Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chris Charnes is active.

Publication


Featured researches published by Chris Charnes.


international cryptology conference | 1994

Attacking the SL2 Hashing Scheme

Chris Charnes; Josef Pieprzyk

Tillich and Zemor proposed a definition of a new hash function which uses SL2(2, 2n), the group of unimodular two-dimensional matrices with entries in GF(2n, to compute the hash values of binary strings. This hashing scheme has several attractive features; hash values can be computed quickly and small modifications to the input text can be detected. However, this scheme is weak. Using a group theoretic argument we are able to produce two distinct binary strings of small length which hash to the same value in SL2(2,2n) for the range specified by Tillich and Zemor.


computer and communications security | 1994

Conditionally secure secret sharing schemes with disenrollment capability

Chris Charnes; Josef Pieprzyk; Reihaneh Safavi-Naini

The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Galois fields. It is shown how to generate shares so the scheme has the disenrollment capability. Next a family of conditionally secure Shamir schemes is defined and the disenrollment capability is investigated for the family. The paper also examines a problem of covert channels which are present in any secret sharing scheme.


Discrete Applied Mathematics | 2004

Homogeneous bent functions of degree n in 2n variables do not exist for n > 3

Tianbing Xia; Jennifer Seberry; Josef Pieprzyk; Chris Charnes

We prove that homogeneous bent functions f:GF(2)^2n --> GF(2) of degree n do not exist for n>3. Consequently homogeneous bent functions must have degree 3.


Mathematics of Computation | 1998

The translation planes of order 49 and their automorphism groups

Chris Charnes; Ulrich Dempwolff

Using isomorphism invariants, we enumerate the translation planes of order 49 and determine their automorphism groups.


theory and application of cryptographic techniques | 1992

Linear Nonequivalence versus Nonlinearity

Chris Charnes; Josef Pieprzyk

The choice of a collection of cryptographically strong Boolean functions is crucial in designing a strong hashing algorithm. The paper shows that it is possible to obtain five linearly nonequivalent functions with five Boolean variables which are cryptographically strong and easy to implement. They can be readily used to design hashing algorithms (of the MD5 structure).


Applicable Algebra in Engineering, Communication and Computing | 2001

On Homogeneous Bent Functions

Chris Charnes; Martin Rötteler; Thomas Beth

A new surprising connection between invariant theory and the theory of bent functions is established. This enables us to construct Boolean function having a prescribed symmetry given by a group action. Besides the quadratic bent functions the only other known homogeneous bent functions are the six variable degree three functions constructed in [14]. We show that these bent functions arise as invariants under an action of the symmetric group on four letters. Extending to more variables we apply the machinery of invariant theory to construct previously unknown homogeneous bent functions of degree three in 8 and 10 variables. This approach gives a great computational advantage over the unstructured search problem. We finally consider the question of linear equivalence of the constructed bent functions.


international conference on information and communication security | 1997

Secret sharing in hierarchical groups

Chris Charnes; Keith M. Martin; Josef Pieprzyk; Reihaneh Safavi-Naini

We introduce the idea of hierarchical delegation within a secret sharing scheme and consider solutions with both conditional and unconditional security.


australasian conference on information security and privacy | 1996

Cryptosystems for hierarchical groups

Hossein Ghodosi; Josef Pieprzyk; Chris Charnes; Reihaneh Safavi-Naini

This paper addresses the problem of information protection in hierarchical groups. Higher level groups of participants can control the information flow (the decryption ability) to lower level groups. If a higher level group decides to allow a lower level group to read the message, it passes a go ahead ticket so the lower level group can decrypt the cryptogram and read the message. The formal model of top-down hierarchical cryptosystems is given.


international symposium on information theory | 1994

Families of threshold schemes

Chris Charnes; Josef Pieprzyk; Rei Safavi-Naini

The notion of families of ideal threshold schemes (ITS) is introduced, their properties and applications are investigated. We consider secret sharing schemes whose parameters can be adjusted. Our model is a threshold scheme family (TSF) whose threshold scheme parameters can be modified dynamically. Some applications of this model includes schemes which have disenrollment capability, and a scheme to resist cheating.<<ETX>>


Mathematics of Computation | 2001

The eight dimensional ovoids over GF(5)

Chris Charnes; Ulrich Dempwolff

In this article we outline a computer assisted classification of the ovoids in an orthogonal space of the type Ω + (8,5).

Collaboration


Dive into the Chris Charnes's collaboration.

Top Co-Authors

Avatar

Josef Pieprzyk

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ulrich Dempwolff

Kaiserslautern University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tianbing Xia

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Thomas Beth

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Luke O'Connor

University of Wollongong

View shared research outputs
Researchain Logo
Decentralizing Knowledge