SlideShare a Scribd company logo
KSI Technology
An Industrial Scale Blockchain
1 Keyless Signature Infrastructure
KSI Academic References
1. Ahto Buldas, Märt Saarepera.
On provably secure time-
stamping schemes.
ASIACRYPT 2004, LNCS 3329,
pp.500—514.
First correct proof that the hash-
then-publish time-stamping
system is secure if the hash
function is collision resistant.
2
2. Ahto Buldas, Margus Niitsoo.
Optimally tight security proofs for
hash-then-publish time-
stamping.
ACISP 2010, LNCS 6168,
pp.318—335.
3. Ahto Buldas, Risto Laanoja.
Security proofs for hash tree
time-stamping using hash
functions with small output size.
ACISP 2013, LNCS 7959,
pp.235—250.
4. Ahto Buldas, Andres Kroonmaa,
Risto Laanoja. Keyless
Signature Infrastructure: how to
build global distributed hash-
trees.
NordSec 2013, LNCS 8208,
pp.313—320.
5. Ahto Buldas, Ahto Truu, Risto
Laanoja, Rainer Gerhards.
Efficient record-level keyless
signatures for audit logs.
NordSec 2014, LNCS 8788,
pp.149—164.
Keyless Signature Infrastructure

More Related Content

PPT
Privacy in Wireless Networks
PPT
Network ssecurity toolkit
PDF
KIWI.KI - The secure infrastructure for a keyless life
PPSX
Guard time connect_estonia 21.03.2012
PDF
Recommender System with Distributed Representation
PDF
Combating the enemy within – an elegant mathematical approach to insider thre...
PDF
Insights into cyber security and risk
 
Privacy in Wireless Networks
Network ssecurity toolkit
KIWI.KI - The secure infrastructure for a keyless life
Guard time connect_estonia 21.03.2012
Recommender System with Distributed Representation
Combating the enemy within – an elegant mathematical approach to insider thre...
Insights into cyber security and risk
 

Similar to Proov (20)

PDF
Tdp.a029a10
PPTX
Comparative analysis of algorithms
PDF
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
PDF
Bg34369370
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
PDF
An Enhanced Encryption Technique using BCD and Bit Complementation
PDF
Wrapped rsa cryptography check on window
DOCX
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
PDF
Implementation of hummingbird cryptographic
DOCX
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
PPTX
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
PDF
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
PPTX
CNS.ksjfkdjdjgfejfgejfgejgfjgfjegfejgfjerfegf
PDF
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
PDF
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
PDF
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
PDF
9. 23765.pdf
PDF
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
PDF
Data Search in Cloud using the Encrypted Keywords
Tdp.a029a10
Comparative analysis of algorithms
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Bg34369370
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
An Enhanced Encryption Technique using BCD and Bit Complementation
Wrapped rsa cryptography check on window
Secure Phrase Search for Intelligent Processing ofEncrypted Data in Cloud-Bas...
Implementation of hummingbird cryptographic
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Ba...
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
CNS.ksjfkdjdjgfejfgejfgejgfjgfjegfejgfjerfegf
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
Implementation of hummingbird cryptographic algorithm for low cost rfid tags ...
9. 23765.pdf
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
Data Search in Cloud using the Encrypted Keywords
Ad

Proov

  • 1. KSI Technology An Industrial Scale Blockchain 1 Keyless Signature Infrastructure
  • 2. KSI Academic References 1. Ahto Buldas, Märt Saarepera. On provably secure time- stamping schemes. ASIACRYPT 2004, LNCS 3329, pp.500—514. First correct proof that the hash- then-publish time-stamping system is secure if the hash function is collision resistant. 2 2. Ahto Buldas, Margus Niitsoo. Optimally tight security proofs for hash-then-publish time- stamping. ACISP 2010, LNCS 6168, pp.318—335. 3. Ahto Buldas, Risto Laanoja. Security proofs for hash tree time-stamping using hash functions with small output size. ACISP 2013, LNCS 7959, pp.235—250. 4. Ahto Buldas, Andres Kroonmaa, Risto Laanoja. Keyless Signature Infrastructure: how to build global distributed hash- trees. NordSec 2013, LNCS 8208, pp.313—320. 5. Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards. Efficient record-level keyless signatures for audit logs. NordSec 2014, LNCS 8788, pp.149—164. Keyless Signature Infrastructure

Editor's Notes