Gary Carter

According to our database1, Gary Carter authored at least 18 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2009, "For contributions to understanding nonlinear and polarization effects in optical fiber communications systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Underwater Node Localization using Optoacoustic Signals.
Proceedings of the IEEE International Conference on Communications, 2022

Vapor Cloud Delayed-DPPM Modulation Technique for Nonlinear Optoacoustic Communication.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Optical Focusing-based Adaptive Modulation for Optoacoustic Communication.
Proceedings of the 30th Wireless and Optical Communications Conference, 2021

2011
An exploration of affine group laws for elliptic curves.
J. Math. Cryptol., 2011

2010
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

2009
Jacobi Quartic Curves Revisited.
IACR Cryptol. ePrint Arch., 2009

2008
Twisted Edwards Curves Revisited.
IACR Cryptol. ePrint Arch., 2008

2007
Faster Group Operations on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2007

New Formulae for Efficient Elliptic Curve Arithmetic.
Proceedings of the Progress in Cryptology, 2007

2005
RAK factoring algorithm.
Australas. J Comb., 2005

2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004

Improvements to the RAK Factoring Algorithm.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2003
The Security of Fixed versus Random Elliptic Curves in Cryptography.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Strengthening the Key Schedule of the AES.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
Efficient Methods for Generating MARS-Like S-Boxes.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

1999
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
Key Schedules of Iterative Block Ciphers.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1994
DESV-1: A Variation of the Data Encryption Standard (DES).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...