


default search action
6th LightSec 2025: Istanbul, Türkiye
- Erkay Savas

, Amir Moradi
, Gregor Leander
:
Lightweight Cryptography for Security and Privacy - 6th International Workshop, LightSec 2025, Istanbul, Türkiye, September 1-2, 2025, Revised Selected Papers. Lecture Notes in Computer Science 16216, Springer 2026, ISBN 978-3-032-15540-5
Post-quantum Cryptography
- Arda Saygan, Muhammed Said Gündogan, Atakan Arslan, Mehmet Emin Gönen:

HAPPIER: Hash-Based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0. 3-22 - Martin Feussner, Igor Semaev:

Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures, DEFIv2. 23-38 - Aikata Aikata, Anisha Mukherjee, Sujoy Sinha Roy:

Stealthy Hardware Trojan Attacks on MQ-Based Post-quantum Digital Signatures. 39-54
Efficient Implementation of Post-quantum Cryptography
- Bardia Taghavi, Reza Azarderakhsh, Mehran Mozaffari Kermani:

LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design. 57-76 - Rahul Magesh, Modini Ayyagari, Sharath Pendyala, Aydin Aysu:

A Comparison of Unified Multiplier Designs for the Falcon Post-quantum Digital Signature - A Case Study of Baseline, Tiling, Comba and Karatsuba Approaches for FPGA and ASIC. 77-96 - Giuseppe Manzoni, Shekoufeh Neisarian, Elif Bilge Kavun:

An Optimized FrodoKEM Implementation on Reconfigurable Hardware. 97-113
Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge
- Tolun Tosun, Selim Kirbiyik, Emre Koçer, Ersin Alaybeyoglu:

Optimized FPGA Architecture for Modular Reduction in NTT. 117-137 - Gökçe Düzyol, Kamil Otal:

Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions. 138-153
Hardware and Architecture Security
- Asmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez:

tt ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors. 157-177 - Lizzy Grootjen, Zhuoran Liu, Ileana Buhan:

MIDSCAN: Investigating the Portability Problem for Cross-Device DL-SCA. 178-197 - Charles-Antoine De Paepe, John Gaspoz, Dilara Toprakhisar, Svetla Nikova:

Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles. 198-211 - Charilaos Memeletzoglou, Evangelia Konstantopoulou, Nicolas Sklavos:

On Advancing Pre-silicon Hardware Trojan Detection Against Lightweight Block Ciphers. 212-230 - Subhadeep Banik, Francesco Regazzoni:

Hardware Circuits for the Legendre PRF. 231-243 - Saeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh:

Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA. 244-260
Security, Cryptanalysis and Attacks
- Mohammad Vaziri, Vesselin Velichkov:

Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences. 263-284 - Murat Burhan Ilter, Onur Koçak, Orhun Kara, Fatih Sulak:

Differential and Linear Analyses of DIZY Through MILP Modeling. 285-305 - Mohammad Vaziri:

Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity. 306-327 - Alberto Battistello, Guido Bertoni, Filippo Melzani, Maria Chiara Molteni:

JWT Back to the Future on the (Ab)use of JWTs in IoT Transactions. 328-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














