preprint

Disabled dimensionality

The world expects us as humans to interact as fully functional 3D manipulators who can observe, manipulate, and act in three spatial dimensions. Ableism defaults people with the assumption that disabled people are inferior at manipulation, imagining, …

Visual Secrets: a human security primitive

This article presents and evaluates an idea for a non-transferable secret that can be used for security verifi cation. This new type of security primitive relies on the pre-semantic treatment of images in the human brain. By showing users an image …

Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting

We present Phrase-Verified Voting, a voter-verifiable remote voting system assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their ballot …

Client-side hashing for efficient typo-tolerant password checkers

Credential leaks still happen with regular frequency, and show evidence that, despite decades of warnings, password hashing is still not correctly implemented in practice. The common practice today, inherited from previous but obsolete constraints, …

'Set up son? Scam set, asserts Bob': Semi-Automatic Generation of Bilingual Palindromes

We analyse the problem of composing bilingual palindromes, for which the only high-quality example known is more than 150 years old. We formalise the problem and introduce multiple partial solutions for computer-assisted palindrome composition, as …

A travelling crip’s temporal expenses

The following temporal expenses list comes exclusively from the author's experience as a crip academic based in France but travelling around the world with their mobility scooter. Everything mentioned happened in recent years and only includes the …

Boardroom Voting: Practical Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room

A _boardroom election_ is an election that takes place in a single room --- the boardroom --- in which all voters can see and hear each other. We present the first practical protocol for boardroom elections with ballot privacy and voter verifiability …

Design ideas to improve the usability and security of mail-in ballots

Despite the renewed discussion on mail-in voting, there has been little evolution on ballot and protocol design for this specific set of protocol constraints. This paper describes multiple designs pertaining to ballots, envelopes and chain of …

Du hachage côté client pour l'authentification par mot de passe

Malgré des décennies d'analyses et d'avertissements au sein de la communauté académique, les grands fournisseurs de service n'appliquent correctement le hachage des mots de passe que très rarement, comme en témoignent les fuites régulières de leurs …

What's in a name, a gender, a crip?

“As far as I can remember, I have always known I was a man”. “One day it hit me and it just clicked, and I realised that I was transgender”. Those sentences together make up most of the commonly heard experiences of realising one is trans. They are …