Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Michael Scott

    This chapter describes and compares the software implementation of popular elliptic curve pairings on two architectures, of which the Intel Pentium 4 and Core2 are representatives.
    In this paper we present a new multiplication algorithm for residues modulo the Mersenne prime \(2^{521} - 1\). Using this approach, on an Intel Haswell Core i7-4770, constant-time variable-base scalar multiplication on NIST’s (and... more
    In this paper we present a new multiplication algorithm for residues modulo the Mersenne prime \(2^{521} - 1\). Using this approach, on an Intel Haswell Core i7-4770, constant-time variable-base scalar multiplication on NIST’s (and SECG’s) curve P-521 requires 1,108,000 cycles, while on the recently proposed Edwards curve E-521 it requires just 943,000 cycles. As a comparison, on the same architecture openSSL’s ECDH speed test for curve P-521 requires 1,319,000 cycles. Furthermore, our code was written entirely in C and so is robust across different platforms. The basic observation behind these speedups is that the form of the modulus allows one to multiply residues with as few word-by-word multiplications as is needed for squaring, while incurring very little overhead from extra additions, in contrast to the usual Karatsuba methods.
    In a paper recently published in the ACM Operating Systems Review, Kim, Lee and Yoo [1] describe two ID-based password authentication schemes for logging onto a remote network server using smart cards, passwords and fingerprints. Various... more
    In a paper recently published in the ACM Operating Systems Review, Kim, Lee and Yoo [1] describe two ID-based password authentication schemes for logging onto a remote network server using smart cards, passwords and fingerprints. Various claims are made regarding the security of the schemes, but no proof is offered. Here we show how a passive eavesdropper, without access to any smart card, password or fingerprint, and after passively eavesdropping only one legitimate log-on, can subsequently log-on to the server claiming any identity.
    We investigate the possibilities for injecting faults on pairings and assess their consequences. We assess the effect of faults that seek to corrupt the data being operated on and show that pairings with either no or a straightforward... more
    We investigate the possibilities for injecting faults on pairings and assess their consequences. We assess the effect of faults that seek to corrupt the data being operated on and show that pairings with either no or a straightforward final exponentiation are less secure than pairings with a more complex final exponentiation when considering such fault attacks. As evidence, we describe two types of fault attacks on the Weil and η pairing that recover the secret point, which cannot be applied to the Tate pairing. This can be ...
    Targeted re-sequencing of candidate genes in individuals at the extremes of a quantitative phenotype distribution is a method of choice to gain information on the contribution of rare variants to disease susceptibility. The... more
    Targeted re-sequencing of candidate genes in individuals at the extremes of a quantitative phenotype distribution is a method of choice to gain information on the contribution of rare variants to disease susceptibility. The endocannabinoid system mediates signaling in the brain and peripheral tissues involved in the regulation of energy balance, is highly active in obese patients, and represents a strong candidate pathway to examine for genetic association with body mass index (BMI). We sequenced two intervals (covering 188 kb) encoding the endocannabinoid metabolic enzymes fatty-acid amide hydrolase (FAAH) and monoglyceride lipase (MGLL) in 147 normal controls and 142 extremely obese cases. After applying quality filters, we called 1,393 high quality single nucleotide variants, 55% of which are rare, and 143 indels. Using single marker tests and collapsed marker tests, we identified four intervals associated with BMI: the FAAH promoter, the MGLL promoter, MGLL intron 2, and MGLL in...
    This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a... more
    This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a user to specify a visual key when hiding the secret information. The visual key must then be used when retrieving the hidden data. The paper describes enhancements to the method which may enable the steganographic data to survive through normal processing which reduces image quality. ...
    In a number of recent articles D. Z. Phillips has presented an exposition and defence of his views on theological realism, views which are based on his reading of Wittgenstein. Eschewing the label ‘anti-realist’ so often applied to his... more
    In a number of recent articles D. Z. Phillips has presented an exposition and defence of his views on theological realism, views which are based on his reading of Wittgenstein. Eschewing the label ‘anti-realist’ so often applied to his philosophy, Phillips claims that realists and anti-realists alike have ‘failed to appreciate how radical a challenge Wittgenstein makes to our philosophical assumptions’ (SL 22). Far from supporting non-realism above realism, Phillips – following Wittgenstein – wishes to upset the realist/non-realist debate by showing that the two theories offer equally confused accounts of belief and language, and specifically religious belief and language. If this claim could be substantiated it would, of course, be an extremely significant conclusion, and it is unfortunate that Phillips vacillates in his expression of it. Realism and non-realism are variously described as ‘empty’, ‘idle talk’ or like opposing ‘battle cries’ (RB 35), but despite being vacuous they a...
