Lightweight Cryptography for Security and Privacy: 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers

Author:   Erkay Savas ,  Amir Moradi ,  Gregor Leander
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032155405


Pages:   322
Publication Date:   04 February 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $145.17 Quantity:  
Pre-Order

Share |

Lightweight Cryptography for Security and Privacy: 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1–2, 2025, Revised Selected Papers


Overview

Full Product Details

Author:   Erkay Savas ,  Amir Moradi ,  Gregor Leander
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032155405


ISBN 10:   3032155401
Pages:   322
Publication Date:   04 February 2026
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Post-Quantum Cryptography. .- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0. .- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2. .- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures. .- Efficient Implementation of Post-Quantum Cryptography. .- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design. .- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature. .- An Optimized FrodoKEM Implementation on Reconfigurable Hardware. .- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge. .- Optimized FPGA Architecture for Modular Reduction in NTT. .- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions. .- Hardware and Architecture Security. .- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors. .- MIDSCAN: Investigating the portability problem for cross-device DL-SCA. .- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles. .- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers. .- Hardware Circuits for the Legendre PRF. .- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA. .- Security, Cryptanalysis and Attacks. .- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences. .- Differential and Linear Analyses of DIZY through MILP modeling. .- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity. .- JWT Back to the future On the (ab)use of JWTs in IoT transactions.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List