Time-stamping with binary linking schemes A Buldas, P Laud, H Lipmaa, J Villemson Annual International Cryptology Conference, 486-501, 1998 | 211 | 1998 |
Keyless signatures’ infrastructure: How to build global distributed hash-trees A Buldas, A Kroonmaa, R Laanoja Nordic Conference on Secure IT Systems, 313-320, 2013 | 145 | 2013 |
Accountable certificate management using undeniable attestations A Buldas, P Laud, H Lipmaa Proceedings of the 7th ACM Conference on Computer and Communications …, 2000 | 138 | 2000 |
Rational choice of security measures via multi-parameter attack trees A Buldas, P Laud, J Priisalu, M Saarepera, J Willemson International Workshop on Critical Information Infrastructures Security, 235-248, 2006 | 134 | 2006 |
Optimally efficient accountable time-stamping A Buldas, H Lipmaa, B Schoenmakers International workshop on public key cryptography, 293-305, 2000 | 99 | 2000 |
Document verification with distributed calendar infrastructure A Buldas, M Saarepera US Patent 8,719,576, 2014 | 81 | 2014 |
System and method for generating a digital certificate M Saarepera, A Buldas US Patent 7,698,557, 2010 | 73 | 2010 |
On provably secure time-stamping schemes A Buldas, M Saarepera International Conference on the Theory and Application of Cryptology and …, 2004 | 66 | 2004 |
Eliminating counterevidence with applications to accountable certificate management A Buldas, P Laud, H Lipmaa Journal of Computer Security 10 (3), 273-296, 2002 | 63 | 2002 |
System and method for sequential data signatures A Buldas, R Laanoja, A Truu US Patent 9,614,682, 2017 | 60 | 2017 |
New linking schemes for digital time-stamping. A Buldas, P Laud ICISC 98, 3-14, 1998 | 55 | 1998 |
Method and apparatus for validating a digital signature A Ansper, A Buidas, M Roos, J Villemson US Patent 7,178,029, 2007 | 52 | 2007 |
Verification System and Method with Extra Security for Lower-Entropy Input Records A Buldas, A Truu US Patent App. 13/902,778, 2014 | 49 | 2014 |
Practical security analysis of e-voting systems A Buldas, T Mägi International Workshop on Security, 320-335, 2007 | 46 | 2007 |
Efficient long-term validation of digital signatures A Ansper, A Buldas, M Roos, J Willemson Public Key Cryptography: 4th International Workshop on Practice and Theory …, 2001 | 43 | 2001 |
Improving the availability of time-stamping services A Ansper, A Buldas, M Saarepera, J Willemson Information Security and Privacy: 6th Australasian Conference, ACISP 2001 …, 2001 | 37 | 2001 |
System and method for field-verifiable record authentication M Gault, R Laanoja, A Buldas, M Ruubel, P Rajnak, DFA Piesse, J Tan, ... US Patent 9,268,969, 2016 | 36 | 2016 |
Knowledge-binding commitments with applications in time-stamping A Buldas, S Laur International Workshop on Public Key Cryptography, 150-165, 2007 | 36 | 2007 |
Attribute evaluation on attack trees with incomplete information A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua Computers & Security 88, 101630, 2020 | 35 | 2020 |
Efficient quantum-immune keyless signatures with identity A Buldas, R Laanoja, A Truu Cryptology ePrint Archive, 2014 | 31 | 2014 |