2. KSI Academic References
1. Ahto Buldas, Märt Saarepera.
On provably secure time-
stamping schemes.
ASIACRYPT 2004, LNCS 3329,
pp.500—514.
First correct proof that the hash-
then-publish time-stamping
system is secure if the hash
function is collision resistant.
2
2. Ahto Buldas, Margus Niitsoo.
Optimally tight security proofs for
hash-then-publish time-
stamping.
ACISP 2010, LNCS 6168,
pp.318—335.
3. Ahto Buldas, Risto Laanoja.
Security proofs for hash tree
time-stamping using hash
functions with small output size.
ACISP 2013, LNCS 7959,
pp.235—250.
4. Ahto Buldas, Andres Kroonmaa,
Risto Laanoja. Keyless
Signature Infrastructure: how to
build global distributed hash-
trees.
NordSec 2013, LNCS 8208,
pp.313—320.
5. Ahto Buldas, Ahto Truu, Risto
Laanoja, Rainer Gerhards.
Efficient record-level keyless
signatures for audit logs.
NordSec 2014, LNCS 8788,
pp.149—164.
Keyless Signature Infrastructure