Gary Carter
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gary Carter.
international conference on the theory and application of cryptology and information security | 2008
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses
international conference on information and communication security | 1999
William Millan; Linda Burnett; Gary Carter; Andrew J. Clark; Ed Dawson
8\mathrm{\textbf{M}}
international conference on progress in cryptology | 2007
Hüseyin Hisil; Gary Carter; Ed Dawson
for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use
australasian conference on information security and privacy | 2002
Lauren May; Matthew Henricksen; William Millan; Gary Carter; Ed Dawson
9\mathrm{\textbf{M}} + 1\mathrm{\textbf{S}}
australasian conference on information security and privacy | 2009
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
. It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to
fast software encryption | 2000
Linda Burnett; Gary Carter; Ed Dawson; William Millan
2\mathrm{\textbf{M}}
australasian conference on information security and privacy | 1998
Gary Carter; Ed Dawson; Lauren Nielsen
. This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).
Journal of Mathematical Cryptology | 2011
Hüseyin Hisil; Kenneth Koon-Ho Wong; Gary Carter; Ed Dawson
Recent advances are reported in the use of heuristic optimisation for the design of cryptographic mappings. The genetic algorithm (GA) is adapted for the design of regular substitution boxes (s-boxes) with relatively high nonlinearity and low autocorrelation. We discuss the selection of suitable GA parameters, and in particular we introduce an effective technique for breeding s-boxes. This assimilation operation, produces a new s-box which is a simple and natural compromise between the properties of two dissimilar parent s-boxes. Our results demonstrate that assimilation provides rapid convergence to good solutions. We present an analysis comparing the relative effectiveness of including a local optimisation procedure at various stages of the GA. Our results show that these algorithms find cryptographically strong s-boxes faster than exhaustive search.
australasian conference on information security and privacy | 2003
Yvonne Hitchcock; Paul Montague; Gary Carter; Ed Dawson
This paper is on efficient implementation techniques of Elliptic Curve Cryptography. In particular, we improve timings for Jacobiquartic (3M+4S) and Hessian (7M+1S or 3M+6S) doubling operations. We provide a faster mixed-addition (7M+3S+1d) on modified Jacobiquartic coordinates. We introduce tripling formulae for Jacobi-quartic (4M+11S+2d), Jacobi-intersection (4M+10S+5d or 7M+7S+3d), Edwards (9M+4S) and Hessian (8M+6S+1d) forms. We show that Hessian tripling costs 6M+4C+1d for Hessian curves defined over a field of characteristic 3. We discuss an alternative way of choosing the base point in successive squaring based scalar multiplication algorithms. Using this technique, we improve the latest mixed-addition formulae for Jacobi-intersection (10M+2S+1d), Hessian (5M+6S) and Edwards (9M+1S+ 1d+4a) forms. We discuss the significance of these optimizations for elliptic curve cryptography.
international cryptology conference | 1994
Gary Carter; Andrew J. Clark; Lauren Nielsen
In this paper we present practical guidelines for designing secure block cipher key schedules. In particular we analyse the AES key schedule and discuss its security properties both from a theoretical viewpoint, and in relation to published attacks exploiting weaknesses in its key schedule. We then propose and analyse an efficient and more secure key schedule.