publication

La thanatopolitique du Covid-19

À l'occasion des centaines de milliers de décès soudains du Covid-19, la réalité tangible de la mort s'impose à nouveau à toute la société, après des siècles de mise à distance, jusque dans nos quotidiens confinés1. Alors que nous vivons de mémoire …

Le COVID-19 au prisme des minorités vulnérables

La pandémie du CoViD-19, vue comme expérience collective, a eu un effet de conver- gence des vécus minoritaires avec ceux de la « norme sociale ». L’exemple le plus évident est le confinement, qui a soudainement placé les personnes valides dans la même …

Making more extensive and efficient typo-tolerant password checkers

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typo-tolerant password checkers, their second …

Origami voting: a non-cryptographic approach to transparent ballot verification

Over the past four decades, fear of election manipulation and hacking has spurred the security technology community to propose a variety of voting systems to implement verifiable voting. Most of these rely on hard to understand cryptographic …

Towards an Empirical Cost Model for Mental Password Algorithms

Reliance on technology has diminished our use of mental computation. However, mental computation's inherent privacy features are becoming central to new research on creating more secure and usable passwords than one gets with approaches such as …

Usable everlasting encryption using the pornography infrastructure

—Nine years before Snapchat and its ephemeral messages, Aumann, Ding, and Rabin introduced the idea of everlasting security: an encryption that could not be decrypted after a certain date, no matter the adversary’s computing power. Their method is …

Counting authorised paths in constrained control-flow graphs

Our goal in this extended abstract is to investigate a model of computation inspired by control-flow graphs, automata and arithmetic circuits. The objective is to extend the definition of the first to include computing on nodes and edges. We are …

A note on the inflating enclosing ball problem

Our goal in this paper is, given a connected set of balls, to select and inflate one ball to cover the whole set with the minimal radius. More formally, we are given an abstract metric space and a path-connected set of balls with given centres …

Consonant-Vowel-Consonants for Error-Free Code Entry

Codes and passwords are the bane of user experiences: even small mistakes can delay desired activities, causing undue frustration. Work on codes has focused on security instead of people’s ability to enter them error-free. Difficulties observed in a …

CIVICS: Changing Incentives for Voters in International Cooperation through Sampling

This work discusses the possibility of developing new institutional frameworks that could be used as a replacement for the current global international political organs (e.g. the U.N.) which have shown their limited effectiveness in tackling …