“Joanne lectured me back in early days of BSB123 @ QUT. Being quite distracted by sports at school I achieved a fail in Maths B due to my total disinterest. You can imagine my surprise when I received the below email from Joanne 3/4 of the way through the semester. "Hi Joshua I have been reviewing the progressive grades and wanted to email to let you know that your progressive grade places you in the top 10% of students currently in BSB123. This is a wonderful result, congratulations :) I hope your end of semester revision is going well and wanted to wish you all the best for the final exam :)" This result can be almost entirely credited to her fantastic teaching ability and genuine interest in the subject matter which can't help but be transferred to students. I can only hope that you're around while I'm doing an MBA :)”
Joanne Fuller, PhD
Melbourne, Victoria, Australia
3K followers
500+ connections
About
I am a mathematician, cryptographer, formal verification specialist and data scientist. I am passionate about blockchain and the Ethereum ecosystem. During the last few years I have focused on how formal verification can be applied in the blockchain environment. The projects I have been involved with include the formal verification of the Eth2.0 spec using Dafny, the development of techniques to model smart contracts in Dafny and the Dafny-EVM. I am now focused on extending the application of formal methods to the zero knowledge domain and layer 2 products.
Activity
-
Uniswap V4; with a focus on Uniswap Hooks: Thank you Lecky Lao for delivering a great talk about Uniswap V4 hooks at the Ethereum Engineering Group…
Uniswap V4; with a focus on Uniswap Hooks: Thank you Lecky Lao for delivering a great talk about Uniswap V4 hooks at the Ethereum Engineering Group…
Liked by Joanne Fuller, PhD
-
Formal Verification of EVM Bytecode... https://lnkd.in/gZYv57MF
Formal Verification of EVM Bytecode... https://lnkd.in/gZYv57MF
Liked by Joanne Fuller, PhD
-
Economics of Zero Knowledge on Ethereum: Thank you Alex Pruden for delivering an insightful talk on the economics of rollups on Ethereum at the…
Economics of Zero Knowledge on Ethereum: Thank you Alex Pruden for delivering an insightful talk on the economics of rollups on Ethereum at the…
Liked by Joanne Fuller, PhD
Experience
Education
-
-
-
Activities and Societies: Awards: Dean’s Commendation for High Achievement, First Semester 2004, Dean’s Commendation for High Achievement, Second Semester 2005
-
-
Activities and Societies: Awards: Deans List, First Semester 1999, Deans List, Second Semester 1999, QUT Medal
-
-
-
-
Activities and Societies: Awards: 1997 School of Mathematics Staff Prize, 1998 School of Mathematics Staff Prize
Licenses & Certifications
Publications
-
Semi-parametric forecasting of spikes in electricity prices
Economic Record, 89(287), pp. 508-521
The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a…
The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a kernel function. The forecasts that are obtained using this method are accurate and therefore potentially useful to electricity retailers in terms of risk management.
Other authors -
Understanding the mathematical skill base of business students
OZCOTS 2012
A dislike of math is a common problem at all levels of education, but particularly at the tertiary level, this dislike has often translated into a deep-seated fear due to the prolonged failure to master core skills, as well as potential avoidance of such education. This is especially evident for Business studies students, whom in many instances perceive math as being completely redundant to their studies. The question therefore arises as to what level of math skill a typical business studies…
A dislike of math is a common problem at all levels of education, but particularly at the tertiary level, this dislike has often translated into a deep-seated fear due to the prolonged failure to master core skills, as well as potential avoidance of such education. This is especially evident for Business studies students, whom in many instances perceive math as being completely redundant to their studies. The question therefore arises as to what level of math skill a typical business studies student will possess as they enter the tertiary environment, and whether there are any common deficiencies that we can identify with a view to tackling the problem. This presentation will focus on the results of a study, conducted over several years, designed to measure the level of math ability of first year business students as they enter a compulsory data analysis subject. It will be shown that there are several areas of concern where students do not possess the requisite knowledge required for successful completion of the subject.
