- Ajatemplisüsteemid : avalik loeng 30. mail 2001 TTÜsBuldas, AhtoTallinna Tehnikaülikooli aastaraamat 20012003 / lk. 308-312
- Bounded pre-image awareness and the security of hash-tree keyless signaturesBuldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, AhtoProvable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014 : proceedings2014 / p. 130-145 : ill https://doi.org/10.1007/978-3-319-12475-9_10 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84909996429&origin=inward&txGid=169ee69b6719d63921e27252844094cf https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000345592800010
- Does secure time-staming imply collision-free hash functionsBuldas, Ahto; Jürgenson, AivoInfo- ja kommunikatsioonitehnoloogia doktorikooli IKTDK kolmanda aastakonverentsi artiklite kogumik : 25.-26. aprill 2008, Voore külalistemaja2008 / p. 59-63 : ill
- Does secure time-stamping imply collision-free hash functions?Buldas, Ahto; Jürgenson, AivoLecture notes in computer science2007 / p. 138-150
- Hash-based server-assisted digital signature solutions = Räsifunktsioonidel põhinevad serveri toega digitaalse signeerimise lahendusedTruu, Ahto2020 https://digikogu.taltech.ee/et/Item/a972cc4b-53ec-4c82-8de0-b3e941cce345
- Improving the availability of time-stamping servicesAnsper, A.; Buldas, Ahto; Saarepera, Märt; Willemson, JanInformation Security and Privacy : 6th Australian Conference : ACISP 2001 : Sydney, Australia, July 11-13, 2001 : proceedings2001 / p. 360-375 https://link.springer.com/chapter/10.1007/3-540-47719-5_29
- Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum worldBuldas, Ahto; Laanoja, Risto; Truu, AhtoInternational journal of services technology and management2017 / p. 117-130 : ill https://doi.org/10.1504/IJSTM.2017.10002708 https://www.scopus.com/sourceid/19699 https://www.scopus.com/record/display.uri?eid=2-s2.0-85011279377&origin=inward&txGid=004ffeb20d7c072b548860fef26b1102
- Keyless signatures' infrastructure: How to build global distributed hash-treesBuldas, Ahto; Kroonmaa, Andres; Laanoja, RistoSecure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings2013 / p. 313 - 320 https://doi.org/10.1007/978-3-642-41488-6_21 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84890876403&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-642-41488-6_21%29&sessionSearchId=86b2c16d10adf9cdbc5bfb3ccf13491d
- Knowledge-binding commitments with applications in time-stampingBuldas, Ahto; Laur, SvenLecture notes in computer science2007 / p. 150-165 https://eprint.iacr.org/2007/071
- Long-term secure time-stamping using preimage-aware hash functions : (short version)Buldas, Ahto; Geihs, Matthias; Buchmann, JohannesProvable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23–25, 2017 : proceedings2017 / p. 251-260 : ill http://doi.org/10.1007/978-3-319-68637-0_15 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85032685678&origin=inward&txGid=c0c4e1227619d7ab264eb75b545f9b65 https://www.webofscience.com/wos/woscc/full-record/WOS:000529303600015
- A New approach to constructing digital dignature schemesBuldas, Ahto; Frisov, Denis; Laanoja, Risto; Lakk, Henri; Truu, AhtoAdvances in Information and Computer Security : 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019 : proceedings2019 / p. 363-373 https://doi.org/10.1007/978-3-030-26834-3_21 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85071436047&origin=inward&txGid=2ec636dcf95b354fa05a9bb20eda680d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000612998800021
- New linking schemes for digital time-stampingBuldas, Ahto; Laud, PeeterProceedings of the CISC'98, Seoul, Korea1998 / p. 112-123 https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=d3a005fb546ff78abc6ee453af4ee91aa6267c50
- On provably secure time-stamping schemesBuldas, Ahto; Saarepera, MärtAdvances in cryptology - ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security : Jeju Island, Korea, December 5-9, 2004 : proceedings2004 / p. 500-514 : ill https://link.springer.com/chapter/10.1007/978-3-540-30539-2_35
- Security proofs for hash tree time-stamping using hash functions with small output sizeBuldas, Ahto; Laanoja, RistoInformation security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings2013 / p. 235-250 : ill https://doi.org/10.1007/978-3-642-39059-3_16 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84884481046&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=DOI%2810.1007%2F978-3-642-39059-3_16%29&sessionSearchId=2806594f1e8987ebcedf3818d2d566a2
- Time-stamping with binary linking schemesBuldas, Ahto; Laud, Peeter; Lipmaa, Helger; Willemson, JanAdvances in Cryptology : CRYPTO'98 : 18th Annual International Cryptology Conference, Santa Barbara, California, USA August 23–27, 1998 : proceedings1998 / p. 486-501 : ill
- Universally composable time-stamping schemes with auditBuldas, Ahto; Laud, Peeter; Saarepera, Märt; Villemson, JanLecture notes in computer science2005 / p. 359-373 https://link.springer.com/chapter/10.1007/11556992_26