What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ahto Buldas
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2020
journals/compsec
Attribute evaluation on attack trees with incomplete information.
Ahto Buldas
Olga Gadyatskaya
Aleksandr Lenin
Sjouke Mauw
Rolando Trujillo-Rasua
2019
conf/iwsec
A New Approach to Constructing Digital Signature Schemes - (Short Paper).
Ahto Buldas
Denis Firsov
Risto Laanoja
Henri Lakk
Ahto Truu
2017
conf/acisp
Long-Term Secure Commitments via Extractable-Binding Commitments.
Ahto Buldas
Matthias Geihs
Johannes Buchmann
2017
conf/provsec
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version).
Ahto Buldas
Matthias Geihs
Johannes Buchmann
2017
conf/esorics
Server-Supported RSA Signatures for Mobile Devices.
Ahto Buldas
Aivo Kalu
Peeter Laud
Mart Oruaas
2017
conf/iwsec
Simple Infeasibility Certificates for Attack Trees.
Ahto Buldas
Aleksandr Lenin
Jan Willemson
Anton Charnamord
2014
conf/provsec
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures.
Ahto Buldas
Risto Laanoja
Peeter Laud
Ahto Truu
2013
conf/acisp
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size.
Ahto Buldas
Risto Laanoja
2013
conf/acisp
Black-Box Separations and Their Adaptability to the Non-uniform Model.
Ahto Buldas
Margus Niitsoo
2010
conf/acisp
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.
Ahto Buldas
Margus Niitsoo
2009
conf/acisp
Efficiency Bounds for Adversary Constructions in Black-Box Reductions.
Ahto Buldas
Aivo Jürgenson
Margus Niitsoo
2009
conf/provsec
Oracle Separation in the Non-uniform Model.
Ahto Buldas
Sven Laur
Margus Niitsoo
2008
conf/provsec
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.
Ahto Buldas
Margus Niitsoo
2007
conf/provsec
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
Ahto Buldas
Aivo Jürgenson
2007
conf/pkc
Knowledge-Binding Commitments with Applications in Time-Stamping.
Ahto Buldas
Sven Laur
2007
conf/iwsec
Practical Security Analysis of E-Voting Systems.
Ahto Buldas
Triinu Mägi
2006
conf/acns
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
Ahto Buldas
Sven Laur
2004
conf/asiacrypt
On Provably Secure Time-Stamping Schemes.
Ahto Buldas
Märt Saarepera
2003
conf/acsac
Scalable and Efficient PKI for Inter-Organizational Communication.
Arne Ansper
Ahto Buldas
Margus Freudenthal
Jan Willemson
2001
conf/acisp
Improving the Availability of Time-Stamping Services.
Arne Ansper
Ahto Buldas
Märt Saarepera
Jan Willemson
2001
conf/pkc
Efficient Long-Term Validation of Digital Signatures.
Arne Ansper
Ahto Buldas
Meelis Roos
Jan Willemson
2000
conf/ccs
Accountable certificate management using undeniable attestations.
Ahto Buldas
Peeter Laud
Helger Lipmaa
2000
conf/pkc
Optimally Efficient Accountable Time-Stamping.
Ahto Buldas
Helger Lipmaa
Berry Schoenmakers
1998
conf/crypto
Time-Stamping with Binary Linking Schemes.
Ahto Buldas
Peeter Laud
Helger Lipmaa
Jan Willemson
1998
conf/icisc
New linking schemes for digital time-stamping.
Ahto Buldas
Peeter Laud
Coauthors
Ahto Buldas
(25)
Ahto Truu
(2)
Aivo Jürgenson
(2)
Aivo Kalu
(1)
Aleksandr Lenin
(2)
Anton Charnamord
(1)
Arne Ansper
(3)
Berry Schoenmakers
(1)
Denis Firsov
(1)
Helger Lipmaa
(3)
Henri Lakk
(1)
Jan Willemson
(5)
Johannes Buchmann
(2)
Margus Freudenthal
(1)
Margus Niitsoo
(5)
Mart Oruaas
(1)
Märt Saarepera
(2)
Matthias Geihs
(2)
Meelis Roos
(1)
Olga Gadyatskaya
(1)
Peeter Laud
(5)
Risto Laanoja
(3)
Rolando Trujillo-Rasua
(1)
Sjouke Mauw
(1)
Sven Laur
(3)
Triinu Mägi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to