• Previous Article
    Some group-theoretical results on Feistel Networks in a long-key scenario
  • AMC Home
  • This Issue
  • Next Article
    Composite constructions of self-dual codes from group rings and new extremal self-dual binary codes of length 68
November  2020, 14(4): 703-726. doi: 10.3934/amc.2020090

Speeding up regular elliptic curve scalar multiplication without precomputation

1. 

Institute of Mathematics, State Academy of Sciences and, PGItech Corp., Pyongyang, Democratic People's Republic of Korea

2. 

Institute of Mathematics, State Academy of Sciences, Pyongyang, Democratic People's Republic of Korea

3. 

PGItech Corp., Pyongyang, Democratic People's Republic of Korea

Received  August 2019 Revised  March 2020 Published  July 2020

This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierstrass curves over fields with characteristic greater than 3, which need only 12 field multiplications per scalar bit using 8 $ \sim $ 9 field registers, thus outperform the binary NAF method on average. Over binary fields, the Montgomery scalar multiplication algorithm which was presented at the first CHES workshop by López and Dahab has been a favorite of ECC implementors, due to its nice properties such as high efficiency (outperforming the binary NAF), natural SPA-resistance, generality (coping with all ordinary curves) and implementation easiness. Over odd characteristic fields, the new scalar multiplication algorithms are the first ones featuring all these properties. Building-blocks of our contribution are new efficient differential addition-and-doubling formulae and a novel conception of on-the-fly adaptive coordinates which varies in accordance with not only the base point but also the bits of the given scalar.

Citation: Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong. Speeding up regular elliptic curve scalar multiplication without precomputation. Advances in Mathematics of Communications, 2020, 14 (4) : 703-726. doi: 10.3934/amc.2020090
References:
[1]

T. Akishita and T. Takagi, Zero-value point attacks on elliptic curve cryptosystem, in ISC 2003 (eds. C. Boyd and W. Mao), Springer, (2003), 218–233. doi: 10.1007/10958513_17.  Google Scholar

[2]

J. C. Bajard, S. Duquesne and M. Ercegovac, Combining leak-resistant arithmetic for elliptic curves defined over $\mathbb{F}_p$ and RNS representation, Cryptology ePrint Archive, Report 2010/311, 2010. Available from: http://eprint.iacr.org/2010/311. Google Scholar

[3]

A. BauerE. JaulmesE. ProuffJ. R. Reinhard and J. Wild, Horizontal collision correlation attack on elliptic curves - extended version, Cryptography and Communications, 7 (2015), 91-119.  doi: 10.1007/s12095-014-0111-8.  Google Scholar

[4]

D. J. Bernstein, Differential Addition Chains, 2006. Available from: http://cr.yp.to/ecdh/diffchain-20060219.pdf. Google Scholar

[5]

D. J. Bernstein, P. Birkner, M. Joye, T. Lange and C. Peters, Twisted Edwards curves, in AFRICACRYPT 2008 (ed. S. Vaudenay), Springer, (2008), 389–405. doi: 10.1007/978-3-540-68164-9_26.  Google Scholar

[6]

D. J. Bernstein, C. Chuengsatiansup and T. Lange, Double-base Scalar Multiplication Revisited, Cryptology ePrint Archive, Report 2017/037, 2017. Available from: http://eprint.iacr.org/2017/037. Google Scholar

[7]

D. J. Bernstein and T. Lange, Explicit formulas database, Available from: http://www.hyperelliptic.org/EFD/. Google Scholar

[8]

D. J. Bernstein and T. Lange, Faster addition and doubling on elliptic curves, in ASIACRYPT 2007 (ed. K. Kurosawa), Springer, (2007), 29–50. doi: 10.1007/978-3-540-76900-2_3.  Google Scholar

[9]

O. Billet and M. Joye, The jacobi model of an elliptic curve and side-channel analysis, in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (eds. M. Fossorier, T. Hoeholdt and A. Poli), Springer, (2003), 34–42. doi: 10.1007/3-540-44828-4_5.  Google Scholar

[10] I. F. BlakeG. Seroussi and N. P. Smart, Advances in Elliptic Curve Cryptography, Cambridge University Press, Cambridge, 2005.   Google Scholar
[11]

J. W. BosC. CostelloP. Longa and M. Naehrig, Selecting elliptic curves for cryptography: An efficiency and security analysis, J. Cryptogr. Eng., 6 (2016), 259-286.  doi: 10.1007/s13389-015-0097-y.  Google Scholar

[12]

É. Brier and M. Joye, Weierstras elliptic curves and side-channel attacks, in PKC 2002 (eds. D. Naccache and P. Paillier), Springer, (2002), 335–345. Google Scholar

[13]

D. R. L. Brown, Multi-Dimensional Montgomery Ladders for Elliptic Curves, Cryptology ePrint Archive, Report 2006/220, 2006. Available from: http://eprint.iacr.org/2006/220. Google Scholar

[14]

C. Research, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0, 2010. Available from: http://www.secg.org/. Google Scholar

[15]

B. Chevallier-Mames, M. Ciet and M. Joye, Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity, Cryptology ePrint Archive, Report 2003/237, 2003. Available from: http://eprint.iacr.org/2003/237. Google Scholar

[16]

P. N. Chung, C. Costello and B. Smith, Fast, Uniform, and Compact Scalar Multiplication for Elliptic Curves and Genus 2 Jacobians with Applications to Signature Schemes, Cryptology ePrint Archive, Report 2015/983, 2015. Available from: http://eprint.iacr.org/2015/983.  Google Scholar

[17]

C. Clavier, B. Feix, G. Gagnerot, M. Roussellet and V. Verneuil, Horizontal correlation analysis on exponentiation, in ICISC 2010 (eds. M. Soriano, S. Qing and J. López), Springer, (2010), 46–61. Google Scholar

[18]

J. Coron, Resistance against differential power analysis for elliptic curve cryptosystems, in CHES 1999 (eds. Ç. K. Koç and C. Paar), Springer, (1999), 292–302. doi: 10.1007/3-540-48059-5_25.  Google Scholar

[19]

C. Costello and P. Longa, FourQ: Four-dimensional decompositions on a Q-curve over the mersenne prime, in ASIACRYPT 2015 (eds. T. Iwata and J. H. Cheon), Springer, (2015), 214–235. doi: 10.1007/978-3-662-48797-6_10.  Google Scholar

[20]

J. -C. Courrège, B. Feix and M. Roussellet, Simple power analysis on exponentiation revisited, in CARDIS 2010 (eds. D. Gollmann, J. -L. Lanet and J. Iguchi-Cartigny), Springer, (2010), 65–79. Google Scholar

