Ahto Truu

Orcid: 0000-0001-7427-5005

According to our database1, Ahto Truu authored at least 16 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation.
IEEE Access, 2022

2021
BLT+L: Efficient Signatures from Timestamping and Endorsements.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Verified security of BLT signature scheme.
Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2020

Verifiable Multi-Party Business Process Automation.
Proceedings of the Business Process Management Workshops, 2020

2019
A New Approach to Constructing Digital Signature Schemes (Extended Paper).
IACR Cryptol. ePrint Arch., 2019

A New Approach to Constructing Digital Signature Schemes - (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2019

2018
A Blockchain-Assisted Hash-Based Signature Scheme.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world.
Int. J. Serv. Technol. Manag., 2017

A Server-Assisted Hash-Based Signature Scheme.
Proceedings of the Secure IT Systems, 2017

2014
Security Proofs for the BLT Signature Scheme.
IACR Cryptol. ePrint Arch., 2014

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication.
IACR Cryptol. ePrint Arch., 2014

Efficient Quantum-Immune Keyless Signatures with Identity.
IACR Cryptol. ePrint Arch., 2014

Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures.
Proceedings of the Provable Security - 8th International Conference, 2014

Efficient Record-Level Keyless Signatures for Audit Logs.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

2006
MDA Approach for Maintenance of Business Applications.
Proceedings of the Model Driven Architecture, 2006


  Loading...