-
Engaging students in large classes using Elluminate
In Proceedings of ATEC2009 14th Annual Australasian Teaching Economics Conference, School of Economics and Finance, Queensland University of Technology, Queensland University of Technology, Brisbane, Queensland, pp. 84-97
The advancement of online teaching environments during the past several years presents an exciting opportunity to extend existing teaching methodologies. The software package known as Elluminate is one example of a virtual classroom, facilitating the provision of real time interaction, collaboration and group meetings. This paper will examine the use of Elluminate in the teaching of large classes. The use of such technology for large classes is of particular interest, as large classes are…
The advancement of online teaching environments during the past several years presents an exciting opportunity to extend existing teaching methodologies. The software package known as Elluminate is one example of a virtual classroom, facilitating the provision of real time interaction, collaboration and group meetings. This paper will examine the use of Elluminate in the teaching of large classes. The use of such technology for large classes is of particular interest, as large classes are often, unfairly, associated with a reputation for being impersonal as well as notions of conveyor belt learning. In this paper the potential to extend teaching and learning opportunities using Elluminate, in the context of large classes, will be explored. It will be shown that the use of technology such as Elluminate can assist in providing students with a more flexible means of accessing academic support, as well as allowing for a customised delivery of course content so as to focus learning outcomes.
-
Recent Developments - Leave to proceed against a company in liquidation
Insolvency Law Journal, 15(3): 258—260
-
Recent Developments - Australian Securities and Investments Commission v Edwards [2006] NSWSC 376
Insolvency Law Journal, 14(3): 195--198
-
Multi-Objective Optimisation of Bijective S-Boxes
New Generation Computing, 23(3):202--218
In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes…
In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms.
Other authors -
-
Dragon: A Fast Word Based Stream Cipher
In proceedings of Information Security and Cryptology - ICISC 2004, volume 3506 of Lecture Notes in Computer Science, pages 33--50. Springer-Verlag
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly…
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.
Other authors -
-
Multi-Objective Optimisation of Bijective S-Boxes
In proceedings of 2004 Congress on Evolutionary Computation (CEC 2004), pages 1525--1532. IEEE
In this work we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes…
In this work we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms.
Other authors -
-
New Concepts in Evolutionary Search for Boolean Functions in Cryptology
Computational Intelligence: An International Journal, 20(3):463--474.
In symmetric cryptology the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like Substitution boxes (S-boxes). Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures…
In symmetric cryptology the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like Substitution boxes (S-boxes). Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.
Other authors -
-
Evolutionary Generation of Bent Functions for Cryptology
In proceedings of 2003 Congress on Evolutionary Computation (CEC 2003), volume 3, pages 1655--1661. IEEE Press
We present a new heuristic algorithm that efficiently generates Boolean Bent functions, which have desirable cryptographic properties including maximum nonlinearity. By using an evolutionary approach to design, we discover an easy way to find the algebraic normal forms of new bent functions. These algorithms run efficiently, making them suitable for engineering the components of modern symmetric encryption algorithms. In addition, we enable the algorithm to determine when new classes of bent…
We present a new heuristic algorithm that efficiently generates Boolean Bent functions, which have desirable cryptographic properties including maximum nonlinearity. By using an evolutionary approach to design, we discover an easy way to find the algebraic normal forms of new bent functions. These algorithms run efficiently, making them suitable for engineering the components of modern symmetric encryption algorithms. In addition, we enable the algorithm to determine when new classes of bent functions have been discovered, by developing more a more effective approach to the equivalence class distinguishing problem. These results allow the efficient automated generation of many optimal Boolean functions that can be guaranteed to be affine non-equivalent, thus offering far more accurate classification of bent functions than previously available
Other authors -
-
Linear Redundancy in S-Boxes
In proceedings of Fast Software Encryption (FSE 2003), volume 2887 of Lecture Notes in Computer Science, pages 74--87. Springer-Verlag
This paper reports the discovery of linear redundancy in the S-boxes of many ciphers recently proposed for standardisation (including Rijndael, the new AES). We introduce a new method to efficiently detect affine equivalence of Boolean functions, and hence we study the variety of equivalence classes existing in random and published S-boxes. This leads us to propose a new randomness criterion for these components. We present experimental data supporting the notion that linear redundancy is very…
This paper reports the discovery of linear redundancy in the S-boxes of many ciphers recently proposed for standardisation (including Rijndael, the new AES). We introduce a new method to efficiently detect affine equivalence of Boolean functions, and hence we study the variety of equivalence classes existing in random and published S-boxes. This leads us to propose a new randomness criterion for these components. We present experimental data supporting the notion that linear redundancy is very rare in S-boxes with more than 6 inputs. Finally we discuss the impact this property may have on implementations, review the potential for new cryptanalytic attacks, and propose a new tweak for block ciphers that removes the redundancy. We also provide details of a highly nonlinear 8*8 non-redundant bijective S-box, which is suitable as a plug in replacement where required.
