On computing the double point multiplication in elliptic curve cryptography
| dc.contributor.author | Nait-Abdesselam, Fadila | |
| dc.contributor.author | Oudjida, Abdelkrim Kamel | |
| dc.contributor.author | Khouas, Abdelhakim | |
| dc.contributor.author | Liacha, Ahmed | |
| dc.date.accessioned | 2026-04-07T08:34:45Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | The double point-multiplication (DPM) operation on elliptic curves, denoted as u.P þ v.Q, where u and v are nonnegative integers and P, Q are points on the curve, is a critical operation in digital signature verification. Its computational scheme sig- nificantly impacts system performances in terms of speed, memory usage, and security. This article introduces a range of straightforward algorithms for DPM, which leverage an iterative uniform pattern based on constant-time arithmetic. This approach mitigates side-channel attacks (SCA) that exploit tim- ing or power consumption measurements to compromise secret keys u and v. The proposed algorithms employ a w-bit windowing method to simultaneously recode the binary strings u and v and evaluate DPM on-the-fly from left-to-right. This one-pass recode/evaluation process accelerates DPM, reduces memory overhead, and enhances resilience against SCA. The new algorithms are systematically evaluated using precise ana- lytic formulas for speed, memory usage, and security. They pri- oritize simplicity and flexibility, enabling easy adjustments between speed-memory and speed-security trade-offs to meet various constraints. Comparative analysis against state-of-the- art methods is conducted, comprehensively examining com- plexities using NIST-recommended GF(2l ) curves, as well as twisted Edwards and Montgomery GF(p) curves. | |
| dc.identifier.uri | https://doi.org/10.1080/01611194.2025.2449711 | |
| dc.identifier.uri | https://dspace.univ-boumerdes.dz/handle/123456789/16236 | |
| dc.language.iso | en | |
| dc.publisher | Taylor & francis | |
| dc.relation.ispartofseries | Cryptologia/ Vol. 50, N°2 | |
| dc.subject | Double point multiplication (DPM) | |
| dc.subject | Edwards curves | |
| dc.subject | Elliptic curve cryptography (ECC) | |
| dc.subject | Elliptic curve digital signature algorithm (ECDSA) | |
| dc.title | On computing the double point multiplication in elliptic curve cryptography | |
| dc.type | Article |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- On computing the double point multiplication in elliptic curve cryptography.pdf
- Size:
- 2.04 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
