
Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 15653)
Included in the following conference series:
Conference proceedings info: ACNS 2025.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
The 43 full papers and 9 poster papers presented in this volume were carefully reviewed and selected from 87 submissions. They stem from the following workshops:
· 6th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2025)
· 7th ACNS Workshop on Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS 2025)
· First Workshop on Quantum-Safe Hybrid Cryptography (QSHC 2025)
· 6th ACNS Workshop on Secure Cryptographic Implementation (SCI 2025)
· First International Workshop on Foundations and Applications of Privacy- Enhancing Cryptography (PrivCrypt 2025)
· First Workshop on Secure Protocol Implementations in the Quantum Era (SPIQE 2025)
· 7th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2025)
· 5th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2025)
Similar content being viewed by others
Table of contents (15 papers)
-
Front Matter
-
AIHWS – Artificial Intelligence in Hardware Security
-
Front Matter
-
-
AIoTS – Artificial Intelligence and Industrial IoT Security
-
Front Matter
-
-
QSHC – Quantum-Safe Hybrid Cryptography
-
Front Matter
-
-
Back Matter
Other volumes
Editors and Affiliations
Accessibility Information
PDF accessibility summary
This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.
EPUB accessibility summary
This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.2 Level AA standards. It features a navigable table of contents, structured headings, and alternative text for images, ensuring smooth, intuitive navigation and comprehension. The text is reflowable and resizable, with sufficient contrast. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.
Bibliographic Information
Book Title: Applied Cryptography and Network Security Workshops
Book Subtitle: ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Munich, Germany, June 23–26, 2025, Revised Selected Papers, Part I
Editors: Mark Manulis
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-032-01799-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0), Springer Nature Proceedings Computer Science
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2026
Softcover ISBN: 978-3-032-01798-7Published: 23 October 2025
eBook ISBN: 978-3-032-01799-4Published: 22 October 2025
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 287
Number of Illustrations: 16 b/w illustrations, 71 illustrations in colour
Topics: Computer Systems Organization and Communication Networks, Computing Milieux, Cryptology, Mobile and Network Security, Systems and Data Security
Keywords
- key management
- public key techniques
- symmetric cryptography
- cryptanalysis and other attacks
- authentication
- access control
- privacy-preserving protocol
- formal security models
- logic and verification
- intrusion/anomaly detection and malware mitigation
- smart infrastructure, systems and software
- systems security
- wireless and network security
- software and application security
- post-quantum
- lattices
- blockchain
- usability
- privacy & homomorphic encryption
- signature

