Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joanne Fuller is active.

Publication


Featured researches published by Joanne Fuller.


australasian conference on information security and privacy | 2002

The LILI-II Keystream Generator

Andrew J. Clark; Ed Dawson; Joanne Fuller; Jovan Dj. Golic; Hoon Jae Lee; William Millan; SangJae Moon; Leonie Simpson

The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.


international conference on information security and cryptology | 2004

Dragon: a fast word based stream cipher

Kevin Chen; Matthew Henricksen; William Millan; Joanne Fuller; Leonie Simpson; Ed Dawson; Hoon Jae Lee; SangJae Moon

This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.


fast software encryption | 2003

Linear redundancy in S-boxes

Joanne Fuller; William Millan

This paper reports the discovery of linear redundancy in the S-boxes of many ciphers recently proposed for standardisation (including Rijndael, the new AES). We introduce a new method to efficiently detect affine equivalence of Boolean functions, and hence we study the variety of equivalence classes existing in random and published S-boxes. This leads us to propose a new randomness criterion for these components. We present experimental data supporting the notion that linear redundancy is very rare in S-boxes with more than 6 inputs. Finally we discuss the impact this property may have on implementations, review the potential for new cryptanalytic attacks, and propose a new tweak for block ciphers that removes the redundancy. We also provide details of a highly nonlinear 8*8 non-redundant bijective S-box, which is suitable as a plug in replacement where required.


congress on evolutionary computation | 2003

Evolutionary generation of bent functions for cryptography

Joanne Fuller; Ed Dawson; William Millan

We present a new heuristic algorithm that efficiently generates Boolean Bent functions, which have desirable cryptographic properties including maximum nonlinearity. By using an evolutionary approach to design, we discover an easy way to find the algebraic normal forms of new bent functions. These algorithms run efficiently, making them suitable for engineering the components of modern symmetric encryption algorithms. In addition, we enable the algorithm to determine when new classes of bent functions have been discovered, by developing more a more effective approach to the equivalence class distinguishing problem. These results allow the efficient automated generation of many optimal Boolean functions that can be guaranteed to be affine non-equivalent, thus offering far more accurate classification of bent functions than previously available.


computational intelligence | 2004

New Concepts in Evolutionary Search for Boolean Functions in Cryptology

William Millan; Joanne Fuller; Ed Dawson

In symmetric cryptology the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like Substitution boxes (S‐boxes). Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.


Economic Record | 2013

Semi-parametric Forecasting of Spikes in Electricity Prices

Adam Clements; Joanne Fuller; Stan Hurn

The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a kernel function. The forecasts that are obtained using this method are accurate and therefore potentially useful to electricity retailers in terms of risk management.


congress on evolutionary computation | 2003

New concepts in evolutionary search for Boolean functions in cryptology

William Millan; Joanne Fuller; Ed Dawson

In symmetric cryptology (which is an essential part of modern computer security), the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like S-boxes. Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.


Science & Engineering Faculty | 2014

Understanding the Quantitative Skill Base on Introductory Statistics: A Case Study from Business Statistics

Joanne Fuller

Basic mathematical skills are critical to a student’s ability to successfully undertake an introductory statistics course. Yet in business education this vitally important area of mathematics and statistics education is under-researched. The question therefore arises as to what level of mathematical skill a typical business studies student will possess as they enter the tertiary environment, and whether there are any common deficiencies that we can identify with a view to tackling the problem. This paper will focus on a study designed to measure the level of mathematical ability of first year business students. The results provide timely insight into a growing problem faced by many tertiary educators in this field.


IACR Cryptology ePrint Archive | 2002

On Linear Redundancy in the AES S-Box.

Joanne Fuller; William Millan


Archive | 2003

Analysis of affine equivalent boolean functions for cryptography

Joanne Fuller

Collaboration


Dive into the Joanne Fuller's collaboration.

Top Co-Authors

Avatar

William Millan

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Clements

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Leonie Simpson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Stan Hurn

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

SangJae Moon

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Amy J. Schramm

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Clark

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andry Rakotonirainy

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge