publication

Usable everlasting encryption using the pornography infrastructure

—Nine years before Snapchat and its ephemeral messages, Aumann, Ding, and Rabin introduced the idea of everlasting security: an encryption that could not be decrypted after a certain date, no matter the adversary’s computing power. Their method is …

Counting authorised paths in constrained control-flow graphs

Our goal in this extended abstract is to investigate a model of computation inspired by control-flow graphs, automata and arithmetic circuits. The objective is to extend the definition of the first to include computing on nodes and edges. We are …

A note on the inflating enclosing ball problem

Our goal in this paper is, given a connected set of balls, to select and inflate one ball to cover the whole set with the minimal radius. More formally, we are given an abstract metric space and a path-connected set of balls with given centres …

Consonant-Vowel-Consonants for Error-Free Code Entry

Codes and passwords are the bane of user experiences: even small mistakes can delay desired activities, causing undue frustration. Work on codes has focused on security instead of people’s ability to enter them error-free. Difficulties observed in a …

CIVICS: Changing Incentives for Voters in International Cooperation through Sampling

This work discusses the possibility of developing new institutional frameworks that could be used as a replacement for the current global international political organs (e.g. the U.N.) which have shown their limited effectiveness in tackling …

Comment corriger efficacement les typos dans les mots de passe

Les mots de passe demeurant la principale méthode d'authentification en ligne, les progrès actuels se concentrent sur le lien entre utilisabilité et sécurité, et comment travailler sur la première améliore la deuxième. Dans une récente série de …

Moving to client-sided hashing for online authentication

Experience shows that the best technology is not always adopted. In the security arena no technology has to stand a harder challenge or has higher consequences for changing society by failure than voting technology. Best technology in voting is …

Password typo correction using discrete logarithms

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typo-tolerant password checkers, their second …

Pluto surface composition from spectral model inversion with metaheuristics

The New Horizons mission has returned hyperspectral data for Pluto’s surface consisting of complex, not directly modelisable spectra. A radiative transfer model that accurately represents the complexity of the putative surface structure and mix of …

Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics

Today's biometric authentication systems are still struggling with replay attacks and irrevocable stolen credentials. This paper introduces a biometric protocol that addresses such vulnerabilities. The approach prevents identity theft by being based …