Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Posts

Materials that I can suggest for Cryptography and Computer Science

6 minute read

Published:

These books and other materials helped my study of cryptography. If there is an English version of the book/paper - I first give a link to that book, if there is a Russian version - the link is given in a tag “RUS”. Some materials are only in Russian, some are only in English. The links are intended to give more details about the book/paper and not as an advertisement for any platform/shop. I am sure someone would prefer a different book or material on some topics - the following list is what I used and liked during my work and studies.

portfolio

publications

Detecting brute-force attacks on cryptocurrency wallets.

Published in Business Information Systems Workshops, 2019

We study brute-force wallet attacks in cryptocurrencies, proposing protocol changes and alert-generating smart-contracts to detect and deter such attacks while exposing cryptographic weaknesses.

Recommended citation: Kiktenko, E.O., Kudinov, M.A., Fedorov, A.K. (2019). Detecting Brute-Force Attacks on Cryptocurrency Wallets. In: Abramowicz, W., Corchuelo, R. (eds) Business Information Systems Workshops. BIS 2019. Lecture Notes in Business Information Processing, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-36691-9_20
Download Paper | Download Bibtex

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era.

Published in EPJ Quantum Technology, 2021

This paper analyzes quantum computing threats to PKI systems and provides security recommendations for transitioning to post-quantum cryptography while addressing broader PKI vulnerabilities.

Recommended citation: Yunakovsky, S.E., Kot, M., Pozhar, N., Nabokov, D., Kudinov, M., Guglya, A., Kiktenko, O., Kolycheva, E., Borisov, A., Fedorov, A. Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technol. 8, 14 (2021). https://doi.org/10.1140/epjqt/s40507-021-00104-z
Download Paper | Download Bibtex

Advanced attribute-based protocol based on the modified secret sharing scheme.

Published in Journal of Computer Virology and Hacking Techniques, 2021

This work presents a new attribute-based encryption protocol using a modified secret sharing scheme that requires only one master key per user by linearly expanding public parameters.

Recommended citation: Kudinov, M.A., Chilikov, A.A., Kiktenko, E.O. et al. Advanced attribute-based encryption protocol based on the modified secret sharing scheme. J Comput Virol Hack Tech 16, 333–341 (2020). https://doi.org/10.1007/s11416-020-00366-8
Download Paper | Download Bibtex

Proof-of-forgery for hash-based signatures.

Published in 18th International Conference on Security and Cryptography SECRYPT, 2021

This work demonstrates that hash-based signatures like Lamport and Winternitz can be designed to detect forgeries through hash collisions, serving as an early warning system for cryptographic vulnerability when the underlying hash function becomes insecure.

Recommended citation: Kiktenko, E., Kudinov, M., Bulychev, A. and Fedorov, A. (2021). Proof-of-Forgery for Hash-based Signatures. In Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-524-1; ISSN 2184-7711, SciTePress, pages 333-342. DOI: 10.5220/0010579603330342
Download Paper | Download Bibtex

Recovering the tight security proof of SPHINCS+.

Published in ASIACRYPT 2022, 2022

This work provides a new tight security proof for SPHINCS+ by fixing a flaw in WOTS-TW`s proof and analyzing its quantum security, recovering nearly the original security bounds with only a small efficiency loss.

Recommended citation: Hülsing, A., Kudinov, M. (2022). Recovering the Tight Security Proof of SPHINCS+. In: Agrawal, S., Lin, D. (eds) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in Computer Science, vol 13794. Springer, Cham. https://doi.org/10.1007/978-3-031-22972-5_1
Download Paper | Download Bibtex

SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost

Published in 2023 IEEE Symposium on Security and Privacy (SP), 2022

This paper proposes optimized SPHINCS+ variants that reduce signature sizes by ~20% while speeding up signing and verification by targeting compressible message subsets.

Recommended citation: A. Hulsing, M. Kudinov, E. Ronen and E. Yogev, "SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost," in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2023, pp. 1435-1453, doi: 10.1109/SP46215.2023.10179381.
Download Paper | Download Bibtex

Hash-Based Multi-Signatures for Post-Quantum Ethereum.

Published in Communications in Cryptology, 2025

Proposing quantum-resistant XMSS-based signatures to replace Ethereum`s BLS, with explicit security proofs and practical parameters.

Recommended citation: Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, and Benedikt Wagner, Hash-Based Multi-Signatures for Post-Quantum Ethereum. IACR Communications in Cryptology, vol. 2, no. 1, Apr 08, 2025, doi: 10.62056/aey7qjp10.
Download Paper | Download Bibtex

Treating dishonest ciphertexts in post-quantum KEMs – explicit vs. implicit rejection in the FO transform.

Published in PQcrypto2025, 2025

This work proves explicit rejection in KEMs built from randomized PKE via FO transform is essentially as secure as implicit rejection, even against quantum attacks.

Recommended citation: Hövelmanns, K., Kudinov, M. (2025). Treating Dishonest Ciphertexts in Post-quantum KEMs – Explicit vs. Implicit Rejection in the FO Transform. In: Niederhagen, R., Saarinen, MJ.O. (eds) Post-Quantum Cryptography. PQCrypto 2025. Lecture Notes in Computer Science, vol 15578. Springer, Cham. https://doi.org/10.1007/978-3-031-86602-9_12
Download Paper | Download Bibtex

talks

NIST Workshop on Guidance for KEMs

Published:

A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any weakly secure PKE scheme into an IND-CCA secure KEM using derandomization and a re-encapsulation check. This talk will discuss three advanced concepts that tackle certain limitations of FO when being used in practice:

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.