CV
Final-year Ph.D. candidate with 7 years of experience in cryptography, specializing in post-quantum cryptography, provable security, and blockchain. Contributed to NIST’s standardization process as a member of the SPHINCS+ team and published in top-tier venues like IEEE S&P and AsiaCrypt. Led research teams at the Russian Quantum Center, focusing on quantum-resistant cryptographic schemes and their applications in blockchain and secure communication.
Work experience
- Aug 2025 ‑ Present: Cryptography Consultant
- Blockstream
- Post-quantum cryptography for Bitcoin.
- Jul 2021 ‑ Oct 2025: Researcher. PhD Candidate.
- Eindhoven University of Technology
- Conducted research in post‑quantum cryptography, hash‑based signatures, and key encapsulation mechanisms.
- Published 6+ papers, including publications in top‑tier conferences like IEEE S&P and AsiaCrypt, and collaborated with the Ethereum Foundation on hash‑based signatures
- Supervisor: Dr. Andreas Hülsing.
- Oct 2020 ‑ March 2022: Lead Researcher
- Russian Quantum Center
- Led a 3‑person research team, resulting in 4+ publications, a patent, and multiple keynote presentations at international conferences.
- Developed proof‑of‑concept implementations of cryptographic schemes and consulted on blockchain integration.
- Oct 2018 ‑ Sep 2020: Junior Researcher
- Russian Quantum Center
- Conducted research on post‑quantum cryptography, provable security, broadcast encryption schemes, and blockchain technologies.
Education
- Ph.D in Cryptography and Provable Security, Eindhoven University of Technology, 2025 (expected)
- Specialist (B.S. + M.S.) in Computer Security, Bauman Moscow State Technical University, 2021
Skills
- Languages:
- Russian - Native
- English - Fluent
- Dutch - Beginner
- Programming:
- Rust
- Python
- Sage-Math
- C++
- Soft Skills:
- Project management
- Teamwork
- Presentation
Publications
Treating dishonest ciphertexts in post-quantum KEMs – explicit vs. implicit rejection in the FO transform.
Hövelmanns, K., Kudinov, M. (2025). Treating Dishonest Ciphertexts in Post-quantum KEMs – Explicit vs. Implicit Rejection in the FO Transform. In: Niederhagen, R., Saarinen, MJ.O. (eds) Post-Quantum Cryptography. PQCrypto 2025. Lecture Notes in Computer Science, vol 15578. Springer, Cham. https://doi.org/10.1007/978-3-031-86602-9_12
Hash-Based Multi-Signatures for Post-Quantum Ethereum.
Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, and Benedikt Wagner, Hash-Based Multi-Signatures for Post-Quantum Ethereum. IACR Communications in Cryptology, vol. 2, no. 1, Apr 08, 2025, doi: 10.62056/aey7qjp10.
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost
A. Hulsing, M. Kudinov, E. Ronen and E. Yogev, "SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost," in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2023, pp. 1435-1453, doi: 10.1109/SP46215.2023.10179381.
Recovering the tight security proof of SPHINCS+.
Hülsing, A., Kudinov, M. (2022). Recovering the Tight Security Proof of SPHINCS+. In: Agrawal, S., Lin, D. (eds) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in Computer Science, vol 13794. Springer, Cham. https://doi.org/10.1007/978-3-031-22972-5_1
Proof-of-forgery for hash-based signatures.
Kiktenko, E., Kudinov, M., Bulychev, A. and Fedorov, A. (2021). Proof-of-Forgery for Hash-based Signatures. In Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-524-1; ISSN 2184-7711, SciTePress, pages 333-342. DOI: 10.5220/0010579603330342
Advanced attribute-based protocol based on the modified secret sharing scheme.
Kudinov, M.A., Chilikov, A.A., Kiktenko, E.O. et al. Advanced attribute-based encryption protocol based on the modified secret sharing scheme. J Comput Virol Hack Tech 16, 333–341 (2020). https://doi.org/10.1007/s11416-020-00366-8
Security analysis of the W-OTS+ signature scheme: Updating security bounds.
M. A. Kudinov, E. O. Kiktenko, A. K. Fedorov, “Security analysis of the W-OTS+ signature scheme: Updating security bounds”, Mat. Vopr. Kryptogr., 12:2 (2021), 129–145
Towards security recommendations for public-key infrastructures for production environments in the post-quantum era.
Yunakovsky, S.E., Kot, M., Pozhar, N., Nabokov, D., Kudinov, M., Guglya, A., Kiktenko, O., Kolycheva, E., Borisov, A., Fedorov, A. Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technol. 8, 14 (2021). https://doi.org/10.1140/epjqt/s40507-021-00104-z
Detecting brute-force attacks on cryptocurrency wallets.
Kiktenko, E.O., Kudinov, M.A., Fedorov, A.K. (2019). Detecting Brute-Force Attacks on Cryptocurrency Wallets. In: Abramowicz, W., Corchuelo, R. (eds) Business Information Systems Workshops. BIS 2019. Lecture Notes in Business Information Processing, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-36691-9_20
Talks
Target Collision Resistance: Security Requirements in the Context of Hash-based Signatures
Workshop at Workshop on Poseidon: Cryptanalysis of Algebraic Hash Functions, Italy, Rome
NIST Workshop on Guidance for KEMs
Workshop at NIST Workshop on Guidance for KEMs, Online
Cryptanalysis of hash functions in the random oracle model.
Workshop at Workshop in Quantum Cryptanalysis , University of Bristol
Community Service
Reviewer for:
SAC 2024, 2022 | PKC 2023 |
---|---|
EuroCrypt 2023 | Journal of Cryptology 2022 |
CT‑RSA 2023 | PQCrypto 2022 |