Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Lightweight Cryptography for Security and Privacy -

Lightweight Cryptography for Security and Privacy

6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers
Buch | Softcover
XX, 322 Seiten
2026
Springer International Publishing (Verlag)
978-3-032-15540-5 (ISBN)
CHF 74,85 inkl. MwSt
  • Noch nicht erschienen - erscheint am 04.02.2026
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1 2, 2025.


The 18 full papers presented were carefully reviewed and selected from 31 submissions. The papers were organized into the following topical sections: Post-Quantum Cryptography; Efficient Implementation of Post-Quantum Cryptography; Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge; Hardware and Architecture Security; and Security, Cryptanalysis and Attacks.

.- Post-Quantum Cryptography.
.- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0.
.- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2.
.- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures.
.- Efficient Implementation of Post-Quantum Cryptography.
.- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design.
.- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature.
.- An Optimized FrodoKEM Implementation on Reconfigurable Hardware.
.- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge.
.- Optimized FPGA Architecture for Modular Reduction in NTT.
.- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions.
.- Hardware and Architecture Security.
.- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors.
.- MIDSCAN: Investigating the portability problem for cross-device DL-SCA.
.- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles.
.- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers.
.- Hardware Circuits for the Legendre PRF.
.- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA.
.- Security, Cryptanalysis and Attacks.
.- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences.
.- Differential and Linear Analyses of DIZY through MILP modeling.
.- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity.
.- JWT Back to the future On the (ab)use of JWTs in IoT transactions.

Erscheint lt. Verlag 15.3.2026
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XX, 322 p.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Cryptanalysis • fully homomorphic encryption • hardware acceleration • Lightweight cryptography • post-quantum cryptography • Secure Implementation of Cryptographic Algorithms • secure multi-party computation • side-channel attacks • Zero-knowledge proofs
ISBN-10 3-032-15540-1 / 3032155401
ISBN-13 978-3-032-15540-5 / 9783032155405
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich