer security and communication. Hadamard matrices in their various guises arise many times in the study of reliable communications and secure communications. The aim of this research project is to use the theory of cyclotomy in both fields and rings to find new number theoretic results which will then be used to obtain new with zero or small autocorrelation functions.
The significance of this research is to propose new construction of Hadamard matrices and block designs for computer security and wireless network communication.
We expect some new classes of Hadamard matrices and block designs can be constructed for security and communication applications and several papers would be submitted or published.
Read moreRead less
Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, t ....Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Group actions: combinatorics, geometry and computation. Science today relies on digital technologies using quantised and digital information. Because of the discrete nature of digital information, much of the mathematics underpinning these advances comes from the core disciplines of algebra and combinatorics within which this proposal falls. All aspects of the proposal focus on strengthening theoretical understanding of algebraic and combinatorial structures, and increasing computational power f ....Group actions: combinatorics, geometry and computation. Science today relies on digital technologies using quantised and digital information. Because of the discrete nature of digital information, much of the mathematics underpinning these advances comes from the core disciplines of algebra and combinatorics within which this proposal falls. All aspects of the proposal focus on strengthening theoretical understanding of algebraic and combinatorial structures, and increasing computational power for working with them. The fundamental research outcomes, in terms of theorems, algorithms, and the training of young research mathematicians, will thus both enhance the high international standing of Australian mathematics, and strengthen Australia's capabilities in these important areas.Read moreRead less
The arithmetic of supersingular elliptic curves. The proposed research will have substantial benefits both in the area of pure mathematics, and to the standing of number theory within Australia generally. If successful, the investigators envisage: - fundamental advances in the study of both elliptic curves and modular forms; - key progress in our understanding of the final Millenium Prize Problem in Mathematics; - academic software to compute special values of L-functions; - applications to com ....The arithmetic of supersingular elliptic curves. The proposed research will have substantial benefits both in the area of pure mathematics, and to the standing of number theory within Australia generally. If successful, the investigators envisage: - fundamental advances in the study of both elliptic curves and modular forms; - key progress in our understanding of the final Millenium Prize Problem in Mathematics; - academic software to compute special values of L-functions; - applications to computational mathematics, particularly elliptic curve cryptosystems; - a huge boost to the development of number theory Australia-wide.
Read moreRead less
Normal forms and Chern-Moser connection in the study of Cauchy-Riemann Manifolds. This research project is aimed at a systematic study of Cauchy-Riemann manifolds, their holomorphic mappings and automorphisms, by means of a unifying approach based on
Chern-Moser type normal forms. The importance of Cauchy-Riemann manifolds stems from the fact that they bridge complex structure and holomorphy with the Riemannian nature of real manifolds. Construction of an analogue of the Chern-Moser normal form ....Normal forms and Chern-Moser connection in the study of Cauchy-Riemann Manifolds. This research project is aimed at a systematic study of Cauchy-Riemann manifolds, their holomorphic mappings and automorphisms, by means of a unifying approach based on
Chern-Moser type normal forms. The importance of Cauchy-Riemann manifolds stems from the fact that they bridge complex structure and holomorphy with the Riemannian nature of real manifolds. Construction of an analogue of the Chern-Moser normal form for multicodimensional Levi-nondegenerate CR-manifolds and extension of CR-mappings between them are major goals in complex analysis. Identification of Chern-Moser chains and equivariant linearisation of isotropy automorphisms are major goals in geometry.Read moreRead less