Mikhail Kudinov's Avatar

Mikhail Kudinov

@error024.bsky.social

PhD, Post-Quantum cryptography. https://error0024.github.io/

86 Followers  |  110 Following  |  39 Posts  |  Joined: 29.11.2024  |  1.8319

Latest posts by error024.bsky.social on Bluesky


Post image

Just below the creators?:)
Have you played the bg railroad ink?
I think that would be cool to introduce some random patterns challenge for the level โ€œif you build a snake pattern get 100 extra pointsโ€ or smth๐Ÿคทโ€โ™‚๏ธ

07.02.2026 15:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Preview
Cedarcrypt 2026 - Applied Cryptography Summer School & Conference Join us for four days of applied cryptography in the Mediterranean. July 13-16, 2026 at AUB Mediterraneo Campus, Paphos, Cyprus.

Come be part of Cedarcrypt, our historic new initiative to grow cryptography research, development and representation in the Levant region!

We're seeking speakers and workshop leaders: our call for submissions is open! Learn more: cedarcrypt.org

Please spread the word!

03.02.2026 14:20 โ€” ๐Ÿ‘ 8    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image Post image Post image

Stumbled upon some art from one of my favorite childhood cartoons: Treasure Planet. What a great adaptation of Treasure Island. Should go rewatch it.

31.01.2026 12:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail
19.01.2026 23:11 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Abstract. In this work, we initiate the study of aborting hash functions, i.e., hash functions that may abort on a non-negligible fraction of inputs. We introduce the aborting random oracle model (aROM), an idealized framework that extends the standard random oracle model (ROM) to account for aborts. Within this model, we derive bounds for various security notions and establish generic indifferentiability results demonstrating how to construct aborting random oracles from standard ones. Consequently, the derived bounds ultimately hold in the standard ROM. In this way, the aROM and its associated bounds provide a convenient and easy-to-use framework for analyzing cryptographic constructions that rely on potentially aborting hash functions.

To illustrate the utility of our framework, we apply our techniques to two settings: (1) the analysis of SNARK-friendly incomparable hypercube encodings, a core primitive in hash-based signature schemes, and (2) the analysis of grinding in Fiatโ€“Shamir-based non-interactive arguments. Through our generic indifferentiability results, we can easily translate these analyses into concrete security bounds in the standard (non-aborting) random oracle model.

Abstract. In this work, we initiate the study of aborting hash functions, i.e., hash functions that may abort on a non-negligible fraction of inputs. We introduce the aborting random oracle model (aROM), an idealized framework that extends the standard random oracle model (ROM) to account for aborts. Within this model, we derive bounds for various security notions and establish generic indifferentiability results demonstrating how to construct aborting random oracles from standard ones. Consequently, the derived bounds ultimately hold in the standard ROM. In this way, the aROM and its associated bounds provide a convenient and easy-to-use framework for analyzing cryptographic constructions that rely on potentially aborting hash functions. To illustrate the utility of our framework, we apply our techniques to two settings: (1) the analysis of SNARK-friendly incomparable hypercube encodings, a core primitive in hash-based signature schemes, and (2) the analysis of grinding in Fiatโ€“Shamir-based non-interactive arguments. Through our generic indifferentiability results, we can easily translate these analyses into concrete security bounds in the standard (non-aborting) random oracle model.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Aborting Random Oracles: How to Build them, How to Use them (Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro, Benedikt Wagner) ia.cr/2026/016

09.01.2026 02:47 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

keymaterial.net/2025/12/13/a...
Sophie Schmiegโ€™s โ€œvery unscientific guideโ€ to PQC security provides a nice summary of the security of PQ schemes. I am not sure if I would personally put Codes below the Lattices, but I am also not an expert in Codes.

07.01.2026 12:41 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
The IACR Can The International Association of Cryptologic Research (IACR) held their regular election using secure voting software called Heliosโ€ฆand lost the keys to decr...

NEW EPISODE!

The IACR lost the keys to decrypt their encrypted election results. We welcome Matt Bernhard who works on secure voting systems to explain which Helios bits are homomorphically additive or not and more:

securitycryptographywhatever.com/2025/12/30/i...
www.youtube.com/watch?v=euw_...

31.12.2025 02:15 โ€” ๐Ÿ‘ 12    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 2
Post image 31.12.2025 11:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 27.12.2025 21:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

AsiaCrypt Afterparty ๐ŸŒŠ

14.12.2025 07:59 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
50 years of proof assistants

Interesting read

lawrencecpaulson.github.io//2025/12/05/...

