summaryrefslogtreecommitdiff
path: root/directions
diff options
context:
space:
mode:
Diffstat (limited to 'directions')
-rw-r--r--directions/research_directions.pdfbin1241894 -> 1242258 bytes
-rw-r--r--directions/research_directions.tex1
2 files changed, 1 insertions, 0 deletions
diff --git a/directions/research_directions.pdf b/directions/research_directions.pdf
index 44bfbe0..465d13b 100644
--- a/directions/research_directions.pdf
+++ b/directions/research_directions.pdf
Binary files differ
diff --git a/directions/research_directions.tex b/directions/research_directions.tex
index a08166d..adfed3a 100644
--- a/directions/research_directions.tex
+++ b/directions/research_directions.tex
@@ -605,6 +605,7 @@ be established where one party has a display of some sort and the other party ha
\paragraph{Adaption to mice} Instead of a keyboard, a mouse can be used for pairing without compromising protocol
security. The host would encode the fingerprint bit string into a permutation
$\sigma(i) : \{n\in\mathbb N, n\le m\} \rightarrow \{n\in\mathbb N, n\le m\}$
+for an integer security parameter $m>0$
and then display the sequence $\sigma(i)$ in a grid of buttons similar to a minesweeper field with an emualted mouse
cursor driven by pairing input on top. The user would then click the buttons on the grid in numeric order. The device
would do the same mouse emulation invisible to the user and would be able to observe the permutation this way. The