[21]

J. -L. Danger, S. Guilley, P. Hoogvorst, C. Murdica and D. Naccache, Improving the big mac attack on elliptic curve cryptography, The New Codebreakers, Lecture Notes in Comput. Sci., 9100, Springer, Berlin, 2016,374–386. Available from: http://eprint.iacr.org/2015/819. doi: 10.1007/978-3-662-49301-4_23.  Google Scholar

[22]

C. Doche, T. Icart and D. R. Kohel, Efficient scalar multiplication by isogeny decompositions, in PKC 2006 (eds. M. Yung, Y. Dodis, A. Kiayias and T. Malkin), Springer, (2006), 191–206. doi: 10.1007/11745853_13.  Google Scholar

[23]

E. Brainpool, ECC Brainpool Standard Curves and Curve Generation, 2005. Available from: http://www.ecc-brainpool.org/download/Domain-parameters.pdf. Google Scholar

[24]

J. Fan, X. Guo, E. D. Mulder, P. Schaumont, B. Preneel and I. Verbauwhede, State-of-the-art of secure ECC implementations: A survey on known side-channel attacks and countermeasures, in HOST 2010, (2010), 76–87. doi: 10.1109/HST.2010.5513110.  Google Scholar

[25]

B. Fay, Double-and-Add with Relative Jacobian Coordinates, Cryptology ePrint Archive, Report 2014/1014, 2014. Available from: http://eprint.iacr.org/2014/1014. Google Scholar

[26]

B. Feix, M. Roussellet and A. Venelli, Side-channel analysis on blinded regular scalar multiplications, in INDOCRYPT 2014 (eds. W. Meier and D. Mukhopadhyay), Springer, (2014), 3–20. doi: 10.1007/978-3-319-13039-2_1.  Google Scholar

[27]

W. Fischer, C. Giraud, E. W. Knudsen and J. -P. Seifert, Parallel Scalar Multiplication on General Elliptic Curves Over $\mathbb{F}_p$ Hedged Against Non-Differential Side-channel Attacks, Cryptology ePrint Archive, Report 2002/007, 2002. Available from: http://eprint.iacr.org/2002/007. Google Scholar

[28]

A. P. Fouque and F. Valette, The doubling attack - why upwards is better than downwards, in CHES 2003 (eds. C. D. Walter, Ç. K. Koç and C. Paar), Springer, (2003), 269–280. doi: 10.1007/978-3-540-45238-6_22.  Google Scholar

[29]

S. D. Galbraith, X. Lin and M. Scott, Endomorphisms for faster elliptic curve cryptography on a large class of curves, in EUROCRYPT 2009 (ed. A. Joux), Springer, (2009), 518–535. doi: 10.1007/978-3-642-01001-9_30.  Google Scholar

[30]

C. Giraud and V. Verneuil, Atomicity improvement for elliptic curve scalar multiplication, in CARDIS 2010 (eds. D. Gollmann, J. -L. Lanet and J. Iguchi-Cartigny), Springer, (2010), 80–101. doi: 10.1007/978-3-642-12510-2_7.  Google Scholar

[31]

R. R. Goundar, M. Joye and A. Miyaji, Co-$Z$ addition formulae and binary ladders on elliptic curves, in CHES 2010 (eds. S. Mangard and F. -X. Standaert), Springer, (2010), 65–79. doi: 10.1007/978-3-642-15031-9_5.  Google Scholar

[32]

R. R. Goundar, M. Joye and A. Miyaji, Co-$Z$ Addition Formulae and Binary Ladders on Elliptic Curves, Cryptology ePrint Archive, Report 2010/309, 2010. Available from: http://eprint.iacr.org/2010/309. Google Scholar

[33]

R. R. GoundarM. JoyeA. MiyajiM. Rivain and A. Venelli, Scalar multiplication on weierstrass elliptic curves from co-Z arithmetic, J. Cryptogr. Eng., 1 (2011), 161-176.  doi: 10.1007/s13389-011-0012-0.  Google Scholar

[34]

B. Halak, S. S. Waizi and A. Islam, A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems, Cryptology ePrint Archive, Report 2016/712, 2016. Available from: http://eprint.iacr.org/2016/712. Google Scholar

[35]

M. Hamburg, Speeding up elliptic curve scalar multiplication without either precomputation or adaptive coordinates, in Rump Session of CHES 2017, Available from: https://ches.2017.rump.cr.yp.to/. Google Scholar

[36]

M. Hamburg, Decaf: Eliminating cofactors through point compression, in CRYPTO 2015 (eds. R. Gennaro and M. Robshaw), Springer, (2015), 705–723. doi: 10.1007/978-3-662-47989-6_34.  Google Scholar

[37]

D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, Heidelberg, 2004.  Google Scholar

[38]

N. Hanley, H. S. Kim and M. Tunstall, Exploiting collisions in addition chain-based exponentiation algorithms using a single trace, Topics in Cryptology–CT–RSA 2015, 431–448, Lecture Notes in Comput. Sci., 9048, Springer, Cham, 2015. doi: 10.1007/978-3-319-16715-2_23.  Google Scholar

[39]

J. Heyszl, S. Mangard, B. Heinz, F. Stumpf and G. Sigl, Localized electromagnetic analysis of cryptographic implementations, in CT-RSA 2012 (ed. O. Dunkelman), Springer, 7178 (2012), 231–244. doi: 10.1007/978-3-642-27954-6_15.  Google Scholar

[40]

H. Hişil, Elliptic Curves, Group Law and Efficient Computation, Ph.D thesis, Queensland University of Technology, 2010. Google Scholar

[41]

H. Hişil, K. K. -H. Wong, G. Carter and E. Dawson, Twisted Edwards curves revisited, in ASIACRYPT 2008 (ed. J. Pieprzyk), Springer, 5350 (2008), 326–343. doi: 10.1007/978-3-540-89255-7_20.  Google Scholar

[42]

N. Homma, A. Miyamoto, T. Aoki, A. Satoh and A. Shamir, Collision-based power analysis of modular exponentiation using chosen-message pairs, in CHES 2008 (eds. E. Oswald and P. Rohatgi), Springer, (2008), 15–29. doi: 10.1007/978-3-540-85053-3_2.  Google Scholar

[43]

M. Hutter, M. Joye and Y. Sierra, Memory-constrained implementations of elliptic curve cryptography in co-$Z$ coordinate representation, in AFRICACRYPT 2011 (eds. A. Nitaj and D. Pointcheval), Springer, 6737 (2011), 170–187. doi: 10.1007/978-3-642-21969-6_11.  Google Scholar

[44]

