Joanne Fuller
Queensland University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Joanne Fuller.
australasian conference on information security and privacy | 2002
Andrew J. Clark; Ed Dawson; Joanne Fuller; Jovan Dj. Golic; Hoon Jae Lee; William Millan; SangJae Moon; Leonie Simpson
The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.
international conference on information security and cryptology | 2004
Kevin Chen; Matthew Henricksen; William Millan; Joanne Fuller; Leonie Simpson; Ed Dawson; Hoon Jae Lee; SangJae Moon
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.
fast software encryption | 2003
Joanne Fuller; William Millan
This paper reports the discovery of linear redundancy in the S-boxes of many ciphers recently proposed for standardisation (including Rijndael, the new AES). We introduce a new method to efficiently detect affine equivalence of Boolean functions, and hence we study the variety of equivalence classes existing in random and published S-boxes. This leads us to propose a new randomness criterion for these components. We present experimental data supporting the notion that linear redundancy is very rare in S-boxes with more than 6 inputs. Finally we discuss the impact this property may have on implementations, review the potential for new cryptanalytic attacks, and propose a new tweak for block ciphers that removes the redundancy. We also provide details of a highly nonlinear 8*8 non-redundant bijective S-box, which is suitable as a plug in replacement where required.
congress on evolutionary computation | 2003
Joanne Fuller; Ed Dawson; William Millan
We present a new heuristic algorithm that efficiently generates Boolean Bent functions, which have desirable cryptographic properties including maximum nonlinearity. By using an evolutionary approach to design, we discover an easy way to find the algebraic normal forms of new bent functions. These algorithms run efficiently, making them suitable for engineering the components of modern symmetric encryption algorithms. In addition, we enable the algorithm to determine when new classes of bent functions have been discovered, by developing more a more effective approach to the equivalence class distinguishing problem. These results allow the efficient automated generation of many optimal Boolean functions that can be guaranteed to be affine non-equivalent, thus offering far more accurate classification of bent functions than previously available.
computational intelligence | 2004
William Millan; Joanne Fuller; Ed Dawson
In symmetric cryptology the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like Substitution boxes (S‐boxes). Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.
Economic Record | 2013
Adam Clements; Joanne Fuller; Stan Hurn
The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a kernel function. The forecasts that are obtained using this method are accurate and therefore potentially useful to electricity retailers in terms of risk management.
congress on evolutionary computation | 2003
William Millan; Joanne Fuller; Ed Dawson
In symmetric cryptology (which is an essential part of modern computer security), the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like S-boxes. Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.
Science & Engineering Faculty | 2014
Joanne Fuller
Basic mathematical skills are critical to a student’s ability to successfully undertake an introductory statistics course. Yet in business education this vitally important area of mathematics and statistics education is under-researched. The question therefore arises as to what level of mathematical skill a typical business studies student will possess as they enter the tertiary environment, and whether there are any common deficiencies that we can identify with a view to tackling the problem. This paper will focus on a study designed to measure the level of mathematical ability of first year business students. The results provide timely insight into a growing problem faced by many tertiary educators in this field.
IACR Cryptology ePrint Archive | 2002
Joanne Fuller; William Millan
Archive | 2003
Joanne Fuller