Advertisement · 728 × 90

Posts by Mikhail Kudinov

Real World Crypto 2026: Lessons from Teaching Applied Cryptography in Post-Crisis Lebanon
Real World Crypto 2026: Lessons from Teaching Applied Cryptography in Post-Crisis Lebanon YouTube video by Nadim Kobeissi

I was deeply humbled by the unbelievably positive reaction to my talk at Real World Crypto 2026 in Taipei about my experiences teaching applied cryptography in post-crisis Lebanon.

The full video for the talk is now available: www.youtube.com/watch?v=z_Hx...

4 weeks ago 24 3 2 1
Post image

Just below the creators?:)
Have you played the bg railroad ink?
I think that would be cool to introduce some random patterns challenge for the level “if you build a snake pattern get 100 extra points” or smth🤷‍♂️

2 months ago 1 0 2 0
Preview
Cedarcrypt 2026 - Applied Cryptography Summer School & Conference Join us for four days of applied cryptography in the Mediterranean. July 13-16, 2026 at AUB Mediterraneo Campus, Paphos, Cyprus.

Come be part of Cedarcrypt, our historic new initiative to grow cryptography research, development and representation in the Levant region!

We're seeking speakers and workshop leaders: our call for submissions is open! Learn more: cedarcrypt.org

Please spread the word!

2 months ago 11 7 0 2
Post image Post image Post image Post image

Stumbled upon some art from one of my favorite childhood cartoons: Treasure Planet. What a great adaptation of Treasure Island. Should go rewatch it.

2 months ago 0 0 0 0
Video
2 months ago 1 0 1 0
Abstract. In this work, we initiate the study of aborting hash functions, i.e., hash functions that may abort on a non-negligible fraction of inputs. We introduce the aborting random oracle model (aROM), an idealized framework that extends the standard random oracle model (ROM) to account for aborts. Within this model, we derive bounds for various security notions and establish generic indifferentiability results demonstrating how to construct aborting random oracles from standard ones. Consequently, the derived bounds ultimately hold in the standard ROM. In this way, the aROM and its associated bounds provide a convenient and easy-to-use framework for analyzing cryptographic constructions that rely on potentially aborting hash functions.

To illustrate the utility of our framework, we apply our techniques to two settings: (1) the analysis of SNARK-friendly incomparable hypercube encodings, a core primitive in hash-based signature schemes, and (2) the analysis of grinding in Fiat–Shamir-based non-interactive arguments. Through our generic indifferentiability results, we can easily translate these analyses into concrete security bounds in the standard (non-aborting) random oracle model.

Abstract. In this work, we initiate the study of aborting hash functions, i.e., hash functions that may abort on a non-negligible fraction of inputs. We introduce the aborting random oracle model (aROM), an idealized framework that extends the standard random oracle model (ROM) to account for aborts. Within this model, we derive bounds for various security notions and establish generic indifferentiability results demonstrating how to construct aborting random oracles from standard ones. Consequently, the derived bounds ultimately hold in the standard ROM. In this way, the aROM and its associated bounds provide a convenient and easy-to-use framework for analyzing cryptographic constructions that rely on potentially aborting hash functions. To illustrate the utility of our framework, we apply our techniques to two settings: (1) the analysis of SNARK-friendly incomparable hypercube encodings, a core primitive in hash-based signature schemes, and (2) the analysis of grinding in Fiat–Shamir-based non-interactive arguments. Through our generic indifferentiability results, we can easily translate these analyses into concrete security bounds in the standard (non-aborting) random oracle model.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Aborting Random Oracles: How to Build them, How to Use them (Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro, Benedikt Wagner) ia.cr/2026/016

3 months ago 2 2 0 0
Post image

keymaterial.net/2025/12/13/a...
Sophie Schmieg’s “very unscientific guide” to PQC security provides a nice summary of the security of PQ schemes. I am not sure if I would personally put Codes below the Lattices, but I am also not an expert in Codes.

3 months ago 0 0 0 0
Preview
The IACR Can The International Association of Cryptologic Research (IACR) held their regular election using secure voting software called Helios…and lost the keys to decr...

NEW EPISODE!

The IACR lost the keys to decrypt their encrypted election results. We welcome Matt Bernhard who works on secure voting systems to explain which Helios bits are homomorphically additive or not and more:

securitycryptographywhatever.com/2025/12/30/i...
www.youtube.com/watch?v=euw_...

