Muutke küpsiste eelistusi

Lightweight Cryptography for Security and Privacy: 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 12, 2025, Revised Selected Papers [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 346 pages, kõrgus x laius: 235x155 mm, 73 Illustrations, color; 19 Illustrations, black and white
  • Sari: Lecture Notes in Computer Science
  • Ilmumisaeg: 31-Jan-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032155401
  • ISBN-13: 9783032155405
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,87 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,49 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 346 pages, kõrgus x laius: 235x155 mm, 73 Illustrations, color; 19 Illustrations, black and white
  • Sari: Lecture Notes in Computer Science
  • Ilmumisaeg: 31-Jan-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032155401
  • ISBN-13: 9783032155405
Teised raamatud teemal:
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 12, 2025.





The 18 full papers presented were carefully reviewed and selected from 31 submissions. The papers were organized into the following topical sections: Post-Quantum Cryptography; Efficient Implementation of Post-Quantum Cryptography; Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge; Hardware and Architecture Security; and Security, Cryptanalysis and Attacks.
.- Post-Quantum Cryptography.
.- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures
Implemented Efficiently with Risc0.
.- Isotropic Quadratic Forms, Diophantine Equations and Digital
Signatures DEFIv2.
.- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum
Digital Signatures.
.- Efficient Implementation of Post-Quantum Cryptography.
.- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry
Pipelined Design.
.- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum
Digital Signature.
.- An Optimized FrodoKEM Implementation on Reconfigurable Hardware.
.- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption,
Zero-Knowledge.
.- Optimized FPGA Architecture for Modular Reduction in NTT.
.- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly
Hash Functions.
.- Hardware and Architecture Security.
.- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in
RISC-V Processors.
.- MIDSCAN: Investigating the portability problem for cross-device DL-SCA.
.- Protecting AES-128 Against First-Order Side-Channel Analysis in
Micro-Architectures by Enforcing Threshold Implementation Principles.
.- On advancing pre-silicon Hardware Trojan detection against Lightweight
Block Ciphers.
.- Hardware Circuits for the Legendre PRF.
.- Lightweight Fault Detection Architecture for Modular Exponentiation in
Cryptography on ARM and FPGA.
.- Security, Cryptanalysis and Attacks.
.- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting
State Differences.
.- Differential and Linear Analyses of DIZY through MILP modeling.
.- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and
Memory Complexity.
.- JWT Back to the future On the (ab)use of JWTs in IoT transactions.