The following publications are possibly variants of this publication:
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless SignaturesAhto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu. provsec 2014: 130-145 [doi]
- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless SignaturesAhto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu. iacr, 2014:700, 2014. [doi]
- Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum worldAhto Buldas, Risto Laanoja, Ahto Truu. ijstm, 23(1/2):117-130, 2017. [doi]
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-TreesAhto Buldas, Andres Kroonmaa, Risto Laanoja. nordsec 2013: 313-320 [doi]
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-TreesAhto Buldas, Andres Kroonmaa, Risto Laanoja. iacr, 2013:834, 2013. [doi]
- Efficient Implementation of Keyless Signatures with Hash Sequence AuthenticationAhto Buldas, Risto Laanoja, Ahto Truu. iacr, 2014:689, 2014. [doi]
- Efficient Implementation of Keyless Signatures with Hash Sequence AuthenticationAhto Buldas, Risto Laanoja, Ahto Truu. iacr, 2014:689, 2014. [doi]