Risto Laanoja

Orcid: 0000-0002-5157-3373

According to our database1, Risto Laanoja authored at least 14 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation.
IEEE Access, 2022

2020
Verified security of BLT signature scheme.
Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2020

2019
A New Approach to Constructing Digital Signature Schemes (Extended Paper).
IACR Cryptol. ePrint Arch., 2019

A New Approach to Constructing Digital Signature Schemes - (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2019

2018
A Blockchain-Assisted Hash-Based Signature Scheme.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world.
Int. J. Serv. Technol. Manag., 2017

A Server-Assisted Hash-Based Signature Scheme.
Proceedings of the Secure IT Systems, 2017

2014
Security Proofs for the BLT Signature Scheme.
IACR Cryptol. ePrint Arch., 2014

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication.
IACR Cryptol. ePrint Arch., 2014

Efficient Quantum-Immune Keyless Signatures with Identity.
IACR Cryptol. ePrint Arch., 2014

Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures.
Proceedings of the Provable Security - 8th International Conference, 2014

Efficient Record-Level Keyless Signatures for Audit Logs.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

2013
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013


  Loading...