Author of the publication

A Blockchain-Assisted Hash-Based Signature Scheme.

, , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 138-153. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Buldas, Ahto
add a person with the name Buldas, Ahto
 

Other publications of authors with the same name

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication., , and . IACR Cryptology ePrint Archive, (2014)A Server-Assisted Hash-Based Signature Scheme., , and . IACR Cryptology ePrint Archive, (2019)Secure and Efficient Implementation of Electronic Money., , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 34-51. Springer, (2022)Scalable and Efficient PKI for Inter-Organizational Communication., , , and . ACSAC, page 308-318. IEEE Computer Society, (2003)A Blockchain-Assisted Hash-Based Signature Scheme., , and . IACR Cryptology ePrint Archive, (2019)Simple Infeasibility Certificates for Attack Trees., , , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 39-55. Springer, (2017)Efficiency Bounds for Adversary Constructions in Black-Box Reductions., , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 264-275. Springer, (2009)Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees., , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 313-320. Springer, (2013)Attribute Evaluation on Attack Trees with Incomplete Information., , , , and . CoRR, (2018)Efficient Long-Term Validation of Digital Signatures., , , and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 402-415. Springer, (2001)