Benoit Viguier - PhD Student in Radboud University
Benoit Viguier [--cv] ... [--gh] [--gl] [--mail]
Benoit Viguier is a PhD student at the Digital Security group and the
Department of Software Science of the Radboud University in Nijmegen,
working on tools for formally verifying cryptographic software under the
supervision of Peter Schwabe, Freek Wiedijk, Joan Daemen and
Herman Geuvers. Before that, he was an engineering student at the
INSA Rennes (National Institute of Applied Science, France) and master
student in Research in Computer Science (MRI).
Gitlab at cs.ru.nl
λ x y.
x @ y .nl
Mercator 1, 03.11b
6525 EC Nijmegen
PUB-2020-1209 -A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe and Benoit Viguier and Timmy Weerwag and Freek Wiedijk
34th IEEE Computer Security Foundations Symposium - CSF 2021
We formally prove that the C implementation of the X25519 key-exchange protocol in the TweetNaCl library is correct. We prove both that it correctly implements the protocol from Bernstein’s 2006 paper, as standardized in RFC 7748, as well as the absence of undefined behavior like arithmetic overflows and array out of bounds errors. We also formally prove, based on the work of Bartzia and Strub, that X25519 is mathematically correct, i.e., that it correctly computes scalar multiplication on the elliptic curve Curve25519.
The proofs are all computer-verified using the Coq theorem prover. To establish the link between C and Coq we use the Verified Software Toolchain (VST).
PUB-2020-0707 -Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier
CONFERENCE ON CRYPTOLOGY AND NETWORK SECURITY - CANS 2020
we analyzed different strategies for the optimization of several candidates of NIST's lightweight cryptography standardization project on a RISC-V architecture. In particular, we studied the general impact of optimizing symmetric-key algorithms in assembly and in plain C.
TLK-2019-1129 -A Coq proof of the correctness of X25519 in TweetNaCl
Presentation of the complete proof of the correctness of X25519 in TweetNaCl at the Crypto Working Group in Utrecht.
TLK-2019-1025 -Advance Use of Git
Brief presentation of branches and other functionalities of Git at ICIS DS Lunch Talk in Nijmegen.
TLK-2019-0318 -Verification of TweetNaCl’s Curve25519
Presentation of the verification of TweetNaCl's Curve25519 implementation at Journée GT Méthodes Formelles pour la Sécurité.
TLK-2018-1204 -Cryptanalysis of MORUS
TLK-2018-1010 -Gimli: A Cross-Platform Permutation
Presentation of Gimli at Advances in permutation-based cryptography in Milan.
TLK-2018-0717 -KangarooTwelve draft-viguier-kangarootwelve-02
Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in Montreal.
TLK-2018-0622 -Linear Cryptanalysis of Morus
Presentation of the Linear Cryptanalysis part of our paper Cryptanalysis of Morus.
PUB-2016-770 -KangarooTwelve: fast hashing based on Keccak-p
Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer and Benoît Viguier
Applied Cryptography and Network Security – ACNS 2018, Lecture Notes in Computer Science, Springer-Verlag
KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202's SHA-3 and SHAKE functions.
PUB-2018-464 -Cryptanalysis of MORUS
Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier
Advances in Cryptology – ASIACRYPT 2018, Lecture Notes in Computer Science, Springer-Verlag
As our main result, we present a linear correlation in the keystream of full MORUS, which can be used to distinguish its output from random and to recover some plaintext bits in the broadcast setting.
TLK-2018-0319 -KangarooTwelve draft-viguier-kangarootwelve-01
Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in London.
TLK-2017-0926 -Bookmarks for Cryptographers
Presentation of Tikz for Cryptographer and the Crypto Stack Exchange Community at CHES Rump Session in Taipei - 2017
TLK-2017-0908/0915/0927 -Gimli: A Cross-Platform Permutation
[slides 0908] Presentation of Gimli at the Crypto Working Group in Utrecht.
[slides 0915] Presentation of Gimli at the Digital Security Lunch talk in Nijmegen.
[slides 0927] Presentation of Gimli at CHES in Taipei.
PUB-2017-630 -Gimli: A Cross-Platform Permutation
Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier
Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science, Springer-Verlag
Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms.
[pdf] [bib] [www]
TLK-2017-0720 -Toward the correctness of TweetNaCl’s Ed25519 with VST
Presentation of the correctness of the Big Num arithmetic of TweetNaCl at the Student presentation of the Deep Spec Summer School - 2017
TLK-2017-0718 -KangarooTwelve draft-viguier-kangarootwelve-00
Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in Prague. Presentation kindly done by Dang, Quynh (NIST).
TLK-2017-0605 -Bookmarks for Cryptographers
Presentation of Tikz for Cryptographer and the Crypto Stack Exchange Community at the Summer School on real-world crypto and privacy in Croatia - 2017
TLK-2016-1209 -Curve25519: Proving datatypes with a rooster
Formalization of the Big Num arithmetic of TweetNaCl at ICIS DS Lunch
Lychee is a free and open-source photo-management tool.
Ru is a recolorized version (Radboud University colors) of the Metropolis theme by Matthias
2019 - Jun. - Summer School on real-world crypto and privacy - Šibenik
Summer School organised by Radboud University, ETH Zurich & FER Zagreb about recent advances in symmetric and assymetric cryptography, privacy and software and hardware security.
2018 - Dec. – 2019 - Jan. - Internship at INRIA - Sophia-Antipolis
factorizing x86 and adding A64 in Jasmin-lang.
2018 - Mar. - Flexible Symmetric Cryptography - Leiden
Workshop organised by Christina Boura, Joan Daemen, Stefan Lucks, Bart Mennink, François-Xavier Standaert
2018 - Jan. - High Assurance Cryptographic Software Workshop - Zurich
Workshop following Real World Crypto 2018.
How formal specifications can improve the trust in cryptographic softare.
2017 - Sep. - Visit of INRIA - Sophia-Antipolis
An introduction to Jasmin-lang.
2017 - Oct. - School on Computer-Aided Security Proofs - Aarhus
2017 - Jul. - Deep Spec Summer School - Philadelphia
Summer School organised by UPenn, Princeton, Yale & MIT about Formal Methods and their applications to Compilers and Code verification.
2017 - Jun. - Summer School on real-world crypto and privacy - Šibenik
Summer School organised by Radboud University, KU Leuven, ETH Zurich & FER Zagreb about recent advances in symmetric and assymetric cryptography, privacy and software and hardware security.
2017 - Jan. - Visit of Princeton University- Princeton
A detailed introduction to VST usage.
2017 - Jan. - High Assurance Cryptographic Software Workshop - New-York
Workshop following Real World Crypto 2017.
How formal Methods and Fuzzing can improve the trust in cryptographic softare.
2016 - Internship at STMicroelectronics
Formal methods in differential and linear trail search : [report] [slides]
With respect to the original version, typos have been corrected and some parts from the Apendix have been placed after the Preface.
Presentation: A brief introduction to Logic [slides]
Copyright (C) 2020 Benoit Viguier.