Ahto Buldas
#82,479
Most Influential Person Now
Estonian computer scientist
Ahto Buldas's AcademicInfluence.com Rankings
Ahto Buldascomputer-science Degrees
Computer Science
#3035
World Rank
#3183
Historical Rank
Information Security
#23
World Rank
#23
Historical Rank
Database
#7927
World Rank
#8254
Historical Rank
Download Badge
Computer Science
Ahto Buldas's Degrees
- PhD Computer Science University of Tartu
Similar Degrees You Can Earn
Why Is Ahto Buldas Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ahto Buldas is an Estonian computer scientist. He is the inventor of Keyless Signature Infrastructure, Co-Founder and Chief Scientist at Guardtime and Chair of the OpenKSI foundation. Life and education Buldas was born in Tallinn. After graduating from high school, he was conscripted in to the Soviet Army where he spent 2 years as an artillery officer in Siberia. After being discharged, he started studies in Tallinn University of Technology, where he defended his MSc degree in 1993 and his PhD in 1999. He currently lives in Tallinn with his wife and four children.
Ahto Buldas's Published Works
Published Works
- Time-Stamping with Binary Linking Schemes (1998) (134)
- Accountable certificate management using undeniable attestations (2000) (103)
- Rational Choice of Security Measures Via Multi-parameter Attack Trees (2006) (101)
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees (2013) (91)
- Optimally Efficient Accountable Time-Stamping (2000) (73)
- Practical Security Analysis of E-Voting Systems (2007) (62)
- On Provably Secure Time-Stamping Schemes (2004) (46)
- Eliminating Counterevidence with Applications to Accountable Certificate Management (2002) (44)
- New linking schemes for digital time-stamping (1998) (38)
- Efficient Long-Term Validation of Digital Signatures (2001) (30)
- Knowledge-Binding Commitments with Applications in Time-Stamping (2007) (27)
- Efficient Semantics of Parallel and Serial Models of Attack Trees. Ründepuude paralleel- jajadamudelite efektiivsed semantikad (2010) (25)
- Improving the Availability of Time-Stamping Services (2001) (23)
- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? (2006) (21)
- Upper Bounds for Adversaries' Utility in Attack Trees (2012) (20)
- Server-Supported RSA Signatures for Mobile Devices (2017) (20)
- Efficient Quantum-Immune Keyless Signatures with Identity (2014) (17)
- Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size (2013) (17)
- New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees (2013) (16)
- Attribute Evaluation on Attack Trees with Incomplete Information (2018) (15)
- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping (2010) (15)
- Universally Composable Time-Stamping Schemes with Audit (2005) (13)
- Undeniable Replies for Database Queries (2002) (13)
- E-voting conception security: analysis and measures (2003) (13)
- Scalable and efficient PKI for inter-organizational communication (2003) (11)
- High-Performance Qualified Digital Signatures for X-Road (2013) (10)
- A Server-Assisted Hash-Based Signature Scheme (2017) (10)
- Efficient Implementation of Keyless Signatures with Hash Sequence Authentication (2014) (9)
- Digital Signatures, Timestamping and the Corresponding Infrastructure (1998) (9)
- Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world (2017) (8)
- Electronic Signature System with Small Number of Private Keys (2003) (7)
- A VLSI implementation of RSA and IDEA encryption engine (1998) (7)
- Does Secure Time-Stamping Imply Collision-Free Hash Functions? (2007) (7)
- A Blockchain-Assisted Hash-Based Signature Scheme (2018) (6)
- Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version) (2017) (6)
- A New Approach to Constructing Digital Signature Schemes - (Short Paper) (2019) (6)
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures (2014) (6)
- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions? (2008) (5)
- Efficient Record-Level Keyless Signatures for Audit Logs (2014) (5)
- Oracle Separation in the Non-uniform Model (2009) (5)
- Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers - FDSE'2020 Keynote (2020) (5)
- An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation (2022) (4)
- A PC-BASED CAD SYSTEM FOR TRAINING DIGITAL TEST (1994) (4)
- Long-Term Secure Commitments via Extractable-Binding Commitments (2017) (4)
- Limiting Adversarial Budget in Quantitative Security Assessment (2014) (4)
- Undeniable Database Queries (2002) (3)
- Simple Infeasibility Certificates for Attack Trees (2017) (3)
- Efficiency Bounds for Adversary Constructions in Black-Box Reductions (2009) (2)
- Protecting a Federated Database Infrastructure against Denial-of-Service Attacks (2013) (2)
- A New Approach to Constructing Digital Signature Schemes (Extended Paper) (2019) (2)
- Security Proofs for the BLT Signature Scheme (2014) (2)
- A Unifying Theory of Electronic Money and Payment Systems (2021) (1)
- Certi ate Management using UndeniableStatus Attestations ? ( Submitted Version ) (2000) (1)
- Verified security of BLT signature scheme (2020) (1)
- Black-Box Separations and Their Adaptability to the Non-uniform Model (2013) (1)
- Are the Current System Engineering Practices Sufficient to Meet Cyber Crime? (2017) (1)
- Towards a Foundation of Web3 (2022) (0)
- GRAPHS AND LATTICE VARIETIES (1998) (0)
- CONGRUENCE LATTICE OF A GRAPH (1997) (0)
- COMPARABILITY GRAPHS AND THE STRUCTURE OF FINITE GRAPHS (1996) (0)
- Hash-Based Server-Assisted Digital Signature Solutions (2020) (0)
- Secure and Efficient Implementation of Electronic Money (2022) (0)
- Aggregator Aggregator Aggregator Gateway Extender Application Calendar Cache Calendar Archive Core cluster Aggregator Aggregator Aggregator Customers Customers Customers Customers Customers Aggregator Aggregator (2013) (0)
- EÆ ient long-term validation of digitalsignaturesArne (2000) (0)
- System and method for producing a digital certificate (2004) (0)
- System and method for the generation of digital certificates. (2004) (0)
This paper list is powered by the following services:
Other Resources About Ahto Buldas
What Schools Are Affiliated With Ahto Buldas?
Ahto Buldas is affiliated with the following schools: