default search action
Eligijus Sakalauskas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Ausrys Kilciauskas, Antanas Bendoraitis, Eligijus Sakalauskas:
Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs. Informatica 35(3): 601-616 (2024) - 2023
- [j20]Eligijus Sakalauskas, Antanas Bendoraitis, Dale Luksaite, Gintaras Butkus, Daiva Vitkute-Adzgauskiene:
Tax Declaration Scheme Using Blockchain Confidential Transactions. Informatica 34(3): 603-616 (2023) - [c5]Matas Levinskas, Aleksejus Mihalkovich, Lina Dindiene, Eligijus Sakalauskas:
Investigation of the Statistical Properties of the CTR Mode of the Block Cipher Based on MPF. ICIST 2023: 13-24 - 2022
- [j19]Aleksejus Mihalkovich, Matas Levinskas, Lina Dindiene, Eligijus Sakalauskas:
CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group. Informatica 33(4): 833-856 (2022) - [c4]Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas:
Key Exchange Protocol Based on the Matrix Power Function Defined Over [inline-graphic not available: see fulltext]. SAI (3) 2022: 511-531 - 2021
- [j18]Eligijus Sakalauskas, Inga Timofejeva, Ausrys Kilciauskas:
Sigma Identification Protocol Construction Based on MPF. Symmetry 13(9): 1683 (2021) - [c3]Eligijus Sakalauskas, Ausrys Kilciauskas:
Blockchain Based Cryptocurrency Transaction Data and Balance Anonymity Improvement. ICIST 2021: 160-168 - 2020
- [j17]Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis:
Security analysis of KAP based on enhanced MPF. IET Inf. Secur. 14(4): 410-418 (2020) - [j16]Ausrys Kilciauskas, Gintaras Butkus, Eligijus Sakalauskas:
Authenticated Key Agreement Protocol Based on Provable Secure Cryptographic Functions. Informatica 31(2): 277-298 (2020) - [j15]Eligijus Sakalauskas, Lina Dindiene, Ausrys Kilciauskas, Kestutis Luksys:
Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function. Symmetry 12(5): 860 (2020) - [j14]Aleksejus Mihalkovich, Eligijus Sakalauskas, Kestutis Luksys:
Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem. Symmetry 12(9): 1389 (2020) - [c2]Donatas Bartkus, Ausrys Kilciauskas, Eligijus Sakalauskas:
Sigma Key Agreement Protocol for e-Banking System. ICIST 2020: 140-146
2010 – 2019
- 2019
- [j13]Jonas Muleravicius, Inga Timofejeva, Aleksejus Mihalkovich, Eligijus Sakalauskas:
Security, Trustworthiness and Effectivity Analysis of an Offline E-Cash System with Observers. Informatica 30(2): 327-348 (2019) - 2018
- [j12]Eligijus Sakalauskas, Inga Timofejeva, Aleksejus Mihalkovich, Jonas Muleravicius:
A Simple Off-line E-Cash System with Observers. Inf. Technol. Control. 47(1): 107-117 (2018) - [j11]Eligijus Sakalauskas:
Enhanced Matrix Power Function for Cryptographic Primitive Construction. Symmetry 10(2): 43 (2018) - [j10]Eligijus Sakalauskas, Aleksejus Mihalkovich:
MPF Problem over Modified Medial Semigroup Is NP-Complete. Symmetry 10(11): 571 (2018) - 2017
- [j9]Eligijus Sakalauskas, Aleksejus Mihalkovich:
Improved Asymmetric Cipher Based on Matrix Power Function Resistant to Linear Algebra Attack. Informatica 28(3): 517-524 (2017) - [j8]Eligijus Sakalauskas, Aleksejus Mihalkovich, Algimantas Venckauskas:
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security. Symmetry 9(1): 9 (2017) - 2016
- [c1]Jonas Muleravicius, Eligijus Sakalauskas, Inga Timofejeva:
On Methodology of E-wallet Construction for Partially Off-line Payment System. ICIST 2016: 753-765 - 2014
- [j7]Eligijus Sakalauskas, Aleksejus Mihalkovich:
New Asymmetric Cipher of Non-Commuting Cryptography Class Based on Matrix Power Function. Informatica 25(2): 283-298 (2014) - 2012
- [j6]Eligijus Sakalauskas:
The multivariate quadratic Power Problem over Zn is NP-Complete. Inf. Technol. Control. 41(1): 33-39 (2012) - [j5]Eligijus Sakalauskas, Kestutis Luksys:
Matrix Power Cipher. Inf. Technol. Control. 41(4): 349-355 (2012) - 2010
- [j4]Andrius Raulynaitis, Eligijus Sakalauskas, Saulius Japertas:
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem. Informatica 21(2): 215-228 (2010)
2000 – 2009
- 2007
- [j3]Eligijus Sakalauskas, Povilas Tvarijonas, Andrius Raulynaitis:
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level. Informatica 18(1): 115-124 (2007) - [i1]Eligijus Sakalauskas, Kestutis Luksys:
Matrix Power S-Box Construction. IACR Cryptol. ePrint Arch. 2007: 214 (2007) - 2005
- [j2]Eligijus Sakalauskas:
One Digital Signature Scheme in Semimodule over Semiring. Informatica 16(3): 383-394 (2005) - 2004
- [j1]Eligijus Sakalauskas:
New Digital Signature Scheme in Gaussian Monoid. Informatica 15(2): 251-270 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-12 03:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint