Publications


Guardtime's publications

Academic Paper KSI Security

Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures

View online...
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu

In: Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu. Provable Security - 8th International Conference, ProvSec 2014, Proceedings. LNCS 8782, pp. 130-145. Springer, 2014. 

Pre-print version available HERE.
Academic Paper KSI Security

Security Proofs for Hash-Tree Time-Stamping Using Hash Functions with Small Output Size

View online...
Ahto Buldas, Risto Laanoja

In: Colin Boyd, Leonie Simpson. Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings. LNCS 7959, pp. 235-250. Springer, 2013.
Academic Paper KSI Security

Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.

View online...

Ahto Buldas, Margus Niitsoo

In: Ron Steinfeld, Philip Hawkes. Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. LNCS 6168, pp. 318-335. Springer, 2010.

Academic Paper KSI Security

Knowledge-Binding Commitments with Applications in Time-Stamping

View online...
Ahto Buldas, Sven Laur

In: Okamoto T., Wang X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, 2007.
Academic Paper KSI Security

Does Secure Time-Stamping Imply Collision-Free Hash Functions?

View online...
Ahto Buldas, Aivo Jürgenson

In: Susilo W., Liu J.K., Mu Y. (eds) Provable Security. ProvSec 2007. Lecture Notes in Computer Science, vol 4784. Springer, 2007.
Academic Paper KSI Security

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?

View online...
Ahto Buldas, Sven Laur

In: Zhou J., Yung M., Bao F. (eds) Applied Cryptography and Network Security. ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, 2006.
Academic Paper KSI Security

Universally Composable Time-Stamping Schemes with Audit

View online...
Ahto Buldas, Peeter Laud, Mart Saarepera, Jan Willemson

In: Zhou J., Lopez J., Deng R.H., Bao F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, 2005.

Extended version available HERE.
Academic Paper KSI Security

On Provably Secure Time-Stamping Schemes

View online...

Ahto Buldas, Märt Saarepera

In: Pil Joong Lee. Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. LNCS 3329, pp. 500-514. Springer, 2004.

Academic Paper KSI Engineering

Verifiable Multi-Party Business Process Automation

View online...
Joosep Simm, Jamie Steiner, Ahto Truu.

In: A. Del Río Ortega, H. Leopold, F.M. Santoro. Business Process Management Workshops. BPM 2020. LNBIP 397, pp. 30-41. Springer, 2021.

Author's manuscript available HERE.
Academic Paper KSI Engineering

Keyless Signature Infrastructure and PKI: Hash-Tree Signatures in Pre- and Post-Quantum World

View online...
Ahto Buldas, Risto Laanoja, Ahto Truu

In: International Journal of Services Technology and Management, Vol. 23, Nos. 1/2, pp. 117-130. Inderscience publishers, 2017.

Academic Paper KSI Engineering

Efficient Record-Level Keyless Signatures for Audit Logs

View online...
Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards

In: Karin Bernsmed, Simone Fischer-Hübner. Secure IT Systems - 19th Nordic Conference, NordSec 2014, Proceedings. LNCS 8788, pp. 149-164. Springer, 2014.

Pre-print version available HERE.
Academic Paper KSI Engineering

Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees

View online...
Ahto Buldas, Andres Kroonmaa, Risto Laanoja

In: Hanne Riis Nielson, Dieter Gollmann. Secure IT Systems - 18th Nordic Conference, NordSec 2013, Proceedings. LNCS 8208, pp 313-320. Springer, 2013.

Pre-print version available HERE.
Academic Paper BLT

Verified Security of BLT Signature Scheme

View online...
Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja

In: CPP 2020: Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, pp. 244–257. ACM DL, 2020.

Pre-print available HERE.
Code HERE.
Academic Paper BLT

A New Approach to Constructing Digital Signature Schemes

View online...
Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu

In: Attrapadung N., Yagi T. (eds) Advances in Information and Computer Security. IWSEC 2019. Lecture Notes in Computer Science, vol 11689. Springer, 2019. 

Extended version available HERE.

Academic Paper BLT

A Blockchain-Assisted Hash-Based Signature Scheme

View online...
Ahto Buldas, Risto Laanoja, Ahto Truu

In: Nils Gruschka. Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Proceedings. LNCS 11252, pp. 138-153. Springer, 2018.

Pre-print available HERE.
Academic Paper BLT

A Server-Assisted Hash-Based Signature Scheme

View online...
Ahto Buldas, Risto Laanoja, Ahto Truu

In: Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius. Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Proceedings. LNCS 10674, pp. 3-17. Springer, 2017.

Pre-print version available HERE.
Academic Paper Policy

The Technological Sovereignty Dilemma – and How New Technology Can Offer a Way Out

View online...
Luukas Ilves, Anna-Maria Osula

In: European Cybersecurity Journal, Vol. 6, No. 1, 2020, pp. 24-35. 
Academic Paper Policy

Blockchain Industry, Regulations and Policy in Estonia

View online...
Risto Hansen

In: Asian Research Policy , Vol. 9, No. 2, 2018 (special issue on Science and Technology Trends - Blockchain Industries, Regulations and Policy), pp. 45-55.
Academic Paper Collaboration

SST Data Trust as a Service - Towards Secure Decentralised Management and Exchange of Space Surveillance and Tracking Data

View online...

M. Popp, V. Rogojin, M.C.Boysan, and M. Wallum.

In 8th European Conference on Space Debris, 20-23.04.2021, vol 8/1, ESA Space Debris Office, 2021.

Whitepaper

Blockchain Receipts using History Trees

View online...

Guardtime Whitepaper by Risto Alas and Hema Krishnamurthy, 2020

Whitepaper

Blockchain Designed for Supply Chains: Guardtime Supply Chain Framework

View online...
Guardtime Whitepaper, 2020
Whitepaper

Shortage Alerts Engine

View online...
Guardtime Health Whitepaper, 2020
Whitepaper

Real World Data Engine

View online...
Guardtime Health Whitepaper, 2020
Whitepaper

Data integrity critical in securing autonomous AI

View online...
Whitepaper by Guardtime Strategic Advisor Tony Kenyon, 2019
Whitepaper

Privacy Series: Differential Privacy in a Nutshell

View online...
Guardtime Research whitepaper, 2019
Whitepaper

Convergence of Blockchain and Artificial Intelligence

View online...
Guardtime Research whitepaper, 2019
Whitepaper

Guardtime Health

View online...
Guardtime Whitepaper, 2019
Whitepaper

Enabling Multi Party Trust in the Era of 5G and Multi-Access Edge Computing

View online...
Guardtime Whitepaper, 2019
Whitepaper

KSI and PUF - Internet of Things Authentication

View online...

Guardtime Whitepaper, 2016
Whitepaper

KSI and SDN - Use of a globally distributed blockchain to secure SDN

View online...
Guardtime Whitepaper, 2016
Whitepaper

KSI and Insider Threat - Combating the enemy within – an elegant mathematical approach to insider threat eradication

View online...
Guardtime Whitepaper, 2015
Whitepaper

Attributable Networks - Truth, not Trust

View online...
Guardtime Whitepaper, 2014
Whitepaper

Cloud Insecurity and True Accountability - Primer for CIOs on Guardtime and KSI for Attributed Networking

View online...
Guardtime Whitepaper, 2014
Whitepaper

Internet of Things (IoT) Security - Turning Defense into Offence

View online...
Guardtime Whitepaper, 2014