T. Izu, B. Möller and T. Takagi, Improved elliptic curve multiplication methods resistant against side channel attacks, in INDOCRYPT 2002 (eds. A. Menezes and P. Sarkar), Springer, (2002), 296–313. doi: 10.1007/3-540-36231-2_24.  Google Scholar

[45]

T. Izu and T. Takagi, A fast parallel elliptic curve multiplication resistant against side channel attacks, in PKC 2002 (eds. D. Naccache and P. Paillier), Springer, (2002), 280–296. Google Scholar

[46]

K. Järvinen, A. Miele, R. Azarderakhsh and P. Longa, Four$\mathbb{Q}$ on FPGA: New hardware speed records for elliptic curve cryptography over large prime characteristic fields, in CHES 2016 (eds. B. Gierlichs and A. Y. Poschmann), Springer, (2016), 517–538. Google Scholar

[47]

M. Joye, Highly regular right-to-left algorithms for scalar multiplication, in CHES 2007 (eds. P. Paillier and I. Verbauwhede), Springer, (2007), 135–147. doi: 10.1007/978-3-540-74735-2_10.  Google Scholar

[48]

M. Joye and M. Tunstall, Exponent recoding and regular exponentiation algorithms, in AFRICACRYPT 2009 (ed. B. Preneel), Springer, (2009), 334–349. doi: 10.1007/978-3-642-02384-2_21.  Google Scholar

[49]

M. Joye and S. -M. Yen, The Montgomery powering ladder, in CHES 2002 (eds. B. S. Kaliski Jr., Ç. K. Koç and C. Paar), Springer, (2003), 291–302. doi: 10.1007/3-540-36400-5_22.  Google Scholar

[50]

K. H. Kim, J. Choe, S. Y. Kim, N. Kim and S. Hong, Speeding up Elliptic Curve Scalar Multiplication without Precomputation, Cryptology ePrint Archive, Report 2017/669, 2017. Available from: http://eprint.iacr.org/2017/669. Google Scholar

[51]

K. H. Kim and S. I. Kim, A New Method for Speeding up Arithmetic on Elliptic Curves Over Binary Fields, Cryptology ePrint Archive, Report 2007/181, 2007. Available from: http://eprint.iacr.org/2007/181. Google Scholar

[52]

K. H. Kim, S. I. Kim and J. S. Choe, New Fast Algorithms for Arithmetic on Elliptic Curves over Finite Fields of Characteristic Three, Cryptology ePrint Archive, Report 2007/179, 2007. Available from: http://eprint.iacr.org/2007/179. Google Scholar

[53]

K. H. Kim, C. O. Lee and C. Negre, Binary edwards curves revisited, in INDOCRYPT 2014 (eds. W. Meier and D. Mukhopadhyay), Springer, (2015), 393–408. doi: 10.1007/978-3-319-13039-2_23.  Google Scholar

[54]

P. C. Kocher, Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems, in CRYPTO 1996 (ed. N. Koblitz), Springer, (1996), 104–113. doi: 10.1007/3-540-68697-5_9.  Google Scholar

[55]

M. Lochter, J. Merkle, J. -M. Schmidt and T. Schütze, Requirements for Standard Elliptic Curves, Cryptology ePrint Archive, Report 2014/832, 2014. Available from: http://eprint.iacr.org/2014/832. Google Scholar

[56]

P. Longa, Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields, Master's thesis, School of Information Technology and Engineering, University of Ottawa, 2007. Google Scholar

[57]

P. Longa and A. Miri, Fast and flexible elliptic curve point arithmetic over prime fields, IEEE Trans. Comput., 57 (2008), 289-305.  doi: 10.1109/TC.2007.70815.  Google Scholar

[58]

J. López and R. Dahab, Fast multiplication on elliptic curves over $GF(2^m)$ without precomputation, in CHES 1999 (eds. Ç. K. Koç and C. Paar), Springer, (1999), 316–327. Google Scholar

[59]

P. M. C. Massolino, J. Renes and L. Batina, Implementing Complete Formulas on Weierstrass Curves in Hardware, Cryptology ePrint Archive, Report 2016/1133, 2016. Available from: http://eprint.iacr.org/2016/1133. Google Scholar

[60]

N. Meloni, Fast and Secure Elliptic Curve Scalar Multiplication over Prime Fields Using Special Addition Chains, Cryptology ePrint Archive, Report 2006/216, 2006. Available from: http://eprint.iacr.org/2006/216. Google Scholar

[61]

N. Meloni, New point addition formulae for ECC applications, in WAIFI 2007 (eds. C. Carlet and B. Sunar), Springer, (2007), 189–201. doi: 10.1007/978-3-540-73074-3_15.  Google Scholar

[62]

P. L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, Math. Comp., 48 (1987), 243-264.  doi: 10.1090/S0025-5718-1987-0866113-7.  Google Scholar

[63]

B. Möller, Securing elliptic curve point multiplication against side-channel attacks, in ISC 2001 (eds. G. I. Davida and Y. Frankel), Springer, (2001), 324–334. Google Scholar

[64]

E. Nascimento, Ł. Chmielewski, D. Oswald and P. Schwabe, Attacking embedded ECC implementations through cmov side channels, Selected Areas in Cryptography–SAC 2016, 99–119, Lecture Notes in Comput. Sci., 10532, Springer, Cham, 2017. Available from: http://eprint.iacr.org/2016/923. doi: 10.1007/978-3-319-69453-5_6.  Google Scholar

[65]

K. Okeya and K. Sakurai, Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using montgomery trick, in CHES 2002 (eds. B. S. Kaliski Jr., Ç. K. Koç and P. Paar), Springer, (2003), 564–578. doi: 10.1007/3-540-36400-5_41.  Google Scholar

[66]

K. Okeya and T. Takagi, The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks, in CT-RSA 2003 (ed. M. Joye), Springer, 2612 (2003), 328–342. doi: 10.1007/3-540-36563-X_23.  Google Scholar

[67]

B. -Y. Peng, Y. -C. Hsu, D. -C. Chueh, C. -M. Cheng and B. -Y. Yang, Multi-core FPGA Implementation of ECC With Homogeneous Co-Z Coordinate Representation, Cryptology ePrint Archive, Report 2016/909, 2016. Available from: http://eprint.iacr.org/2016/909. Google Scholar

[68]

S. R. S. Rao, Three dimensional montgomery ladder, differential point tripling on montgomery curves and point quintupling on weierstrass and edwards curves, in AFRICACRYPT 2016 (eds. D. Pointcheval, A. Nitaj and T. Rachidi), Springer, (2016), 84–106. doi: 10.1007/978-3-319-31517-1_5.  Google Scholar

