p-Adic Methods in Arithmetic Geometry. This project concerns algorithms for determining the number of
solutions to systems of polynomial equations over finite fields
by p-adic methods. Our goal is to determine a fundamental
invariant, the zeta function, appearing in arithmetic geometry,
whose characterization was the subject of the famous Weil
conjectures.
....p-Adic Methods in Arithmetic Geometry. This project concerns algorithms for determining the number of
solutions to systems of polynomial equations over finite fields
by p-adic methods. Our goal is to determine a fundamental
invariant, the zeta function, appearing in arithmetic geometry,
whose characterization was the subject of the famous Weil
conjectures.
We seek to understand and develop p-adic methods for determining
zeta functions, taking as point of departure the methods of Satoh
and Mestre for elliptic curves. Applications of this work include
public key cryptography and coding theory, having direct impact
in e-commerce and telecommunications.
Read moreRead less
Explicit Construction of Global Function Fields with Many Rational Places. The use of error-correcting codes and cryptosystems is fundamental to the secure and reliable operation of many technological devices that we depend upon in our everyday lives. Essentially invisible, both coding theory and cryptography are essential for banking (ATM machines, e-banking), commerce (e-commerce), defense (cryptography) and entertainment (digital TV and radio, music CDs, DVDs). While certain families of "goo ....Explicit Construction of Global Function Fields with Many Rational Places. The use of error-correcting codes and cryptosystems is fundamental to the secure and reliable operation of many technological devices that we depend upon in our everyday lives. Essentially invisible, both coding theory and cryptography are essential for banking (ATM machines, e-banking), commerce (e-commerce), defense (cryptography) and entertainment (digital TV and radio, music CDs, DVDs). While certain families of "good" codes and cryptosystems can be constructed from specific function fields whose existence is guaranteed by abstract theory, often no actual construction for the function field is currently known. We aim to close this gap, making a greater range of "good" codes and cryptosystems available for practical applications.
Read moreRead less
Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's meth ....Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's methods will surprise some longstanding problems into submission and in particular will lead them to reveal full data on torsion on hyperelliptic curves of low genus.
Read moreRead less
Signatures of Order, Chaos and Symmetry in Algebraic Dynamics. The project in the breakthrough science of algebraic dynamics will help inform and sustain both algebraic number theory and dynamical systems in Australia. Thus far, Australia is not well represented in this cutting edge international area, and international research prominence and teaching benefits will flow from the pioneering and innovative topics to be addressed. The research incorporates the synergy of an existing highly-product ....Signatures of Order, Chaos and Symmetry in Algebraic Dynamics. The project in the breakthrough science of algebraic dynamics will help inform and sustain both algebraic number theory and dynamical systems in Australia. Thus far, Australia is not well represented in this cutting edge international area, and international research prominence and teaching benefits will flow from the pioneering and innovative topics to be addressed. The research incorporates the synergy of an existing highly-productive international collaboration and creates possibilities for many more such linkages. It affords Australia a strategic opportunity to considerably increase its profile in the algebraic dynamics community, particularly in the Pacific region.Read moreRead less
Integral lattices and their theta series. Lattice algorithms play a very important role in solving problems in algebra, number theory, combinatorics, optimisation and cryptography. Our proposed work will fill a major hole in current capabilities for computing with lattices. The enhanced ability to enumerate short vectors will have important applications to Diophantine equations, linear optimisation and also to understanding the security of cryptosystems based on the difficulty of finding a short ....Integral lattices and their theta series. Lattice algorithms play a very important role in solving problems in algebra, number theory, combinatorics, optimisation and cryptography. Our proposed work will fill a major hole in current capabilities for computing with lattices. The enhanced ability to enumerate short vectors will have important applications to Diophantine equations, linear optimisation and also to understanding the security of cryptosystems based on the difficulty of finding a shortest vector. The work on theta series should result in the first algorithm for this problem. This will also find many applications including to the construction of spherical codes and designs.Read moreRead less
Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Representation theory of groups and applications to geometry and number theory. Representation theory is at the center of the mathematical study of symmetry, which we constantly use to understand the world. Combine with geometry this theory produces spectacular results in number theory. This project aims to study p-adic phenomena in these theories. Its
main outcomes will be p-adic automorphic forms and local functoriality.
Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome w ....Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome will be advancing our theoretical knowledge about several major cryptosystems. The project will extend and enrich the area of applications of mathematics to cryptography and related areas.Read moreRead less
Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, t ....Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less