Nait-Abdesselam, FadilaOudjida, Abdelkrim KamelKhouas, AbdelhakimLiacha, Ahmed2026-04-072025https://doi.org/10.1080/01611194.2025.2449711https://dspace.univ-boumerdes.dz/handle/123456789/16236The double point-multiplication (DPM) operation on elliptic curves, denoted as u.P รพ v.Q, where u and v are nonnegative integers and P, Q are points on the curve, is a critical operation in digital signature verification. Its computational scheme sig- nificantly impacts system performances in terms of speed, memory usage, and security. This article introduces a range of straightforward algorithms for DPM, which leverage an iterative uniform pattern based on constant-time arithmetic. This approach mitigates side-channel attacks (SCA) that exploit tim- ing or power consumption measurements to compromise secret keys u and v. The proposed algorithms employ a w-bit windowing method to simultaneously recode the binary strings u and v and evaluate DPM on-the-fly from left-to-right. This one-pass recode/evaluation process accelerates DPM, reduces memory overhead, and enhances resilience against SCA. The new algorithms are systematically evaluated using precise ana- lytic formulas for speed, memory usage, and security. They pri- oritize simplicity and flexibility, enabling easy adjustments between speed-memory and speed-security trade-offs to meet various constraints. Comparative analysis against state-of-the- art methods is conducted, comprehensively examining com- plexities using NIST-recommended GF(2l ) curves, as well as twisted Edwards and Montgomery GF(p) curves.enDouble point multiplication (DPM)Edwards curvesElliptic curve cryptography (ECC)Elliptic curve digital signature algorithm (ECDSA)On computing the double point multiplication in elliptic curve cryptographyArticle