Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gary Carter is active.

Publication


Featured researches published by Gary Carter.


international conference on the theory and application of cryptology and information security | 2008

Twisted Edwards Curves Revisited

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses


international conference on information and communication security | 1999

Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes

William Millan; Linda Burnett; Gary Carter; Andrew J. Clark; Ed Dawson

8\mathrm{\textbf{M}}


international conference on progress in cryptology | 2007

New formulae for efficient elliptic curve arithmetic

Hüseyin Hisil; Gary Carter; Ed Dawson

for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use


australasian conference on information security and privacy | 2002

Strengthening the Key Schedule of the AES

Lauren May; Matthew Henricksen; William Millan; Gary Carter; Ed Dawson

9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}


australasian conference on information security and privacy | 2009

Jacobi Quartic Curves Revisited

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to


fast software encryption | 2000

Efficient Methods for Generating MARS-Like S-Boxes

Linda Burnett; Gary Carter; Ed Dawson; William Millan

2\mathrm{\textbf{M}}


australasian conference on information security and privacy | 1998

Key Schedules of Iterative Block Ciphers

Gary Carter; Ed Dawson; Lauren Nielsen

. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).


Journal of Mathematical Cryptology | 2011

An exploration of affine group laws for elliptic curves

Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson

Recent advances are reported in the use of heuristic optimisation for the design of cryptographic mappings. The genetic algorithm (GA) is adapted for the design of regular substitution boxes (s-boxes) with relatively high nonlinearity and low autocorrelation. We discuss the selection of suitable GA parameters, and in particular we introduce an effective technique for breeding s-boxes. This assimilation operation, produces a new s-box which is a simple and natural compromise between the properties of two dissimilar parent s-boxes. Our results demonstrate that assimilation provides rapid convergence to good solutions. We present an analysis comparing the relative effectiveness of including a local optimisation procedure at various stages of the GA. Our results show that these algorithms find cryptographically strong s-boxes faster than exhaustive search.


australasian conference on information security and privacy | 2003

The security of fixed versus random elliptic curves in cryptography

Yvonne Hitchcock; Paul Montague; Gary Carter; Ed Dawson

This paper is on efficient implementation techniques of Elliptic Curve Cryptography. In particular, we improve timings for Jacobiquartic (3M+4S) and Hessian (7M+1S or 3M+6S) doubling operations. We provide a faster mixed-addition (7M+3S+1d) on modified Jacobiquartic coordinates. We introduce tripling formulae for Jacobi-quartic (4M+11S+2d), Jacobi-intersection (4M+10S+5d or 7M+7S+3d), Edwards (9M+4S) and Hessian (8M+6S+1d) forms. We show that Hessian tripling costs 6M+4C+1d for Hessian curves defined over a field of characteristic 3. We discuss an alternative way of choosing the base point in successive squaring based scalar multiplication algorithms. Using this technique, we improve the latest mixed-addition formulae for Jacobi-intersection (10M+2S+1d), Hessian (5M+6S) and Edwards (9M+1S+ 1d+4a) forms. We discuss the significance of these optimizations for elliptic curve cryptography.


international cryptology conference | 1994

DESV-1: A Variation of the Data Encryption Standard (DES)

Gary Carter; Andrew J. Clark; Lauren Nielsen

In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.

Collaboration


Dive into the Gary Carter's collaboration.

Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kenneth Koon-Ho Wong

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yvonne Hitchcock

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

William Millan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Clark

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lauren Nielsen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Linda Burnett

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lauren May

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge