Search filters

List of works by Ahto Buldas

A Blockchain-Assisted Hash-Based Signature Scheme

scientific article published in 2018

A Server-Assisted Hash-Based Signature Scheme

scientific article published in 2017

An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation

scientific article published in 2022

Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?

scientific article published in 2017

Attribute evaluation on attack trees with incomplete information

scientific article published in 2020

Black-Box Separations and Their Adaptability to the Non-uniform Model

scientific article published in 2013

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?

scientific article published in 2006

Does Secure Time-Stamping Imply Collision-Free Hash Functions?

Efficiency Bounds for Adversary Constructions in Black-Box Reductions

scientific article published in 2009

Efficient Record-Level Keyless Signatures for Audit Logs

scientific article published in 2014

Eliminating counterevidence with applications to accountable certificate management1

scientific article published in July 2002

High-Performance Qualified Digital Signatures for X-Road

scientific article published in 2013

Improving the Availability of Time-Stamping Services

scientific article published in 2001

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees

scientific article published in 2013

Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world

scientific article published in 2017

Knowledge-Binding Commitments with Applications in Time-Stamping

Long-Term Secure Commitments via Extractable-Binding Commitments

scientific article published in 2017

Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions

scientific article published in 2017

New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees

scientific article published in 2013

Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping

scientific article published in 2010

Oracle Separation in the Non-uniform Model

scientific article published in 2009

Protecting a Federated Database Infrastructure against Denial-of-Service Attacks

scientific article published in 2013

Rational Choice of Security Measures Via Multi-parameter Attack Trees

scientific article published in 2006

Scalable and eficient PKI for inter-organizational communication

scholarly article

Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size

scientific article published in 2013

Server-Supported RSA Signatures for Mobile Devices

scientific article published in 2017

Simple Infeasibility Certificates for Attack Trees

scientific article published in 2017

Time-stamping with binary linking schemes

scientific article published in 1998

Upper Bounds for Adversaries’ Utility in Attack Trees

scientific article published in 2012