preprint

'Set up son? Scam set, asserts Bob': Semi-Automatic Generation of Bilingual Palindromes

We analyse the problem of composing bilingual palindromes, for which the only high-quality example known is more than 150 years old. We formalise the problem and introduce multiple partial solutions for computer-assisted palindrome composition, as …

A travelling crip’s temporal expenses

The following temporal expenses list comes exclusively from the author's experience as a crip academic based in France but travelling around the world with their mobility scooter. Everything mentioned happened in recent years and only includes the …

Boardroom Voting: Practical Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room

A _boardroom election_ is an election that takes place in a single room --- the boardroom --- in which all voters can see and hear each other. We present the first practical protocol for boardroom elections with ballot privacy and voter verifiability …

Cue-Pin-Select, a Secure and Usable Offline Password Scheme

People struggle to invent safe passwords for many of their typical online activities, leading to a variety of security problems when they use overly simple passwords or reuse them multiple times with minor modifications. Having different passwords …

Du hachage côté client pour l'authentification par mot de passe

Malgré des décennies d'analyses et d'avertissements au sein de la communauté académique, les grands fournisseurs de service n'appliquent correctement le hachage des mots de passe que très rarement, comme en témoignent les fuites régulières de leurs …

Making more extensive and efficient typo-tolerant password checkers

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typo-tolerant password checkers, their second …

Temporal #CripTaxes: a systematic typology of temporal costs of disability

Living with a disability involves handling many costs that the general population is not aware of, which have recently been denounced in the online #CripTax campaign. Those costs can be split into many categories, the principal ones being financial …

Usable everlasting encryption using the pornography infrastructure

Nine years before Snapchat and its ephemeral messages, Aumann, Ding, and Rabin introduced the idea of everlasting security: an encryption that could not be decrypted after a certain date, no matter the adversary’s computing power. Their method is …

What's in a name, a gender, a crip?

“As far as I can remember, I have always known I was a man”. “One day it hit me and it just clicked, and I realised that I was transgender”. Those sentences together make up most of the commonly heard experiences of realising one is trans. They are …

Where are the missing trans crips?

The interactions between transidentity, impairment, and disability have been studied extensively in the last two decades, mostly thanks to innovative ideas and reflections from the neurodivergent communities, and often outside of academic circles. …