Ajatemplisüsteemid : avalik loeng 30. mail 2001 TTÜsBuldas, AhtoTallinna Tehnikaülikooli aastaraamat 20012003 / lk. 308-312 Bounded pre-image awareness and the security of hash-tree keyless signaturesBuldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, AhtoProvable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings2014 / p. 130-145 : ill https://doi.org/10.1007/978-3-319-12475-9_10 Conference proceeding at Scopus Article at Scopus Conference proceeding at WOS Article at WOS Does secure time-staming imply collision-free hash functionsBuldas, Ahto; Jürgenson, AivoInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 59-63 : ill Does secure time-stamping imply collision-free hash functions?Buldas, Ahto; Jürgenson, AivoLecture notes in computer science2007 / p. 138-150 Hash-based server-assisted digital signature solutions = Räsifunktsioonidel põhinevad serveri toega digitaalse signeerimise lahendusedTruu, Ahto2020 https://digikogu.taltech.ee/et/Item/a972cc4b-53ec-4c82-8de0-b3e941cce345 Improving the availability of time-stamping servicesAnsper, A.; Buldas, Ahto; Saarepera, Märt; Willemson, JanInformation Security and Privacy : 6th Australian Conference : ACISP 2001 : Sydney, Australia, July 11-13, 2001 : proceedings2001 / p. 360-375 https://link.springer.com/chapter/10.1007/3-540-47719-5_29 Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum worldBuldas, Ahto; Laanoja, Risto; Truu, AhtoInternational journal of services technology and management2017 / p. 117-130 : ill https://doi.org/10.1504/IJSTM.2017.10002708 Journal metrics at Scopus Article at Scopus Keyless signatures' infrastructure: How to build global distributed hash-treesBuldas, Ahto; Kroonmaa, Andres; Laanoja, RistoSecure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings2013 / p. 313 - 320 https://doi.org/10.1007/978-3-642-41488-6_21 Conference Proceedings at Scopus Article at Scopus Knowledge-binding commitments with applications in time-stampingBuldas, Ahto; Laur, SvenLecture notes in computer science2007 / p. 150-165 https://eprint.iacr.org/2007/071 Long-term secure time-stamping using preimage-aware hash functions : (short version)Buldas, Ahto; Geihs, Matthias; Buchmann, JohannesProvable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23–25, 2017 : proceedings2017 / p. 251-260 : ill http://doi.org/10.1007/978-3-319-68637-0_15 Conference proceedings at Scopus Article at Scopus Article at WOS A New approach to constructing digital dignature schemesBuldas, Ahto; Frisov, Denis; Laanoja, Risto; Lakk, Henri; Truu, AhtoAdvances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019 : proceedings2019 / p. 363-373 https://doi.org/10.1007/978-3-030-26834-3_21 Conference proceeding at Scopus Article at Scopus Conference proceeding at WOS Article at WOS New linking schemes for digital time-stampingBuldas, Ahto; Laud, PeeterProceedings of the CISC'98, Seoul, Korea1998 / p. 112-123 https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=d3a005fb546ff78abc6ee453af4ee91aa6267c50 On provably secure time-stamping schemesBuldas, Ahto; Saarepera, MärtAdvances in cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security : Jeju Island, Korea, December 5-9, 2004 : proceedings2004 / p. 500-514 : ill https://link.springer.com/chapter/10.1007/978-3-540-30539-2_35 Security proofs for hash tree time-stamping using hash functions with small output sizeBuldas, Ahto; Laanoja, RistoInformation security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings2013 / p. 235-250 : ill https://doi.org/10.1007/978-3-642-39059-3_16 Conference Proceedings at Scopus Article at Scopus Time-stamping with binary linking schemesBuldas, Ahto; Laud, Peeter; Lipmaa, Helger; Willemson, JanAdvances in Cryptology : CRYPTO'98 : 18th Annual International Cryptology Conference, Santa Barbara, California, USA August 23–27, 1998 : proceedings1998 / p. 486-501 : ill Universally composable time-stamping schemes with auditBuldas, Ahto; Laud, Peeter; Saarepera, Märt; Villemson, JanLecture notes in computer science2005 / p. 359-373 https://link.springer.com/chapter/10.1007/11556992_26