    When New Zealand’s ‘third-way’ Labour government came to power in 1999 it placed a greater policy and funding emphasis on the arts and culture. Like other ‘promotional states’ (Cloonan 1999) the Labour government sought to support the... more
    When New Zealand’s ‘third-way’ Labour government came to power in 1999 it placed a greater policy and funding emphasis on the arts and culture. Like other ‘promotional states’ (Cloonan 1999) the Labour government sought to support the domestic popular music industry through a voluntary radio quota. Drawing on qualitative research, this article describes the ways in which the state, through New Zealand on Air, negotiates and leverages domestic popular music artists onto commercial radio. In this process, state agents mobilise social networks to ‘join-up’ commercially appropriate artists to radio programmers. The success of this programme is based upon state agents developing an institutional isomorphism with existing music industry practices. Even so, popular music makers contest New Zealand on Air’s sympathetic policy settings by citing forms of institutional exclusion.
    We describe a 4-year-old boy with Crouzon syndrome, with associated acanthosis nigricans and Chiari-I malformation, who developed increased intracranial pressure necessitating posterior cranial expansion. Postoperatively, an arteriovenous... more
    We describe a 4-year-old boy with Crouzon syndrome, with associated acanthosis nigricans and Chiari-I malformation, who developed increased intracranial pressure necessitating posterior cranial expansion. Postoperatively, an arteriovenous fistula appeared over the mastoid region. Cerebral angiography demonstrated bilateral atresia of the jugular veins and occlusion of the left sigmoid and right transverse sinuses. We propose that increased intracranial venous pressure, secondary to bilateral jugular foraminal stenosis, caused hydrocephaly and venous dilation in the scalp vasculature. The latter set the stage for a traumatic arteriovenous fistula of the scalp, probably resulting from laceration of an adjacent artery and vein. Jugular atresia is a basilar malformation common to achondroplasia and certain eponymous syndromic craniosynostoses. Our patient has a mutation in fibroblast growth factor receptor 3, a different locus in the same gene mutated in achondroplasia.
    ABSTRACT The world's coastal resources are under pressure, even more so under climate change with 90% of the world's population living near or along our coastal zone. Ecologically, this zone is also the most productive,... more
    ABSTRACT The world's coastal resources are under pressure, even more so under climate change with 90% of the world's population living near or along our coastal zone. Ecologically, this zone is also the most productive, and the mainstay of economic livelihoods on a global scale. Managing the coast effectively is crucial, but as an area it remains contested. Despite multiple efforts to manage the coast, it remains a contested space. This paper offers a reflection into the ways in which different discourses influence and impact on one specific dimension of coastal zone management—the transmission of science into the policy domain. Using historical and discourse analysis, we find that the science-policy interface is largely constructed within two knowledge discourses: (i) scientific knowledge and (ii) local knowledge. This arbitrary separation into a binary discursive landscape mitigates against science-policy integration in practice especially given each discourse in itself, encompasses multiple forms of knowledge. We argue that in order to better understand how to build scientific research outputs into policy, decision makers and researchers need to understand how knowledge works in practice, overcome this dichotomous construction of knowledge and specifically, re-construct or transition the notion of ‘science as knowledge’ into ‘all knowledge types’ into policy.
    In 1988 McCurley published a significant paper [1] which proved the equivalence between the difficulty of breaking a Diffie-Hellman scheme using a composite modulus of particular construction, and the difficulty of factoring that modulus.... more
    In 1988 McCurley published a significant paper [1] which proved the equivalence between the difficulty of breaking a Diffie-Hellman scheme using a composite modulus of particular construction, and the difficulty of factoring that modulus. Unfortunately the proof requires that no restriction be placed on the size of random exponent used, so in practice the method will be quite time-consuming. Here we consider two techniques for modifying his construction to allow short exponents, as commonly used with the standard Diffie-Hellman ...
    Abstract. In a recent letter, Cui, Duan and Chan propose a generalisation of the Scott-Barreto method to build a larger family of MNT curves, and they claim that their proposal is also applicable to other curve construction methods. Here... more
    Abstract. In a recent letter, Cui, Duan and Chan propose a generalisation of the Scott-Barreto method to build a larger family of MNT curves, and they claim that their proposal is also applicable to other curve construction methods. Here we show that the Cui-Duan-Chan technique is irrecoverably flawed.
    Abstract. What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally... more
    Abstract. What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally a biometric. The former might hold a high-entropy secret, and the latter may be represented as relatively lowentropy parameters. However it would be preferred if the token could be in the form of a relatively inexpensive USB stick rather than a Smart-Card. The user should be at complete liberty to ...
    As is well known a non-supersingular pairing-friendly elliptic curve is defined by p, t, r and k, where p is the prime field, t is the trace of the Frobenius and r is the pairing-friendly group size, where r| p+ 1− t, and r| pk− 1 for the... more
    As is well known a non-supersingular pairing-friendly elliptic curve is defined by p, t, r and k, where p is the prime field, t is the trace of the Frobenius and r is the pairing-friendly group size, where r| p+ 1− t, and r| pk− 1 for the smallest positive integer k, the embedding degree. For certain families of pairing-friendly curves, the parameters p, r and t can be represented as polynomials p (x), r (x) and t (x).