Other authors -
-
New Concepts in Evolutionary Search for Boolean Functions in Cryptology
In proceedings of 2003 Congress on Evolutionary Computation (CEC 2003), volume 3, pages 2157--2164. IEEE Press
In symmetric cryptology (which is an essential part of modern computer security), the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like S-boxes. Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding…
In symmetric cryptology (which is an essential part of modern computer security), the resistance to attacks depends critically on the nonlinearity properties of the Boolean functions describing cipher components like S-boxes. Some of the most effective methods known to generate functions that satisfy multiple criteria are based on evolutionary heuristics. In this paper, we improve on these algorithms by employing an adaptive strategy. Additionally, using recent improvements in the understanding of these combinatorial structures, we discover essential properties of the graph formed by affine equivalence classes of Boolean functions, which offers several advantages as a conceptual model for multiobjective seeking evolutionary heuristics. Finally, we propose the first major global cooperative effort to discover new bounds for cryptographic properties of Boolean functions.
Other authors -
-
Efficient Algorithms for Analysis of Cryptographic Boolean Functions.
In proceedings of Australian Workshop on Combinatorial Algorithms (AWOCA 2002), pages 133-150
The manipulation and analysis of Boolean functions for cryptographic applications typically involves a substantial amount of computational processing, particularly for Boolean functions of a large number of input variables. To date, little consideration has been given to the provision of efficient Boolean function programming techniques in the related cryptographic literature. This paper will examine a range of general optimisation techniques that can be applied to Boolean function programs.…
The manipulation and analysis of Boolean functions for cryptographic applications typically involves a substantial amount of computational processing, particularly for Boolean functions of a large number of input variables. To date, little consideration has been given to the provision of efficient Boolean function programming techniques in the related cryptographic literature. This paper will examine a range of general optimisation techniques that can be applied to Boolean function programs. A structure and code for the optimal implementation of Boolean functions and their associated operations, including the Walsh-Hadamard transform and Algebraic Normal Form transform, will be presented using the C language.
Other authors -
-
The Lili-II Keystream Generator
In proceedings of 7TH Australasian Conference on Information Security and Privacy (ACISP 2002), volume 2384 of Lecture Notes in Computer Science, pages 25--39. Springer-Verlag.
The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was developed to overcome some of the weaknesses which have been identified in the LILI-128 keystream generator. The design offers large period and linear complexity, is resistant to currently known styles of attack, and is simple to implement in hardware or software.
Other authors -
Honors & Awards
-
Top 10 Nomination for Lecturer of the Year, at QUT
-
-
Top 10 Nomination for Lecturer of the Year, at QUT
-
-
Top 10 Nomination for Lecturer of the Year, at QUT
-
-
Top 10 Nomination for Lecturer of the Year, at QUT
-
-
Top 10 Nomination for Lecturer of the Year, at QUT
-
-
Vice-Chancellor's Award for Excellence
-
-
Vice-Chancellor's Performance Award for Outstanding Service
-
-
QUT Medal
-
Organizations
-
Healesville & District Historical Society
Secretary & Treasurer
- Presentwww.healesvillehistorical.org.au
-
Australian Mathematics Society
-
Recommendations received
1 person has recommended Joanne
Join now to viewMore activity by Joanne
-
Open Standards For The Rollup Ecosystem - with a focus on EIP-7281 (xERC20): Thank you Austin King, Omni Network for talking about interoperability…
Open Standards For The Rollup Ecosystem - with a focus on EIP-7281 (xERC20): Thank you Austin King, Omni Network for talking about interoperability…
Liked by Joanne Fuller, PhD
-
I was delighted to give a keynote about deductive verification of smart contracts using Dafny at the Formal Methods for BlockChains (FMBC) workshop…
