Full Description
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1-2, 2025.
The 18 full papers presented were carefully reviewed and selected from 31 submissions. The papers were organized into the following topical sections: Post-Quantum Cryptography; Efficient Implementation of Post-Quantum Cryptography; Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge; Hardware and Architecture Security; and Security, Cryptanalysis and Attacks.
Contents
.- Post-Quantum Cryptography.
.- HAPPIER: Hash-based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0.
.- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures DEFIv2.
.- Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures.
.- Efficient Implementation of Post-Quantum Cryptography.
.- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined Design.
.- A Comparison of Unified Multiplier Designs for the FALCON Post-Quantum Digital Signature.
.- An Optimized FrodoKEM Implementation on Reconfigurable Hardware.
.- Advanced Cryptographic Algorithms: Fully Homomorphic Encryption, Zero-Knowledge.
.- Optimized FPGA Architecture for Modular Reduction in NTT.
.- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions.
.- Hardware and Architecture Security.
.- ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors.
.- MIDSCAN: Investigating the portability problem for cross-device DL-SCA.
.- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation Principles.
.- On advancing pre-silicon Hardware Trojan detection against Lightweight Block Ciphers.
.- Hardware Circuits for the Legendre PRF.
.- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGA.
.- Security, Cryptanalysis and Attacks.
.- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences.
.- Differential and Linear Analyses of DIZY through MILP modeling.
.- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity.
.- JWT Back to the future On the (ab)use of JWTs in IoT transactions.



