• Neu
Savas / Moradi / Leander | Lightweight Cryptography for Security and Privacy | Buch | 978-3-032-15540-5 | www.sack.de

Buch, Englisch, 346 Seiten, Format (B × H): 155 mm x 235 mm

Reihe: Lecture Notes in Computer Science

Savas / Moradi / Leander

Lightweight Cryptography for Security and Privacy

6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers
Erscheinungsjahr 2026
ISBN: 978-3-032-15540-5
Verlag: Springer

6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers

Buch, Englisch, 346 Seiten, Format (B × H): 155 mm x 235 mm

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-032-15540-5
Verlag: Springer


This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.


The 18 full papers presented were carefully reviewed and selected from 31 submissions. The papers were organized into the following topical sections: Post-Quantum Cryptography; Efficient Implementation of Post-Quantum Cryptography; Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge; Hardware and Architecture Security; and Security, Cryptanalysis and Attacks.

Savas / Moradi / Leander Lightweight Cryptography for Security and Privacy jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Post-Quantum Cryptography.
.- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0.
.- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2.
.- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures.
.- Efficient Implementation of Post-Quantum Cryptography.
.- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design.
.- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature.
.- An Optimized FrodoKEM Implementation on Reconfigurable Hardware.
.- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge.
.- Optimized FPGA Architecture for Modular Reduction in NTT.
.- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions.
.- Hardware and Architecture Security.
.- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors.
.- MIDSCAN: Investigating the portability problem for cross-device DL-SCA.
.- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles.
.- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers.
.- Hardware Circuits for the Legendre PRF.
.- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA.
.- Security, Cryptanalysis and Attacks.
.- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences.
.- Differential and Linear Analyses of DIZY through MILP modeling.
.- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity.
.- JWT Back to the future On the (ab)use of JWTs in IoT transactions.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.