[69]

J. Renes, C. Costello and L. Batina, Complete addition formulas for prime order elliptic curves, in EUROCRYPT 2016 (eds. M. Fischlin and J. -S. Coron), Springer, 9665 (2016), 403–428. doi: 10.1007/978-3-662-49890-3_16.  Google Scholar

[70]

M. Rivain, Fast and Regular Algorithms for Scalar Multiplication Over Elliptic Curves, Cryptology ePrint Archive, Report 2011/338, 2011. Available from: http://eprint.iacr.org/2011/338. Google Scholar

[71]

F. Rondepierre, Revisiting atomic patterns for scalar multiplications on elliptic curves, in CARDIS 2013 (eds. A. Francillon and P. Rohatgi), Springer, (2014), 171–186. Google Scholar

[72]

F. Rondepierre, Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves, Cryptology ePrint Archive, Report 2015/408, 2015. Available from: http://eprint.iacr.org/2015/408. Google Scholar

[73]

A. Venelli and F. Dassance, Faster side-channel resistant elliptic curve scalar multiplication, in Arithmetic, Geometry, Cryptography and Coding Theory 2009 (eds. D. Kohel and R. Rolland), American Mathematical Society, 521 (2010), 29–40. doi: 10.1090/conm/521/10271.  Google Scholar

show all references

References:
[1]

T. Akishita and T. Takagi, Zero-value point attacks on elliptic curve cryptosystem, in ISC 2003 (eds. C. Boyd and W. Mao), Springer, (2003), 218–233. doi: 10.1007/10958513_17.  Google Scholar

[2]

J. C. Bajard, S. Duquesne and M. Ercegovac, Combining leak-resistant arithmetic for elliptic curves defined over $\mathbb{F}_p$ and RNS representation, Cryptology ePrint Archive, Report 2010/311, 2010. Available from: http://eprint.iacr.org/2010/311. Google Scholar

[3]

A. BauerE. JaulmesE. ProuffJ. R. Reinhard and J. Wild, Horizontal collision correlation attack on elliptic curves - extended version, Cryptography and Communications, 7 (2015), 91-119.  doi: 10.1007/s12095-014-0111-8.  Google Scholar

[4]

D. J. Bernstein, Differential Addition Chains, 2006. Available from: http://cr.yp.to/ecdh/diffchain-20060219.pdf. Google Scholar

[5]

D. J. Bernstein, P. Birkner, M. Joye, T. Lange and C. Peters, Twisted Edwards curves, in AFRICACRYPT 2008 (ed. S. Vaudenay), Springer, (2008), 389–405. doi: 10.1007/978-3-540-68164-9_26.  Google Scholar

[6]

D. J. Bernstein, C. Chuengsatiansup and T. Lange, Double-base Scalar Multiplication Revisited, Cryptology ePrint Archive, Report 2017/037, 2017. Available from: http://eprint.iacr.org/2017/037. Google Scholar

[7]

D. J. Bernstein and T. Lange, Explicit formulas database, Available from: http://www.hyperelliptic.org/EFD/. Google Scholar

[8]

D. J. Bernstein and T. Lange, Faster addition and doubling on elliptic curves, in ASIACRYPT 2007 (ed. K. Kurosawa), Springer, (2007), 29–50. doi: 10.1007/978-3-540-76900-2_3.  Google Scholar

[9]

O. Billet and M. Joye, The jacobi model of an elliptic curve and side-channel analysis, in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (eds. M. Fossorier, T. Hoeholdt and A. Poli), Springer, (2003), 34–42. doi: 10.1007/3-540-44828-4_5.  Google Scholar

[10] I. F. BlakeG. Seroussi and N. P. Smart, Advances in Elliptic Curve Cryptography, Cambridge University Press, Cambridge, 2005.   Google Scholar
[11]

J. W. BosC. CostelloP. Longa and M. Naehrig, Selecting elliptic curves for cryptography: An efficiency and security analysis, J. Cryptogr. Eng., 6 (2016), 259-286.  doi: 10.1007/s13389-015-0097-y.  Google Scholar

[12]

É. Brier and M. Joye, Weierstras elliptic curves and side-channel attacks, in PKC 2002 (eds. D. Naccache and P. Paillier), Springer, (2002), 335–345. Google Scholar

[13]

D. R. L. Brown, Multi-Dimensional Montgomery Ladders for Elliptic Curves, Cryptology ePrint Archive, Report 2006/220, 2006. Available from: http://eprint.iacr.org/2006/220. Google Scholar

[14]

C. Research, Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0, 2010. Available from: http://www.secg.org/. Google Scholar

[15]

B. Chevallier-Mames, M. Ciet and M. Joye, Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity, Cryptology ePrint Archive, Report 2003/237, 2003. Available from: http://eprint.iacr.org/2003/237. Google Scholar

[16]

P. N. Chung, C. Costello and B. Smith, Fast, Uniform, and Compact Scalar Multiplication for Elliptic Curves and Genus 2 Jacobians with Applications to Signature Schemes, Cryptology ePrint Archive, Report 2015/983, 2015. Available from: http://eprint.iacr.org/2015/983.  Google Scholar

[17]

C. Clavier, B. Feix, G. Gagnerot, M. Roussellet and V. Verneuil, Horizontal correlation analysis on exponentiation, in ICISC 2010 (eds. M. Soriano, S. Qing and J. López), Springer, (2010), 46–61. Google Scholar

[18]

J. Coron, Resistance against differential power analysis for elliptic curve cryptosystems, in CHES 1999 (eds. Ç. K. Koç and C. Paar), Springer, (1999), 292–302. doi: 10.1007/3-540-48059-5_25.  Google Scholar

[19]

C. Costello and P. Longa, FourQ: Four-dimensional decompositions on a Q-curve over the mersenne prime, in ASIACRYPT 2015 (eds. T. Iwata and J. H. Cheon), Springer, (2015), 214–235. doi: 10.1007/978-3-662-48797-6_10.  Google Scholar

[20]

J. -C. Courrège, B. Feix and M. Roussellet, Simple power analysis on exponentiation revisited, in CARDIS 2010 (eds. D. Gollmann, J. -L. Lanet and J. Iguchi-Cartigny), Springer, (2010), 65–79. Google Scholar

[21]

J. -L. Danger, S. Guilley, P. Hoogvorst, C. Murdica and D. Naccache, Improving the big mac attack on elliptic curve cryptography, The New Codebreakers, Lecture Notes in Comput. Sci., 9100, Springer, Berlin, 2016,374–386. Available from: http://eprint.iacr.org/2015/819. doi: 10.1007/978-3-662-49301-4_23.  Google Scholar

