CV Benoit Chevallier-Mames - Benoit Chevallier-Mames' Home Page

Asymmetric cryptography: Signature and encryption schemes, identification ... Cryptographic seminar in Limoges: “A practical and tightly secure signature ...
119KB taille 1 téléchargements 214 vues
Benoît Chevallier-Mames [email protected] 35, Single, French

Cryptographer Supélec Master of Science, Ph.D. in Cryptology EDUCATION M Ph.D. in Cryptology 2003–2006

• Ph.D. in computer science at the Université de Paris VII with a speciality in cryptology, within the École normale supérieure and within the Gemplus/Gemalto Security Labs. ◦ ◦ ◦ ◦

Title: Domain: Supervisor: Jury members:

Public key cryptography: Design and security proofs. Computer science (algorithmics). David Pointcheval (École normale supérieure and CNRS). Arnaud Durand (Université de Paris VII), Marc Girault (France Télécom R&D), Marc Joye (Thomson R&D), David Naccache (Université de Paris II) Adi Shamir (Weizmann Institute of Science, Israël) and Jacques Stern (École normale supérieure).

M Engineering School 1997–2000 1995–1997 1995

• Master of Science at the École supérieure d’Électricité (Supelec), which is one of the French grandes écoles: courses include notably electrical and computer engineering. • Classes préparatoires aux grandes écoles: special French preparatory classes which dispense undergraduate university-level education. • Baccalauréat in Sciences: Final diploma of French high school, with high honors (Mention Bien).

PROFESSIONAL

EXPERIENCE

M Apple R&D Engineer 2008–. . .

• R&D engineer within Apple, in the DRM Technologies team: ◦ Developpement: White-box cryptography and obfuscation. ◦ Security analysis: Attack reviews, protection design. ◦ Patents: About twenty patents in the content protection domain.

M Cryptologist at the DCSSI 2007–2008

• Inspector of the DCSSI (Central Information Systems Security Division), the State’s focal center for Information Systems Security, within the SGDN (Secretariat-General for National Defence): ◦ ◦ ◦ ◦

Research: Security audit: Consulting: Teaching:

Primitive study, conception and proof of security. Analysis, proofs and cryptanalysis of public and secret algorithms. Assist governmental services about security issues. Training in the CFSSI (Information Systems Security Training Center).

M Gemplus/Gemalto R&D Engineer 2000–2007

• Security engineer in the Gemplus/Gemalto Security Labs (smartcards dealer): ◦ Development: Embedded cryptographic libraries for smartcards. ◦ Security: Design of protections against all kind of physical attacks ◦ Patents: Seventeen patents concerning protections against physical attacks or cryptographical primitives.

COMPETENCES M Security and Cryptography • Content protection (DRM): White-box cryptography, obfuscation. • Symmetric cryptography: Design of proprietary secret-key algorithms. • Asymmetric cryptography: Signature and encryption schemes, identification protocols, provable security. • Physical security of cryptographical devices: Physical attacks (SPA, DPA, FA, DFA) and efficient protections.

M Computer Science and Skills • Languages: C, LLVM, assembly codes, crypto-assembly codes. • Scripting: Intensive use of scripts. • Experience: Development on various platforms: smartcards, PC, Mac and Unix systems. • French: mother tongue. • English: good level (worked in international teams).

TEACHING

ACTIVITIES

M Teaching 2007–2008 2007 2006–2007

• Lessons in the CFSSI (Information Systems Security Training Center): Several lectures about public key cryptography. • Lectures in cryptography at the University of Luminy: Signature schemes, physical attacks. • Lectures in cryptography at the École des Mines de Gardanne to graduate students: Bases, signature schemes, encryption schemes, identification protocols, provable security notions.

M Former trainees 2007 2006 2005

• Davide Alessio (University of Bordeaux, 5 months): Cryptanalysis of hash functions of the SHA family. • Johann Urvoy (University of Limoges, 5 months): Development of a protected elliptic-curve cryptographic library. • Amine Dogui (ENSIMAG, 5 months): Development of an RSA library, including on-board key generation.

