Fr. 69.00

Lightweight Cryptography for Security and Privacy - 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1-2, 2025, Revised Selected Papers

English · Paperback / Softback

Will be released 15.03.2026

Description

Read more

This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1 2, 2025.

The 18 full papers presented were carefully reviewed and selected from 31 submissions. The papers were organized into the following topical sections: Post-Quantum Cryptography; Efficient Implementation of Post-Quantum Cryptography; Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge; Hardware and Architecture Security; and Security, Cryptanalysis and Attacks.

List of contents

.- Post-Quantum Cryptography.
.- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0.
.- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2.
.- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures.
.- Efficient Implementation of Post-Quantum Cryptography.
.- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design.
.- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature.
.- An Optimized FrodoKEM Implementation on Reconfigurable Hardware.
.- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge.
.- Optimized FPGA Architecture for Modular Reduction in NTT.
.- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions.
.- Hardware and Architecture Security.
.- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors.
.- MIDSCAN: Investigating the portability problem for cross-device DL-SCA.
.- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles.
.- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers.
.- Hardware Circuits for the Legendre PRF.
.- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA.
.- Security, Cryptanalysis and Attacks.
.- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences.
.- Differential and Linear Analyses of DIZY through MILP modeling.
.- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity.
.- JWT Back to the future On the (ab)use of JWTs in IoT transactions.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.