[22]

C. Doche, T. Icart and D. R. Kohel, Efficient scalar multiplication by isogeny decompositions, in PKC 2006 (eds. M. Yung, Y. Dodis, A. Kiayias and T. Malkin), Springer, (2006), 191–206. doi: 10.1007/11745853_13.  Google Scholar

[23]

E. Brainpool, ECC Brainpool Standard Curves and Curve Generation, 2005. Available from: http://www.ecc-brainpool.org/download/Domain-parameters.pdf. Google Scholar

[24]

J. Fan, X. Guo, E. D. Mulder, P. Schaumont, B. Preneel and I. Verbauwhede, State-of-the-art of secure ECC implementations: A survey on known side-channel attacks and countermeasures, in HOST 2010, (2010), 76–87. doi: 10.1109/HST.2010.5513110.  Google Scholar

[25]

B. Fay, Double-and-Add with Relative Jacobian Coordinates, Cryptology ePrint Archive, Report 2014/1014, 2014. Available from: http://eprint.iacr.org/2014/1014. Google Scholar

[26]

B. Feix, M. Roussellet and A. Venelli, Side-channel analysis on blinded regular scalar multiplications, in INDOCRYPT 2014 (eds. W. Meier and D. Mukhopadhyay), Springer, (2014), 3–20. doi: 10.1007/978-3-319-13039-2_1.  Google Scholar

[27]

W. Fischer, C. Giraud, E. W. Knudsen and J. -P. Seifert, Parallel Scalar Multiplication on General Elliptic Curves Over $\mathbb{F}_p$ Hedged Against Non-Differential Side-channel Attacks, Cryptology ePrint Archive, Report 2002/007, 2002. Available from: http://eprint.iacr.org/2002/007. Google Scholar

[28]

A. P. Fouque and F. Valette, The doubling attack - why upwards is better than downwards, in CHES 2003 (eds. C. D. Walter, Ç. K. Koç and C. Paar), Springer, (2003), 269–280. doi: 10.1007/978-3-540-45238-6_22.  Google Scholar

[29]

S. D. Galbraith, X. Lin and M. Scott, Endomorphisms for faster elliptic curve cryptography on a large class of curves, in EUROCRYPT 2009 (ed. A. Joux), Springer, (2009), 518–535. doi: 10.1007/978-3-642-01001-9_30.  Google Scholar

[30]

C. Giraud and V. Verneuil, Atomicity improvement for elliptic curve scalar multiplication, in CARDIS 2010 (eds. D. Gollmann, J. -L. Lanet and J. Iguchi-Cartigny), Springer, (2010), 80–101. doi: 10.1007/978-3-642-12510-2_7.  Google Scholar

[31]

R. R. Goundar, M. Joye and A. Miyaji, Co-$Z$ addition formulae and binary ladders on elliptic curves, in CHES 2010 (eds. S. Mangard and F. -X. Standaert), Springer, (2010), 65–79. doi: 10.1007/978-3-642-15031-9_5.  Google Scholar

[32]

R. R. Goundar, M. Joye and A. Miyaji, Co-$Z$ Addition Formulae and Binary Ladders on Elliptic Curves, Cryptology ePrint Archive, Report 2010/309, 2010. Available from: http://eprint.iacr.org/2010/309. Google Scholar

[33]

R. R. GoundarM. JoyeA. MiyajiM. Rivain and A. Venelli, Scalar multiplication on weierstrass elliptic curves from co-Z arithmetic, J. Cryptogr. Eng., 1 (2011), 161-176.  doi: 10.1007/s13389-011-0012-0.  Google Scholar

[34]

B. Halak, S. S. Waizi and A. Islam, A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems, Cryptology ePrint Archive, Report 2016/712, 2016. Available from: http://eprint.iacr.org/2016/712. Google Scholar

[35]

M. Hamburg, Speeding up elliptic curve scalar multiplication without either precomputation or adaptive coordinates, in Rump Session of CHES 2017, Available from: https://ches.2017.rump.cr.yp.to/. Google Scholar

[36]

M. Hamburg, Decaf: Eliminating cofactors through point compression, in CRYPTO 2015 (eds. R. Gennaro and M. Robshaw), Springer, (2015), 705–723. doi: 10.1007/978-3-662-47989-6_34.  Google Scholar

[37]

D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, Heidelberg, 2004.  Google Scholar

[38]

N. Hanley, H. S. Kim and M. Tunstall, Exploiting collisions in addition chain-based exponentiation algorithms using a single trace, Topics in Cryptology–CT–RSA 2015, 431–448, Lecture Notes in Comput. Sci., 9048, Springer, Cham, 2015. doi: 10.1007/978-3-319-16715-2_23.  Google Scholar

[39]

J. Heyszl, S. Mangard, B. Heinz, F. Stumpf and G. Sigl, Localized electromagnetic analysis of cryptographic implementations, in CT-RSA 2012 (ed. O. Dunkelman), Springer, 7178 (2012), 231–244. doi: 10.1007/978-3-642-27954-6_15.  Google Scholar

[40]

H. Hişil, Elliptic Curves, Group Law and Efficient Computation, Ph.D thesis, Queensland University of Technology, 2010. Google Scholar

[41]

H. Hişil, K. K. -H. Wong, G. Carter and E. Dawson, Twisted Edwards curves revisited, in ASIACRYPT 2008 (ed. J. Pieprzyk), Springer, 5350 (2008), 326–343. doi: 10.1007/978-3-540-89255-7_20.  Google Scholar

[42]

N. Homma, A. Miyamoto, T. Aoki, A. Satoh and A. Shamir, Collision-based power analysis of modular exponentiation using chosen-message pairs, in CHES 2008 (eds. E. Oswald and P. Rohatgi), Springer, (2008), 15–29. doi: 10.1007/978-3-540-85053-3_2.  Google Scholar

[43]

M. Hutter, M. Joye and Y. Sierra, Memory-constrained implementations of elliptic curve cryptography in co-$Z$ coordinate representation, in AFRICACRYPT 2011 (eds. A. Nitaj and D. Pointcheval), Springer, 6737 (2011), 170–187. doi: 10.1007/978-3-642-21969-6_11.  Google Scholar

[44]

T. Izu, B. Möller and T. Takagi, Improved elliptic curve multiplication methods resistant against side channel attacks, in INDOCRYPT 2002 (eds. A. Menezes and P. Sarkar), Springer, (2002), 296–313. doi: 10.1007/3-540-36231-2_24.  Google Scholar

[45]

T. Izu and T. Takagi, A fast parallel elliptic curve multiplication resistant against side channel attacks, in PKC 2002 (eds. D. Naccache and P. Paillier), Springer, (2002), 280–296. Google Scholar