I was delighted to give a keynote about deductive verification of smart contracts using Dafny at the Formal Methods for BlockChains (FMBC) workshop…
Liked by Joanne Fuller, PhD
-
Thank you Franck Cassez, Ph. D. for your amazing talk at the Ethereum Engineering Group last week
Thank you Franck Cassez, Ph. D. for your amazing talk at the Ethereum Engineering Group last week
Liked by Joanne Fuller, PhD
-
Decentralized sequencer friendly consensus algorithms for zk rollups: Today I delivered a talk on my thoughts on consensus protocols for…
Decentralized sequencer friendly consensus algorithms for zk rollups: Today I delivered a talk on my thoughts on consensus protocols for…
Liked by Joanne Fuller, PhD
-
Decentralized sequencer friendly consensus algorithms for zk rollups: On Jan 16 / 17 (depending on where you live in the world) I am going to deliver…
Decentralized sequencer friendly consensus algorithms for zk rollups: On Jan 16 / 17 (depending on where you live in the world) I am going to deliver…
Liked by Joanne Fuller, PhD
-
"Politicians and regulators have recognized that blockchain and crypto are powerful disruptive technologies and they are taking a considered, mature…
"Politicians and regulators have recognized that blockchain and crypto are powerful disruptive technologies and they are taking a considered, mature…
Liked by Joanne Fuller, PhD
-
Ethereum Governance - by Tim Beiko, Ethereum Foundation - Tim delivered a detailed talk today on how Ethereum changes are agreed upon - a far more…
Ethereum Governance - by Tim Beiko, Ethereum Foundation - Tim delivered a detailed talk today on how Ethereum changes are agreed upon - a far more…
Liked by Joanne Fuller, PhD
-
In the last 4 weeks I have developed an EVM disassembler/control flow graph builder for EVM bytecode. It is available in C#, Java and Python. I am…
In the last 4 weeks I have developed an EVM disassembler/control flow graph builder for EVM bytecode. It is available in C#, Java and Python. I am…
Liked by Joanne Fuller, PhD
-
ERC 6551: NFTs that can own other assets and do any action. Said another way, an account that you can sell. Thank you Jayden Windle for delivering an…
ERC 6551: NFTs that can own other assets and do any action. Said another way, an account that you can sell. Thank you Jayden Windle for delivering an…
Liked by Joanne Fuller, PhD
-
Paymaster Smart Contracts (& Visa's use of them): Thank you Adegbenga (Ben) Ogungbeje for providing an introduction to Paymaster Smart Contracts at…
Paymaster Smart Contracts (& Visa's use of them): Thank you Adegbenga (Ben) Ogungbeje for providing an introduction to Paymaster Smart Contracts at…
Liked by Joanne Fuller, PhD
-
We’re thrilled to share that we’ve started to roll out the Linea mainnet alpha release. This week we will begin onboarding launch partners before…
We’re thrilled to share that we’ve started to roll out the Linea mainnet alpha release. This week we will begin onboarding launch partners before…
Liked by Joanne Fuller, PhD
-
Our new brand reflects our commitment to inspiring and empowering the builder in everyone, with a central message that challenges people to shift…
Our new brand reflects our commitment to inspiring and empowering the builder in everyone, with a central message that challenges people to shift…
Liked by Joanne Fuller, PhD
-
Open Research Problems in Rollup Design: Thank you Franck Cassez, Ph. D. for providing your analysis on the open problems in rollups at the Ethereum…
Open Research Problems in Rollup Design: Thank you Franck Cassez, Ph. D. for providing your analysis on the open problems in rollups at the Ethereum…
Liked by Joanne Fuller, PhD
-
All about Smart Contract & DApp Auditing: Thank you Oliver from Zellic for delivering a great talk on contract auditing at the Ethereum Engineering…
All about Smart Contract & DApp Auditing: Thank you Oliver from Zellic for delivering a great talk on contract auditing at the Ethereum Engineering…
Liked by Joanne Fuller, PhD
-
All about Smart Contract & DApp Auditing: Later this week Oliver from Zellic will explain the entire process of contract / DApp auditing from…
All about Smart Contract & DApp Auditing: Later this week Oliver from Zellic will explain the entire process of contract / DApp auditing from…
Liked by Joanne Fuller, PhD
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More