Advertisement

Lightweight Cryptography for Security and Privacy

5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers

  • Andrey Bogdanov
Conference proceedings LightSec 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10098)

Also part of the Security and Cryptology book sub series (LNSC, volume 10098)

Table of contents

  1. Front Matter
    Pages I-VII
  2. Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Shahram Rasoolzadeh, Håvard Raddum
      Pages 3-17
    3. Cihangir Tezcan, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, Nazife Baykal
      Pages 18-32
    4. Ferhat Karakoç, Öznur Mut Sağdıçoğlu, Mehmet Emin Gönen, Oğuzhan Ersoy
      Pages 33-44
    5. Mabin Joseph, Gautham Sekar, R. Balasubramanian
      Pages 45-59
    6. Mustafa Çoban, Ferhat Karakoç, Mehmet Özen
      Pages 60-68
    7. Stefan Kölbl, Arnab Roy
      Pages 69-88
  3. Lightweight Designs and Implementations

    1. Front Matter
      Pages 89-89
    2. Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
      Pages 91-109
  4. Back Matter
    Pages 149-149

About these proceedings

Introduction

This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.

The 9 full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight designs, implementation challenges.

Keywords

cryptography formal methods and theory of security security and privacy security in hardware systems security authenticated encryption block and stream ciphers cryptanalysis and other attacks differential attack FPGA hardware attacks and countermeasures hardware security implementation hash functions and message authentication codes lightweight cipher physically unclonable function public key (asymmetric) techniques security services side-channel analysis and countermeasures SoC symmetric cryptography and hash functions

Editors and affiliations

  • Andrey Bogdanov
    • 1
  1. 1.Technical University of DenmarkKongens LyngbyDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-55714-4
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-55713-7
  • Online ISBN 978-3-319-55714-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering