1. Benoit Viguier
  2. Benoit Viguier

NAME

Benoit Viguier - PhD Student in Radboud University

SYNOPSIS

Benoit Viguier [--cv] ... [--gh] [--gl] [--mail] [-l]

DESCRIPTION

Benoit Viguier is a PhD student at the Digital Security group and the Department of Software Science of the Radboud University in Nijmegen, working on tools for formally verifying cryptographic software under the supervision of Peter Schwabe, Freek Wiedijk, Joan Daemen and Herman Geuvers. Before that, he was an engineering student at the INSA Rennes (National Institute of Applied Science, France) and master student in Research in Computer Science (MRI).

OPTIONS

--cv

Curriculum Vitae

--gl

Gitlab at cs.ru.nl

--gh

GitHub repository.

--mail

λ x y. x @ y .nl benoit viguier

-l | --location

Mercator 1, 03.17
Toernooiveld 212
6525 EC Nijmegen
The Netherlands

SEE ALSO

TLK-2018-1010 - Gimli: A Cross-Platform Permutation

Presentation of Gimli at Advances in permutation-based cryptography in Milan.

TLK-2018-0717 - KangarooTwelve draft-viguier-kangarootwelve-02

Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in Montreal.

TLK-2018-0622 - Linear Cryptanalysis of Morus

Presentation of the Linear Cryptanalysis part of our paper Cryptanalysis of Morus.

PUB-2016-770 - KangarooTwelve: fast hashing based on Keccak-p

Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer and Benoît Viguier
Applied Cryptography and Network Security – ACNS 2018, Lecture Notes in Computer Science, Springer-Verlag
KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202's SHA-3 and SHAKE functions.
[pdf] [www]

PUB-2018-464 - Cryptanalysis of MORUS

Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier
As our main result, we present a linear correlation in the keystream of full MORUS, which can be used to distinguish its output from random and to recover some plaintext bits in the broadcast setting.
[pdf]

TLK-2018-0319 - KangarooTwelve draft-viguier-kangarootwelve-01

Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in London.

TLK-2017-0926 - Bookmarks for Cryptographers

Presentation of Tikz for Cryptographer and the Crypto Stack Exchange Community at CHES Rump Session in Taipei - 2017

TLK-2017-0908/0915/0927 - Gimli: A Cross-Platform Permutation

[slides 0908] Presentation of Gimli at the Crypto Working Group in Utrecht.
[slides 0915] Presentation of Gimli at the Digital Security Lunch talk in Nijmegen.
[slides 0927] Presentation of Gimli at CHES in Taipei.

PUB-2017-630 - Gimli: A Cross-Platform Permutation

Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier
Cryptographic Hardware and Embedded Systems – CHES 2017, Lecture Notes in Computer Science, Springer-Verlag
Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms.
[pdf] [bib] [www]

TLK-2017-0720 - Toward the correctness of TweetNaCl’s Ed25519 with VST

Presentation of the correctness of the Big Num arithmetic of TweetNaCl at the Student presentation of the Deep Spec Summer School - 2017

TLK-2017-0718 - KangarooTwelve draft-viguier-kangarootwelve-00

Presentation of a RFC draft about KangarooTwelve at the IRTF Crypto Forum Research Group (CFRG) meeting in Prague. Presentation kindly done by Dang, Quynh (NIST).

TLK-2017-0605 - Bookmarks for Cryptographers

Presentation of Tikz for Cryptographer and the Crypto Stack Exchange Community at the Summer School on real-world crypto and privacy in Croatia - 2017

TLK-2016-1209 - Curve25519: Proving datatypes with a rooster

Formalization of the Big Num arithmetic of TweetNaCl at ICIS DS Lunch

EXAMPLES

rutheme for beamer

Ru is a recolorized version (Radboud University colors) of the Metropolis theme by Matthias

Dotfiles

Configuration of my usual work environment.
screenshot screenshot2

CHANGELOG

2018 - Jan. - High Assurance Cryptographic Software Workshop - Zurich

Workshop following Real World Crypto 2018.
How formal specifications can improve the trust in cryptographic softare.

2017 - Sep. - Visit of INRIA - Sophia-Antipolis

An introduction to Jasmin-lang.

2017 - Oct. - School on Computer-Aided Security Proofs - Aarhus

Fall School organised by Bas Spitters about Computer-aided security proofs using Fstar and EasyCrypt.

2017 - Jul. - Deep Spec Summer School - Philadelphia

Summer School organised by UPenn, Princeton, Yale & MIT about Formal Methods and their applications to Compilers and Code verification.

2017 - Jun. - Summer School on real-world crypto and privacy - Šibenik

Summer School organised by Radboud University, KU Leuven, ETH Zurich & FER Zagreb about recent advances in symmetric and assymetric cryptography, privacy and software and hardware security.

2017 - Jan. - Visit of Princeton University- Princeton

A detailed introduction to VST usage.

2017 - Jan. - High Assurance Cryptographic Software Workshop - New-York

Workshop following Real World Crypto 2017.
How formal Methods and Fuzzing can improve the trust in cryptographic softare.

2016 - Internship at STMicroelectronics

Formal methods in differential and linear trail search : [report] [slides]
With respect to the original version, typos have been corrected and some parts from the Apendix have been placed after the Preface.
Presentation: A brief introduction to Logic [slides]


Copyright (C) 2018 Benoit Viguier.

  1. October 2018
  2. Benoit Viguier