The submissions must be anonymous with no author
names, affiliations or obvious references.
Submissions must not substantially duplicate work
that any of the authors has published in a journal
or a conference/workshop with proceedings, or has
submitted/is planning to submit before the author
notification deadline to a journal or other
conferences/workshops that have proceedings.
Accepted submissions may not appear in any other
conference or workshop that has proceedings.
The proceedings will be published in Springer-Verlag's LNCS series. Hence, the final version of accepted papers will have to follow the LNCS guidelines (http://www.springer.com/computer/lncs) using Springer's standard fonts, font sizes, and margins with a total page limit of 20 pages including references and appendices. Submissions to LightSec 2018 must follow the same format. Clearly marked supplementary materials may be appended without a page limit, but reviewers are neither required to read them nor will they be printed in the proceedings. Hence papers must be intelligible and self-contained within the 20 page bound.
LightSec is a crypto workshop series aiming at promoting and initiating novel research on the security & privacy issues for applications that can be termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements (www.lightsec.org). As such applications are becoming ubiquitous, definitely providing an immense value to the society, they are also affecting a greater portion of the public & leading to a plethora of economical & security and privacy related concerns. The goal of this workshop is to create a platform where these concerns can be addressed and proposed solutions are discussed and evaluated.
The sixth International Workshop on Lightweight Cryptography for Security & Privacy is organized in conjunction with SIN '18.
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, project outputs, surveys and industrial experiences that describe significant advances in the following areas, but are not limited to:
|Design, analysis and implementation of lightweight cryptographic protocols||Cryptographic hardware development for constrained domains|
|Security & privacy solutions for wireless embedded systems||Mobile device security with special emphasis on wearable devices|
|Lightweight privacy-preserving protocols & systems||Design and analysis of fast and compact cryptographic algorithms|
|Wireless network security for low-resource devices||Low-power crypto architectures|
|Scalable protocols and architectures for security and privacy||Formal methods for analysis of lightweight cryptographic protocols|
|Security and privacy issues in RFID and NFC||Embedded systems security|
|PUF based crypto protocols||Security of ubiquitous and pervasive computing|
|Side channel analysis and countermeasures on lightweight devices||Efficient and scalable cryptographic protocols for the Next Generation Secure Cloud and Smart Grid applications|