13.12.2025 12:37 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
ะ”ัƒั€ะพะฒ ะปะธั‡ะฝะพ ะฟั€ะธะณะปะฐัะธะป ะœะฐั€ัะฐะปะตะบะฐ ะฒะปะพะถะธั‚ัŒ ะดะตะฝัŒะณะธ ะฒ TON โ€” FT ะžั‚ ะตะณะพ ะธะผะตะฝะธ ะฒ ะบั€ะธะฟั‚ะพะฒะฐะปัŽั‚ัƒ ะธะฝะฒะตัั‚ะธั€ะพะฒะฐะปะธ ั‚ะฐะบะถะต ะตะณะพ ะปะธะฒะธะนัะบะธะต ะฟะฐั€ั‚ะฝะตั€ั‹

More ties between Durov and Russia:
The FT says Telegram founder invited Jan Marsalek to invest in Telegramโ€™s TON crypto. Marsalek now wanted in Europe for large-scale fraud and identified as an agent who coordinated Russian espionage operations in Europe.
โ€œMr. Freedom of speechโ€

12.12.2025 19:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Should we add a vote for the best talk award for the iacr conferences? Gives a bit more motivation for the speakers to polish their talks.

11.12.2025 01:22 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Will be giving a talk today at AsiaCrypt 2025 in Melbourne, come see!
Did you know you can use salts as short as 72 bits for hash-and-sign?
Weโ€™ll be sharing our results on the security of hash functions in the QROM, including new tools for working in the QROM and tight bounds for M-eTCR.

10.12.2025 20:16 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

We take a look at hash-based schemes, and how they fit in Bitcoin. The paper gives a broad overview of different schemes, including SPHINCS+ and several recent modification. For readers seeking a gentle introduction to hash-based schemes, we hope this work offers a helpful starting point.

09.12.2025 00:22 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thought HB schemes were running out of surprises, but new ideas keep coming. We recently looked at the โ€œAt the Top of the Hypercubeโ€ encoding for faster Winternitz-style verification, and now Abri & Katz show new optimizations for few-time signatures eprint.iacr.org/2025/2069! Still room to improve!

13.11.2025 11:55 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐ŸŽ“ After 4 years, 7 papers, countless joyful moments, and meeting so many great people along the way, Iโ€™m excited to share that Iโ€™ve officially obtained my PhD!

Itโ€™s been an incredible journey of learning, persistence, and growth.

My thesis is now available here:
๐Ÿ”— pure.tue.nl/ws/portalfil...

28.10.2025 10:16 โ€” ๐Ÿ‘ 5    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Delete twitter from the phone. So you only get there from you computer (if you even need that)

09.10.2025 12:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EUโ€™s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. signal.org/blog/pdfs/ge...

03.10.2025 16:14 โ€” ๐Ÿ‘ 3976    ๐Ÿ” 2409    ๐Ÿ’ฌ 40    ๐Ÿ“Œ 141

Iโ€™m flagging this nice book/paper on FHE schemes not necessarily because itโ€™s correct and I endorse it, but because it looks pretty useful. arxiv.org/pdf/2503.05136

22.09.2025 19:21 โ€” ๐Ÿ‘ 27    ๐Ÿ” 4    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

CryptoCorgi

20.09.2025 20:22 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Some can always find a way to communicate and get uncensored information. But the goal is to disconnect the general audience from accessing independent news. It is important to fight censorship not for your own access, but for those who wonโ€™t fight.

18.09.2025 18:09 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I get mine from news.zksecurity.com :)
And zkmesh.substack.com

15.09.2025 08:26 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
EU Chat Control criticized by 500 cryptographers over privacy risks

EU Chat Control criticized by 500 cryptographers over privacy risks

Over 500 cryptographers warn the EU draft โ€œChatโ€ฏControlโ€ could weaken endโ€‘toโ€‘end encryption. The EU council votes on the Danish text on Sepโ€ฏ12,โ€ฏ2025. https://getnews.me/eu-chat-control-criticized-by-500-cryptographers-over-privacy-risks/ #euchatcontrol #privacy #cryptography

09.09.2025 11:37 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Will there be a recording?

25.08.2025 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

That is wild! I am envious of your students; that is top-level material!

06.08.2025 18:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I'm thrilled to announce that after months of intensive work, the complete materials for my Applied Cryptography course at the American University of Beirut are now finished: both Part 1 (Provable Security) and Part 2 (Real-World Cryptography)!

06.08.2025 08:01 โ€” ๐Ÿ‘ 32    ๐Ÿ” 9    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 1
Nadim Kobeissi's Applied Cryptography Course
YouTube video by Nadim Kobeissi Nadim Kobeissi's Applied Cryptography Course

I made a video about my upcoming applied cryptography course: youtu.be/z6kK7rIbyB0

28.07.2025 08:51 โ€” ๐Ÿ‘ 23    ๐Ÿ” 3    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
Post image 26.07.2025 20:56 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Crypto 2025 is just around the corner! Check out the full program here:
crypto.iacr.org/2025/program...

Join us on Monday for our talk where we explore the tradeoffs of hash-based signatures.

We then apply these findings to propose post-quantum Ethereum PoS signatures:
eprint.iacr.org/2025/1332

25.07.2025 18:00 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@error024 is following 20 prominent accounts