The fundamental structure of combinatorial configurations. Combinatorial configurations are fundamental mathematical tools used to model physical problems in the information sciences. Combinatorial trades arise from the differences between combinatorial configurations. They uniquely determine the underlying structure of the configuration and are central to the determination of defining sets. With this proposal we shall study the existence, properties and applications of combinatorial trades and ....The fundamental structure of combinatorial configurations. Combinatorial configurations are fundamental mathematical tools used to model physical problems in the information sciences. Combinatorial trades arise from the differences between combinatorial configurations. They uniquely determine the underlying structure of the configuration and are central to the determination of defining sets. With this proposal we shall study the existence, properties and applications of combinatorial trades and the associated defining sets. Our results will have applications in the areas of biotechnology, information systems, information security and experimental design.Read moreRead less
Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome w ....Number Theoretic Methods in Cryptography. It is well known that Number Theory, besides its intrinsic beauty, provides many powerful tools for modern Cryptography. The aim of the project is to formulate and solve new and important mathematical problems, which lie in the background of modern cryptography. They are also of independent value for pure mathematics because they very often stimulate new approaches to and new surprising points of view on classical results and methods. The main outcome will be advancing our theoretical knowledge about several major cryptosystems. The project will extend and enrich the area of applications of mathematics to cryptography and related areas.Read moreRead less
Dynamics of eigenvalue/eigenspace algorithms with applications to signal processing. Many problems in signal and systems lead naturally to an eigenvalue/eigenspace determination and tracking problem; for example (acoustic) echo-cancellation, crosstalk suppression in ADSL modems, direction of arrival determination with an array of sensors, linear system identification etc. Exploiting methods from global analysis and dynamical systems theory we will study the available algorithms for eigenspace de ....Dynamics of eigenvalue/eigenspace algorithms with applications to signal processing. Many problems in signal and systems lead naturally to an eigenvalue/eigenspace determination and tracking problem; for example (acoustic) echo-cancellation, crosstalk suppression in ADSL modems, direction of arrival determination with an array of sensors, linear system identification etc. Exploiting methods from global analysis and dynamical systems theory we will study the available algorithms for eigenspace determination to characterise their computational efficiency, accuracy and effectiveness in various data scenarios. The analysis will lead to improved designs for eigenvalue/eigenspace algorithms, as well as design tools to engineer algorithms to specific situations.Read moreRead less
Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's meth ....Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's methods will surprise some longstanding problems into submission and in particular will lead them to reveal full data on torsion on hyperelliptic curves of low genus.
Read moreRead less
Asymptotic Geometric Analysis and Machine Learning. Phenomena in large dimensions appear in a number of domains of Mathematics and adjacent domains of science (e.g. Computer Science), dealing with functions of infinitely growing number of parameters. Here, we focus on several questions naturally linked to Asymptotic Geometric Analysis which have natural applications to Statistical Learning Theory. We intend to use geometric, probabilistic and combinatorial methods to investigate these problems, ....Asymptotic Geometric Analysis and Machine Learning. Phenomena in large dimensions appear in a number of domains of Mathematics and adjacent domains of science (e.g. Computer Science), dealing with functions of infinitely growing number of parameters. Here, we focus on several questions naturally linked to Asymptotic Geometric Analysis which have natural applications to Statistical Learning Theory. We intend to use geometric, probabilistic and combinatorial methods to investigate these problems, with an emphasis on modern tools in Empirical Processes Theory and the theory of Random Matrices.Read moreRead less
Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologi ....Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologies. The new knowledge will then be utilised in the construction of large graphs with respect to given maximum degree and distance constraints.Read moreRead less
Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, t ....Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Group actions: combinatorics, geometry and computation. Science today relies on digital technologies using quantised and digital information. Because of the discrete nature of digital information, much of the mathematics underpinning these advances comes from the core disciplines of algebra and combinatorics within which this proposal falls. All aspects of the proposal focus on strengthening theoretical understanding of algebraic and combinatorial structures, and increasing computational power f ....Group actions: combinatorics, geometry and computation. Science today relies on digital technologies using quantised and digital information. Because of the discrete nature of digital information, much of the mathematics underpinning these advances comes from the core disciplines of algebra and combinatorics within which this proposal falls. All aspects of the proposal focus on strengthening theoretical understanding of algebraic and combinatorial structures, and increasing computational power for working with them. The fundamental research outcomes, in terms of theorems, algorithms, and the training of young research mathematicians, will thus both enhance the high international standing of Australian mathematics, and strengthen Australia's capabilities in these important areas.Read moreRead less