[46]

K. Järvinen, A. Miele, R. Azarderakhsh and P. Longa, Four$\mathbb{Q}$ on FPGA: New hardware speed records for elliptic curve cryptography over large prime characteristic fields, in CHES 2016 (eds. B. Gierlichs and A. Y. Poschmann), Springer, (2016), 517–538. Google Scholar

[47]

M. Joye, Highly regular right-to-left algorithms for scalar multiplication, in CHES 2007 (eds. P. Paillier and I. Verbauwhede), Springer, (2007), 135–147. doi: 10.1007/978-3-540-74735-2_10.  Google Scholar

[48]

M. Joye and M. Tunstall, Exponent recoding and regular exponentiation algorithms, in AFRICACRYPT 2009 (ed. B. Preneel), Springer, (2009), 334–349. doi: 10.1007/978-3-642-02384-2_21.  Google Scholar

[49]

M. Joye and S. -M. Yen, The Montgomery powering ladder, in CHES 2002 (eds. B. S. Kaliski Jr., Ç. K. Koç and C. Paar), Springer, (2003), 291–302. doi: 10.1007/3-540-36400-5_22.  Google Scholar

[50]

K. H. Kim, J. Choe, S. Y. Kim, N. Kim and S. Hong, Speeding up Elliptic Curve Scalar Multiplication without Precomputation, Cryptology ePrint Archive, Report 2017/669, 2017. Available from: http://eprint.iacr.org/2017/669. Google Scholar

[51]

K. H. Kim and S. I. Kim, A New Method for Speeding up Arithmetic on Elliptic Curves Over Binary Fields, Cryptology ePrint Archive, Report 2007/181, 2007. Available from: http://eprint.iacr.org/2007/181. Google Scholar

[52]

K. H. Kim, S. I. Kim and J. S. Choe, New Fast Algorithms for Arithmetic on Elliptic Curves over Finite Fields of Characteristic Three, Cryptology ePrint Archive, Report 2007/179, 2007. Available from: http://eprint.iacr.org/2007/179. Google Scholar

[53]

K. H. Kim, C. O. Lee and C. Negre, Binary edwards curves revisited, in INDOCRYPT 2014 (eds. W. Meier and D. Mukhopadhyay), Springer, (2015), 393–408. doi: 10.1007/978-3-319-13039-2_23.  Google Scholar

[54]

P. C. Kocher, Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems, in CRYPTO 1996 (ed. N. Koblitz), Springer, (1996), 104–113. doi: 10.1007/3-540-68697-5_9.  Google Scholar

[55]

M. Lochter, J. Merkle, J. -M. Schmidt and T. Schütze, Requirements for Standard Elliptic Curves, Cryptology ePrint Archive, Report 2014/832, 2014. Available from: http://eprint.iacr.org/2014/832. Google Scholar

[56]

P. Longa, Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields, Master's thesis, School of Information Technology and Engineering, University of Ottawa, 2007. Google Scholar

[57]

P. Longa and A. Miri, Fast and flexible elliptic curve point arithmetic over prime fields, IEEE Trans. Comput., 57 (2008), 289-305.  doi: 10.1109/TC.2007.70815.  Google Scholar

[58]

J. López and R. Dahab, Fast multiplication on elliptic curves over $GF(2^m)$ without precomputation, in CHES 1999 (eds. Ç. K. Koç and C. Paar), Springer, (1999), 316–327. Google Scholar

[59]

P. M. C. Massolino, J. Renes and L. Batina, Implementing Complete Formulas on Weierstrass Curves in Hardware, Cryptology ePrint Archive, Report 2016/1133, 2016. Available from: http://eprint.iacr.org/2016/1133. Google Scholar

[60]

N. Meloni, Fast and Secure Elliptic Curve Scalar Multiplication over Prime Fields Using Special Addition Chains, Cryptology ePrint Archive, Report 2006/216, 2006. Available from: http://eprint.iacr.org/2006/216. Google Scholar

[61]

N. Meloni, New point addition formulae for ECC applications, in WAIFI 2007 (eds. C. Carlet and B. Sunar), Springer, (2007), 189–201. doi: 10.1007/978-3-540-73074-3_15.  Google Scholar

[62]

P. L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, Math. Comp., 48 (1987), 243-264.  doi: 10.1090/S0025-5718-1987-0866113-7.  Google Scholar

[63]

B. Möller, Securing elliptic curve point multiplication against side-channel attacks, in ISC 2001 (eds. G. I. Davida and Y. Frankel), Springer, (2001), 324–334. Google Scholar

[64]

E. Nascimento, Ł. Chmielewski, D. Oswald and P. Schwabe, Attacking embedded ECC implementations through cmov side channels, Selected Areas in Cryptography–SAC 2016, 99–119, Lecture Notes in Comput. Sci., 10532, Springer, Cham, 2017. Available from: http://eprint.iacr.org/2016/923. doi: 10.1007/978-3-319-69453-5_6.  Google Scholar

[65]

K. Okeya and K. Sakurai, Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using montgomery trick, in CHES 2002 (eds. B. S. Kaliski Jr., Ç. K. Koç and P. Paar), Springer, (2003), 564–578. doi: 10.1007/3-540-36400-5_41.  Google Scholar

[66]

K. Okeya and T. Takagi, The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks, in CT-RSA 2003 (ed. M. Joye), Springer, 2612 (2003), 328–342. doi: 10.1007/3-540-36563-X_23.  Google Scholar

[67]

B. -Y. Peng, Y. -C. Hsu, D. -C. Chueh, C. -M. Cheng and B. -Y. Yang, Multi-core FPGA Implementation of ECC With Homogeneous Co-Z Coordinate Representation, Cryptology ePrint Archive, Report 2016/909, 2016. Available from: http://eprint.iacr.org/2016/909. Google Scholar

[68]

S. R. S. Rao, Three dimensional montgomery ladder, differential point tripling on montgomery curves and point quintupling on weierstrass and edwards curves, in AFRICACRYPT 2016 (eds. D. Pointcheval, A. Nitaj and T. Rachidi), Springer, (2016), 84–106. doi: 10.1007/978-3-319-31517-1_5.  Google Scholar

[69]

J. Renes, C. Costello and L. Batina, Complete addition formulas for prime order elliptic curves, in EUROCRYPT 2016 (eds. M. Fischlin and J. -S. Coron), Springer, 9665 (2016), 403–428. doi: 10.1007/978-3-662-49890-3_16.  Google Scholar

[70]

