Learn More
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered(More)
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition , they generally aim to be implemented efficiently on a large variety of platforms. In this paper, we take an opposite approach and consider a context where we have very limited processing resources and throughput(More)
system to date has served all of the needs of wearable computing—light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We believe that our approach has the potential to solve these problems for a class of wearable devices by placing both the generator and powered electronics in a location where(More)
Preface This book is the result of an unsuccessful joke. During the summer of 1990, we were both participating in the Complex Systems Summer School of the Santa Fe Institute. Like many such programs dealing with " complexity, " this one was full of exciting examples of how it can be possible to recognize when apparently complex behavior has a simple(More)
The physical user interface is an increasingly signiicant factor limiting the eeectiveness of our interactions with and through technology. This thesis introduces Electric Field Imaging, a new physical channel and inference framework for machine perception of human action. Though electric eld sensing is an important sensory modality for several species of(More)
Low frequency electric fields provide a means to build contact and non-contact user interfaces that are unobtrusive, responsive, inexpensive, and simple to configure. In this paper, we outline the theory and implementation of such sensing techniques, contrasting them with more familiar alternatives. We then present a range of applications that we have(More)