Skip to main content
Log in

New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Simple side channel attacks on the implementation of elliptic curves scalar point multiplication algorithms are considered. New regular sliding window algorithms for calculating multiple points are proposed. Their optimal parameters are evaluated. The efficiency of the proposed algorithms is investigated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Hankerson, D., Menezes, A.I., and Vanstone, S., Guide to Elliptic Curve Cryptography, New York: Springer-Verlag, 2004.

    MATH  Google Scholar 

  2. Fouque, P.-A., Muller, F., Poupard, G., and Valette, F., Defeating countermeasures based on randomized BSD representations, Crtypographic Hardware and Embedded Systems – CHES 2004, Joye, M. and Quisquater, J.J., Eds., Lecture Notes in Computer Science, vol. 3156, Berlin: Springer, 2004, pp. 312–327. https://doi.org/10.1007/978-3-540-28632-5_23

    Book  Google Scholar 

  3. Möller, B., Securing elliptic curve point multiplication against side-channel attacks, Information Security. ISC 2001, Davida, G.I. and Frankel, Y., Eds., Lecture Notes in Computer Science, vol. 2200, Berlin: Springer, 2001, pp. 324–334.  https://doi.org/10.1007/3-540-45439-X_22

    Book  Google Scholar 

  4. Möller, B., Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks, Information Security. ISC 2002, Chan, A.H. and Gligor, V., Eds., Lecture Notes in Computer Science, vol. 2433, Berlin: Springer, 2002, pp. 402–441.  https://doi.org/10.1007/3-540-45811-5_31

    Book  Google Scholar 

  5. Shenets, N.N., Bystrye vychislitel’nye algoritmy v kriptografii. Uchebnoe posobie (Fast Computing Algorithms in Cryptography: Handbook), St. Petersburg: Izd. Politekhn. Univ., 2017.  https://doi.org/10.18720/SPBPU/2/i17-396

  6. Okeya, K. and Takagi, T., The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks, Topics in Cryptology – CT-RSA 2003, Joye, M., Ed., Lecture Notes in Computer Science, vol. 2612, Berlin: Springer, 2003, pp. 328–343.  https://doi.org/10.1007/3-540-36563-X_23

    Book  Google Scholar 

  7. Okeya, K. and Takagi, T., A more flexible countermeasure against side channel attacks using window method, Cryptographic Hardware and Embedded Systems – CHES 2003, Walter, C.D., Koç, Ç.K., and Paar, C., Eds., Lecture Notes in Computer Science, vol. 2779, Berlin: Springer, 2003, pp. 397–410.  https://doi.org/10.1007/978-3-540-45238-6_31

    Book  Google Scholar 

  8. Montgomery, P., Speeding the pollard and elliptic curve methods of factorization, Math. Comp., 1987, vol. 48, pp. 243–264.  https://doi.org/10.1090/S0025-5718-1987-0866113-7

    Article  MathSciNet  MATH  Google Scholar 

  9. Hamburg, M., Faster Montgomery and double-add ladders for short weierstrass curves IACR Trans. Cryptographic Hardware Embedded Syst., 2020, vol. 4, pp. 189–208.https://doi.org/10.13154/tches.v2020.i4.189-208

  10. Joye, M., Highly regular right-to-left algorithms for scalar multiplication, Cryptographic Hardware and Embedded Systems - CHES 2007, Paillier, P. and Verbauwhede, I., Eds., Lecture Notes in Computer Science, vol. 4727, Berlin: Springer, 2007, pp. 135–147.  https://doi.org/10.1007/978-3-540-74735-2_10

    Book  Google Scholar 

  11. Lim, C.H. and Lee, P.J., More flexible exponentiation with precomputation, Advances in Cryptology – CRYPTO ’94, Desmedt, Y.G., Ed., Lecture Notes in Computer Science, vol. 839, Berlin: Springer, 1994, pp. 95–107.  https://doi.org/10.1007/3-540-48658-5_11

    Book  Google Scholar 

  12. Koç, C.K., Analysis of sliding window techniques for exponentiation, Comput. Math. Appl., 1995, vol. 30, no. 10, pp. 17–24.  https://doi.org/10.1016/0898-1221(95)00153-P

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. N. Shenets.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by E. Oborin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shenets, N.N., Petushkov, A.S. New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication. Aut. Control Comp. Sci. 55, 1029–1038 (2021). https://doi.org/10.3103/S0146411621080289

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080289

Keywords:

Navigation