Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the ... more Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the Ecrypt stream cipher contest. It is based on a new kind of primitive, which we call Rolling Arrays. It also uses various other ideas from many types of ciphers, including variable rotations and permutations. In some sense, this design is a kind of a new type of rotor machine, which is specially designed with operations that are very efficient in software. The allowed stream size is 2(to the power 64) bytes in each stream (or 2 (to the power 40) in the smaller version Py6). The security claims of the cipher are that no key recovery attacks can be performed with complexity smaller than that of exhaustive search, and distinguishing attacks are also impractical with a similar complexity. The speed of the cipher is impressively fast, as it is more than 2.5 times faster than RC4 on a Pentium III (with less than 2.9 cycles/byte when implemented with the API of NESSIE and tested with the NESSIE software).
Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xi... more Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xia School of Software Engineering and Computer Science University of Wollongong Wollongong, NSW, 2522 Australia Beata J. Wysocki Tadeusz A. Wysocki School of ...
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs... more We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s + 1, s2, s2-s/2) or 2 — {2s2 + 2s +
Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the ... more Py (pronounced Roo, a shorthand for Kangaroo) is a new stream cipher designed especially for the Ecrypt stream cipher contest. It is based on a new kind of primitive, which we call Rolling Arrays. It also uses various other ideas from many types of ciphers, including variable rotations and permutations. In some sense, this design is a kind of a new type of rotor machine, which is specially designed with operations that are very efficient in software. The allowed stream size is 2(to the power 64) bytes in each stream (or 2 (to the power 40) in the smaller version Py6). The security claims of the cipher are that no key recovery attacks can be performed with complexity smaller than that of exhaustive search, and distinguishing attacks are also impractical with a similar complexity. The speed of the cipher is impressively fast, as it is more than 2.5 times faster than RC4 on a Pentium III (with less than 2.9 cycles/byte when implemented with the API of NESSIE and tested with the NESSIE software).
Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xi... more Construction of amicable orthogonal designs of quaternions Ying Zhao Jennifer Seberry Tianbing Xia School of Software Engineering and Computer Science University of Wollongong Wollongong, NSW, 2522 Australia Beata J. Wysocki Tadeusz A. Wysocki School of ...
We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs... more We obtain explicit formulae for the values of the 2v — j minors, j = 0, 1, 2 of D-optimal designs of order 2v = x2 + y2, v odd, where the design is constructed using two circulant or type 1 incidence matrices of either two SBIBD(2s2 + 2s + 1, s2, s2-s/2) or 2 — {2s2 + 2s +
Uploads
Papers by Jennifer Seberry