ACADEMICAL

ACTIVITIES

M Cryptographic community 2008–2011 2004–2008 2003–2008 2000–2008

• Participation to the SHA-3 competition: Shabal-team member, which was qualified to the first and second rounds. • Participation to program committees: CHES’04, ISH’05, CT-RSA’06 and FDTC’08. • Participation to the excellence network Ecrypt and to the French funded-projects Crypto++ and Saphir. • Sub-reviewer for several conferences or journals, including Asiacrypt’05,’06,’08, CHES’03,’05,’06,’07,’08, Crypto’05,’07, CT-RSA’04,’07, Eurocrypt’05,’07, ICALP’06, IEEE Transactions on Computers and PKC’02,’06,’07.

M Seminars (invited presentations and Ph.D. defense) 2008 2007 2006 2005

• Cryptographic seminar in Caen: “Linear Bandwidth Naccache-Stern Encryption”. • Cryptographic seminar in Rennes: “Linear Bandwidth Naccache-Stern Encryption”. • Cryptographic seminar in Limoges: “A practical and tightly secure signature scheme without hash function”. • Cryptographic seminar of the École normale supérieure: Thesis defense. • Cryptographic seminar in Caen: “An Efficient CDH-based Signature Scheme with a Tight Security Reduction”.

ACADEMICAL

A C T I V I T I E S (continued)

M Conference talks 2008 2006 2005

2004 2003

• SCN: “Linear Bandwidth Naccache-Stern Encryption”. • PKC: “Encoding-free ElGamal encryption without random oracles”. • ACNS: “New signature schemes with coupons and tight reduction”. • ACNS: “Optimal asymmetric encryption and signature paddings”. • Crypto: “An efficient CDH-based signature scheme with a tight security reduction”. • CT-RSA: “Self-randomized exponentiation algorithms”. • CHES: “Faster double-size modular multiplication from euclidean multipliers”.

LIST

OF

PUBLICATIONS

M Conference Proceedings 2010

• Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache and Michael Scott. Secure Delegation of Elliptic-Curve Pairing. CARDIS 2010. • Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern and Jacques Traoré. On Some Incompatible Properties of Voting Schemes. Towards Trustworthy Elections 2010.

2009

• Benoît Chevallier-Mames and Marc Joye. ProvSec 2009.

2008

• Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier and Thomas Peyrin. How to Use Merkle-Damgard - On the Security Relations between Signature Schemes and Their Inner Hash Functions. ProvSec 2008.

Chosen-Ciphertext Secure RSA-Type Cryptosystems.

• Benoît Chevallier-Mames and David Naccache and Jacques Stern. Linear Bandwidth NaccacheStern Encryption. SCN 2008. 2007

• Benoît Chevallier-Mames and Marc Joye. A practical and tightly secure signature scheme without hash function. CT-RSA 2007. • Guilhem Castagnos and Benoît Chevallier-Mames. Towards a DL-based additively homomorphic encryption scheme. ISC 2007.

2006

• Éric Brier, Benoît Chevallier-Mames, Mathieu Ciet and Christophe Clavier. Why one should secure its public elements. CHES 2006. • Benoît Chevallier-Mames, Pascal Paillier and David Pointcheval. Encoding-free ElGamal encryption without random oracles. PKC 2006.

2005

• Benoît Chevallier-Mames. An efficient CDH-based signature scheme with a tight security reduction. CRYPTO 2005. • Benoît Chevallier-Mames. New signature schemes with coupons and tight reduction. ACNS 2005. • Benoît Chevallier-Mames, Duong Hieu Phan and David Pointcheval. Optimal asymmetric encryption and signature paddings. ACNS 2005.

2004

• Benoît Chevallier-Mames. Self-randomized exponentiation algorithms. CT-RSA 2004. • Benoît Chevallier-Mames, David Naccache, Pascal Paillier and David Pointcheval. How to disembed a program? CHES 2004.

2003

• Benoît Chevallier-Mames, Marc Joye and Pascal Paillier. Faster double-size modular multiplication from euclidean multipliers. CHES 2003.

M Journals 2004

• Benoît Chevallier-Mames, Mathieu Ciet and Marc Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Trans. Computers.

M Thesis 2006

• Benoît Chevallier-Mames. Cryptographie à clé publique: Constructions et preuves de sécurité (Public key cryptography: Design and security proofs). Ph.D. thesis (in French), Université de Paris VII.

PERSONAL

INTERESTS

• Sports: Swimming, tennis, running. • Culture: Opera, progressive rock music, theater.