M. Rivain, Fast and Regular Algorithms for Scalar Multiplication Over Elliptic Curves, Cryptology ePrint Archive, Report 2011/338, 2011. Available from: http://eprint.iacr.org/2011/338. Google Scholar

[71]

F. Rondepierre, Revisiting atomic patterns for scalar multiplications on elliptic curves, in CARDIS 2013 (eds. A. Francillon and P. Rohatgi), Springer, (2014), 171–186. Google Scholar

[72]

F. Rondepierre, Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves, Cryptology ePrint Archive, Report 2015/408, 2015. Available from: http://eprint.iacr.org/2015/408. Google Scholar

[73]

A. Venelli and F. Dassance, Faster side-channel resistant elliptic curve scalar multiplication, in Arithmetic, Geometry, Cryptography and Coding Theory 2009 (eds. D. Kohel and R. Rolland), American Mathematical Society, 521 (2010), 29–40. doi: 10.1090/conm/521/10271.  Google Scholar

Table 1.  Comparison of costs per bit and memory usages between regular scalar multiplication algorithms for short Weierstrass curves. Algorithms specific to a special curve family are marked by (*). $ E $ is the cost of a secured on-the-fly NAF scalar recoding. $ E' $ equals $ E $ plus the precomputation cost per scalar bit. A field negation is assumed to cost $ 0.5A $
Algorithm Cost per scalar bit #field regs.
Classic
Double-addition-always [18,70] $ 11M+9S+M_\mathfrak{a}+18A $ 12
Window algorithm based on Joye-Tunstall recoding
Rivain [70] $ \frac{(4M+4S+11A)\omega+12M+4S+8A}{\omega}+E' $ $ 3\cdot2^{\omega-1}+5 $
Rivain* [70] $ \frac{(4M+4S+12A)\omega+12M+4S+8A}{\omega}+E' $ $ 3\cdot2^{\omega-1}+4 $
Bos et al.* [11] $ \frac{(4M+4S+8A)\omega+12M+1S+5A}{\omega}+E' $ $ 5\cdot2^{\omega-1}+8 $
Indistinguishable formulae
Unified formulae [12] $ 16M+\frac{20}{3}S+\frac{4}{3}M_\mathfrak{a}+\frac{40}{3}A+\frac{4}{3}E $ N/A
Complete formulae* [69,59] $ 16M+4M_\mathfrak{a}+\frac{8}{3}M_\mathfrak{b}+36A+\frac{4}{3}E $ N/A
Atomicity
Chevallier et al. [15] $ \frac{41}{3}M+\frac{205}{6}A+\frac{41}{3}E $ 10
Longa* [56] $ 6M+6S+24A+6E $ 12
Giraud-Verneuil [30] $ 7M+7S+28A+7E $ 11
Giraud-Verneuil* [30] $ 10M+\frac{10}{3}S+\frac{50}{3}A+\frac{5}{3}E $ 11
Rondepierre [72] $ \frac{32}{3}M+4S+12A+\frac{4}{3}E $ 11
Rondepierre* [72,71] $ \frac{32}{3}M+\frac{8}{3}S+\frac{40}{3}A+\frac{4}{3}E $ 11
Montgomery ladder and Joye's double-add
Brier-Joye [12] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+15A $ N/A
Izu-Takagi [45] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+15A $ 18
Fischer et al. [27] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+14A $ 9
Izu et al. [44] $ 10M+4S+2M_\mathfrak{a}+1M_\mathfrak{b}+18A $ 8
Goundar et al. Alg.13 [32,31] $ 9M+7S+27A $ 9
Goundar et al. Alg.14 [32] $ 8M+7S+3M_\mathfrak{a}+1M_\mathfrak{b}+27A $ 8
Venelli-Dassance [73] $ 9M+5S+ $(N/A)$ A $ N/A
Hutter et al. Alg.5 [43] $ 9M+5S+1M_\mathfrak{a}+1M_\mathfrak{b}+16A $ 8
Hutter et al. Alg.6 [43] $ 10M+5S+13A $ 10
Goundar et al. [33] $ 9M+5S+19A $ 10
Rivain Alg.13+Alg.14 [70] $ 9M+5S+18A $ 8
Rivain suggestion [70] $ 8M+6S+26A $ 8
Fay [25] $ 13M+5S+14A $ 8
Chung et al. [16] $ 8M+7S+2M_\mathfrak{a}+3M_\mathfrak{b}+12A $ N/A
This work (Sec. 3.2) 8M+4S+15.5A 8
This work (Sec. 3.3) 8M+4S+12.5A 9
Hamburg [35] 8M+4S+9A 8
This work (Sec. 3.4) 6M+6S+20A 9
This work (Sec. 3.4) 6M+6S+18A 9
Binary NAF method vulnerable to SPA: for the purpose of comparison only
[37,44] $ \frac{20}{3}M+7S+\frac{40}{3}A+E $ 8
Algorithm Cost per scalar bit #field regs.
Classic
Double-addition-always [18,70] $ 11M+9S+M_\mathfrak{a}+18A $ 12
Window algorithm based on Joye-Tunstall recoding
Rivain [70] $ \frac{(4M+4S+11A)\omega+12M+4S+8A}{\omega}+E' $ $ 3\cdot2^{\omega-1}+5 $
Rivain* [70] $ \frac{(4M+4S+12A)\omega+12M+4S+8A}{\omega}+E' $ $ 3\cdot2^{\omega-1}+4 $
Bos et al.* [11] $ \frac{(4M+4S+8A)\omega+12M+1S+5A}{\omega}+E' $ $ 5\cdot2^{\omega-1}+8 $
Indistinguishable formulae
Unified formulae [12] $ 16M+\frac{20}{3}S+\frac{4}{3}M_\mathfrak{a}+\frac{40}{3}A+\frac{4}{3}E $ N/A
Complete formulae* [69,59] $ 16M+4M_\mathfrak{a}+\frac{8}{3}M_\mathfrak{b}+36A+\frac{4}{3}E $ N/A
Atomicity
Chevallier et al. [15] $ \frac{41}{3}M+\frac{205}{6}A+\frac{41}{3}E $ 10
Longa* [56] $ 6M+6S+24A+6E $ 12
Giraud-Verneuil [30] $ 7M+7S+28A+7E $ 11
Giraud-Verneuil* [30] $ 10M+\frac{10}{3}S+\frac{50}{3}A+\frac{5}{3}E $ 11
Rondepierre [72] $ \frac{32}{3}M+4S+12A+\frac{4}{3}E $ 11
Rondepierre* [72,71] $ \frac{32}{3}M+\frac{8}{3}S+\frac{40}{3}A+\frac{4}{3}E $ 11
Montgomery ladder and Joye's double-add
Brier-Joye [12] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+15A $ N/A
Izu-Takagi [45] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+15A $ 18
Fischer et al. [27] $ 10M+5S+2M_\mathfrak{a}+2M_\mathfrak{b}+14A $ 9
Izu et al. [44] $ 10M+4S+2M_\mathfrak{a}+1M_\mathfrak{b}+18A $ 8
Goundar et al. Alg.13 [32,31] $ 9M+7S+27A $ 9
Goundar et al. Alg.14 [32] $ 8M+7S+3M_\mathfrak{a}+1M_\mathfrak{b}+27A $ 8
Venelli-Dassance [73] $ 9M+5S+ $(N/A)$ A $ N/A
Hutter et al. Alg.5 [43] $ 9M+5S+1M_\mathfrak{a}+1M_\mathfrak{b}+16A $ 8
Hutter et al. Alg.6 [43] $ 10M+5S+13A $ 10
Goundar et al. [33] $ 9M+5S+19A $ 10
Rivain Alg.13+Alg.14 [70] $ 9M+5S+18A $ 8
Rivain suggestion [70] $ 8M+6S+26A $ 8
Fay [25] $ 13M+5S+14A $ 8
Chung et al. [16] $ 8M+7S+2M_\mathfrak{a}+3M_\mathfrak{b}+12A $ N/A
This work (Sec. 3.2) 8M+4S+15.5A 8
This work (Sec. 3.3) 8M+4S+12.5A 9
Hamburg [35] 8M+4S+9A 8
This work (Sec. 3.4) 6M+6S+20A 9
This work (Sec. 3.4) 6M+6S+18A 9
Binary NAF method vulnerable to SPA: for the purpose of comparison only
[37,44] $ \frac{20}{3}M+7S+\frac{40}{3}A+E $ 8
[1]

Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Etienne Marcatel. A practicable timing attack against HQC and its countermeasure. Advances in Mathematics of Communications, 2020  doi: 10.3934/amc.2020126

[2]

Yuxi Zheng. Absorption of characteristics by sonic curve of the two-dimensional Euler equations. Discrete & Continuous Dynamical Systems - A, 2009, 23 (1&2) : 605-616. doi: 10.3934/dcds.2009.23.605

[3]

Takiko Sasaki. Convergence of a blow-up curve for a semilinear wave equation. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 1133-1143. doi: 10.3934/dcdss.2020388

[4]

Ugo Bessi. Another point of view on Kusuoka's measure. Discrete & Continuous Dynamical Systems - A, 2020  doi: 10.3934/dcds.2020404

[5]

Xuefeng Zhang, Yingbo Zhang. Fault-tolerant control against actuator failures for uncertain singular fractional order systems. Numerical Algebra, Control & Optimization, 2021, 11 (1) : 1-12. doi: 10.3934/naco.2020011

[6]

Michiel Bertsch, Flavia Smarrazzo, Andrea Terracina, Alberto Tesei. Signed Radon measure-valued solutions of flux saturated scalar conservation laws. Discrete & Continuous Dynamical Systems - A, 2020, 40 (6) : 3143-3169. doi: 10.3934/dcds.2020041

[7]

Huanhuan Tian, Maoan Han. Limit cycle bifurcations of piecewise smooth near-Hamiltonian systems with a switching curve. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020368

[8]

Kengo Nakai, Yoshitaka Saiki. Machine-learning construction of a model for a macroscopic fluid variable using the delay-coordinate of a scalar observable. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 1079-1092. doi: 10.3934/dcdss.2020352

[9]

Christian Beck, Lukas Gonon, Martin Hutzenthaler, Arnulf Jentzen. On existence and uniqueness properties for solutions of stochastic fixed point equations. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020320

[10]

Gang Luo, Qingzhi Yang. The point-wise convergence of shifted symmetric higher order power method. Journal of Industrial & Management Optimization, 2021, 17 (1) : 357-368. doi: 10.3934/jimo.2019115

[11]

Sabira El Khalfaoui, Gábor P. Nagy. On the dimension of the subfield subcodes of 1-point Hermitian codes. Advances in Mathematics of Communications, 2021, 15 (2) : 219-226. doi: 10.3934/amc.2020054

[12]

Balázs Kósa, Karol Mikula, Markjoe Olunna Uba, Antonia Weberling, Neophytos Christodoulou, Magdalena Zernicka-Goetz. 3D image segmentation supported by a point cloud. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 971-985. doi: 10.3934/dcdss.2020351

[13]

Neil S. Trudinger, Xu-Jia Wang. Quasilinear elliptic equations with signed measure. Discrete & Continuous Dynamical Systems - A, 2009, 23 (1&2) : 477-494. doi: 10.3934/dcds.2009.23.477

[14]

Guoliang Zhang, Shaoqin Zheng, Tao Xiong. A conservative semi-Lagrangian finite difference WENO scheme based on exponential integrator for one-dimensional scalar nonlinear hyperbolic equations. Electronic Research Archive, 2021, 29 (1) : 1819-1839. doi: 10.3934/era.2020093

[15]

Hua Chen, Yawei Wei. Multiple solutions for nonlinear cone degenerate elliptic equations. Communications on Pure & Applied Analysis, , () : -. doi: 10.3934/cpaa.2020272

[16]

Lucio Damascelli, Filomena Pacella. Sectional symmetry of solutions of elliptic systems in cylindrical domains. Discrete & Continuous Dynamical Systems - A, 2020, 40 (6) : 3305-3325. doi: 10.3934/dcds.2020045

[17]

Ole Løseth Elvetun, Bjørn Fredrik Nielsen. A regularization operator for source identification for elliptic PDEs. Inverse Problems & Imaging, , () : -. doi: 10.3934/ipi.2021006

[18]

Pierre Baras. A generalization of a criterion for the existence of solutions to semilinear elliptic equations. Discrete & Continuous Dynamical Systems - S, 2021, 14 (2) : 465-504. doi: 10.3934/dcdss.2020439

[19]

Nahed Naceur, Nour Eddine Alaa, Moez Khenissi, Jean R. Roche. Theoretical and numerical analysis of a class of quasilinear elliptic equations. Discrete & Continuous Dynamical Systems - S, 2021, 14 (2) : 723-743. doi: 10.3934/dcdss.2020354

[20]

Zaizheng Li, Qidi Zhang. Sub-solutions and a point-wise Hopf's lemma for fractional $ p $-Laplacian. Communications on Pure & Applied Analysis, , () : -. doi: 10.3934/cpaa.2020293

2019 Impact Factor: 0.734

Metrics

  • PDF downloads (83)
  • HTML views (256)
  • Cited by (0)

[Back to Top]