3 months ago 12 3 1 2
Post image
3 months ago 0 0 0 0
Post image
3 months ago 1 0 0 0
Advertisement
Post image

AsiaCrypt Afterparty 🌊

3 months ago 5 1 0 0
50 years of proof assistants

Interesting read

lawrencecpaulson.github.io//2025/12/05/...

3 months ago 1 1 0 0
Preview
Дуров лично пригласил Марсалека вложить деньги в TON — FT От его имени в криптовалюту инвестировали также его ливийские партнеры

More ties between Durov and Russia:
The FT says Telegram founder invited Jan Marsalek to invest in Telegram’s TON crypto. Marsalek now wanted in Europe for large-scale fraud and identified as an agent who coordinated Russian espionage operations in Europe.
“Mr. Freedom of speech”

3 months ago 0 0 0 0

Should we add a vote for the best talk award for the iacr conferences? Gives a bit more motivation for the speakers to polish their talks.

4 months ago 0 0 0 0
Post image

Will be giving a talk today at AsiaCrypt 2025 in Melbourne, come see!
Did you know you can use salts as short as 72 bits for hash-and-sign?
We’ll be sharing our results on the security of hash functions in the QROM, including new tools for working in the QROM and tight bounds for M-eTCR.

4 months ago 1 0 0 0

We take a look at hash-based schemes, and how they fit in Bitcoin. The paper gives a broad overview of different schemes, including SPHINCS+ and several recent modification. For readers seeking a gentle introduction to hash-based schemes, we hope this work offers a helpful starting point.

4 months ago 4 1 0 0

Thought HB schemes were running out of surprises, but new ideas keep coming. We recently looked at the “At the Top of the Hypercube” encoding for faster Winternitz-style verification, and now Abri & Katz show new optimizations for few-time signatures eprint.iacr.org/2025/2069! Still room to improve!

4 months ago 1 0 0 0
Post image

🎓 After 4 years, 7 papers, countless joyful moments, and meeting so many great people along the way, I’m excited to share that I’ve officially obtained my PhD!

It’s been an incredible journey of learning, persistence, and growth.

My thesis is now available here:
🔗 pure.tue.nl/ws/portalfil...

5 months ago 5 1 0 0

Delete twitter from the phone. So you only get there from you computer (if you even need that)

6 months ago 0 0 1 0

We are alarmed by reports that Germany is on the verge of a catastrophic about-face, reversing its longstanding and principled opposition to the EU’s Chat Control proposal which, if passed, could spell the end of the right to privacy in Europe. signal.org/blog/pdfs/ge...

6 months ago 3965 2400 40 140
Advertisement

I’m flagging this nice book/paper on FHE schemes not necessarily because it’s correct and I endorse it, but because it looks pretty useful. arxiv.org/pdf/2503.05136

6 months ago 26 4 1 0
Post image

CryptoCorgi

6 months ago 2 0 0 0

Some can always find a way to communicate and get uncensored information. But the goal is to disconnect the general audience from accessing independent news. It is important to fight censorship not for your own access, but for those who won’t fight.

6 months ago 1 0 0 0

I get mine from news.zksecurity.com :)
And zkmesh.substack.com

6 months ago 1 0 0 0
EU Chat Control criticized by 500 cryptographers over privacy risks

EU Chat Control criticized by 500 cryptographers over privacy risks

Over 500 cryptographers warn the EU draft “Chat Control” could weaken end‑to‑end encryption. The EU council votes on the Danish text on Sep 12, 2025. getnews.me/eu-chat-control-criticiz... #euchatcontrol #privacy #cryptography

7 months ago 3 3 0 0

Will there be a recording?

7 months ago 0 0 1 0

That is wild! I am envious of your students; that is top-level material!

8 months ago 1 0 0 0

I'm thrilled to announce that after months of intensive work, the complete materials for my Applied Cryptography course at the American University of Beirut are now finished: both Part 1 (Provable Security) and Part 2 (Real-World Cryptography)!

8 months ago 32 9 4 1
Advertisement
Nadim Kobeissi's Applied Cryptography Course
Nadim Kobeissi's Applied Cryptography Course YouTube video by Nadim Kobeissi

I made a video about my upcoming applied cryptography course: youtu.be/z6kK7rIbyB0

8 months ago 23 3 3 0
Post image
8 months ago 2 0 0 0