ZHANG Lijun, WANG Kunpeng, WANG Hong. Unified and Complete Point Addition Formula for Elliptic Curves[J]. Chinese Journal of Electronics, 2012, 21(2): 345-349.
Citation: ZHANG Lijun, WANG Kunpeng, WANG Hong. Unified and Complete Point Addition Formula for Elliptic Curves[J]. Chinese Journal of Electronics, 2012, 21(2): 345-349.

Unified and Complete Point Addition Formula for Elliptic Curves

More Information
  • Received Date: December 31, 2010
  • Revised Date: June 30, 2011
  • Published Date: April 24, 2012
  • As is well known, the unified point addition formula is useful for resisting side channel attacks in elliptic curve cryptography. Furthermore, if the unified formula is complete, which means it is valid for any two points, then there are no exceptional cases to be described particularly. This feature is especially preferable for elegant codes of elliptic crypto-algorithms. Therefore, the unified and also complete point addition formula can provide the advantage for good security and convenient implementation. In this paper, we exploit sufficient and necessary condition for the existence of unified and complete point addition formula on several known elliptic curve models such asWeierstrass cubics, Jacobi quartics, Edwards curves, etc.. Moreover, we study another form of elliptic curves called Selmer curves. For practical application, we finally give some numerical examples of cryptographic secure Selmer curves.
  • Related Articles

    [1]JIAO Zhipeng, CHEN Hua, FENG Jingyi, KUANG Xiaoyun, YANG Yiwei, LI Haoyuan, FAN Limin. A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique[J]. Chinese Journal of Electronics, 2023, 32(2): 199-208. DOI: 10.23919/cje.2021.00.089
    [2]LIU Yipeng, GUO Jiansheng, CUI Jingyi. Non-malleable Extractor in the Presence of Classical or Quantum Side Information[J]. Chinese Journal of Electronics, 2019, 28(5): 938-943. DOI: 10.1049/cje.2019.06.004
    [3]YE Chendong, TIAN Tian. New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC[J]. Chinese Journal of Electronics, 2019, 28(4): 698-705. DOI: 10.1049/cje.2019.04.002
    [4]TANG Wenyi, JIA Song, WANG Yuan. Dual-Voltage Single-Rail Dynamic DPA-Resistant Logic Based on Charge Sharing Mechanism[J]. Chinese Journal of Electronics, 2017, 26(5): 899-904. DOI: 10.1049/cje.2017.03.003
    [5]FAN Guangjun, ZHOU Yongbin, ZHANG Hailong, FENG Dengguo. The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods[J]. Chinese Journal of Electronics, 2017, 26(2): 416-423. DOI: 10.1049/cje.2017.01.030
    [6]CAO Yuchen, ZHOU Yongbin, YU Zhenmei. On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis[J]. Chinese Journal of Electronics, 2014, 23(2): 366-370.
    [7]GUO Zheng, GU Dawu, YUAN Kan, LIU Junrong, HE Yuming. A Novel Method for Power Analysis Based on Combinational Logic in Block Cipher Circuit[J]. Chinese Journal of Electronics, 2014, 23(1): 151-156.
    [8]LIU Jiye, ZHOU Yongbin, YANG Shuguo, FENG Dengguo. Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation[J]. Chinese Journal of Electronics, 2012, 21(3): 547-553.
    [9]WU Keke, LI Huiyun, ZHU Dingju, YU Fengqi. Efficient Solution to Secure ECC Against Side-channel Attacks[J]. Chinese Journal of Electronics, 2011, 20(3): 471-475.
    [10]GU Haihua, GU Dawu. Extending the GHS Attack of Hyperelliptic Curves[J]. Chinese Journal of Electronics, 2009, 18(4): 741-743.

Catalog

    Article Metrics

    Article views (740) PDF downloads (1369) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return