LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves
Abstract
We introduce LadderPrime, an exception-free scalar-point multiplication algorithm, which works on the Kummer line of an elliptic curve given by the equation B*y^2=x^3+A*x^2+ax+b. LadderPrime operates only on two coordinates and computes the correct output for all input points, all scalars, and all elliptic curves of characteristic > 2. This is achieved by an alternative set of differential-addition formulas which can handle not only generic points but also the problematic point (0 : Z) for Montgomery ladder. The main structure of LadderPrime is analogous to the scalar-point multiplication in Bernstein’s X25519 Diffie-Hellman key exchange (DH) specification. Unlike, X25519 which uses the non-prime order (h = 8) elliptic Curve25519, LadderPrime is able to work with prime order (h = 1) (and non-prime order) elliptic curves. When used with a prime order elliptic curve, LadderPrime does not need the initial raising of base point to a prime order subgroup. In other words, LadderPrime eliminates the need for masking lower bits of the scalar. LadderPrime also eliminates the need for Hamburg’s "Decaf" (CRYPTO 2015) and later refined "Ristretto" methods. Essential cryptographic protocols such as DH and qDSA can be instantiated over LadderPrime.
Keywords
References
- V. S. Miller, “Use of elliptic curves in cryptography,” in CRYPTO’85, ser. LNCS, vol. 218. Springer, 1986, pp. 417– 426.
- N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, January 1987. 61 INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE N. Pala et al., Vol.15, No.1, pp. 48-65
- H. Cohen, A. Miyaji, and T. Ono, “Efficient elliptic curve exponentiation using mixed coordinates,” in Advances in Cryptology — ASIACRYPT’98, K. Ohta and D. Pei, Eds. Berlin, Heidelberg: Springer 1998, pp. 51–65.
- A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, Inc., 1996.
- H. Cohen and G. Frey, Eds., Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, 2005.
- J.-S. Coron, “Resistance against differential power analysis for elliptic curve cryptosystems,” in CHES ’99, ser. LNCS, vol. 1717. Springer, 1999, pp. 292–302.
- P. C. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in CRYPTO ’99, ser. LNCS, vol. 1666. Springer, 1999, pp. 388–397.
- D. J. Bernstein and T. Lange, “Faster addition and doubling on elliptic curves,” in ASIACRYPT 2007, ser. LNCS, vol. 4833. Springer, 2007, pp. 29–50.
Details
Primary Language
English
Subjects
Information Security and Cryptology, Cryptography
Journal Section
Research Article
Publication Date
March 19, 2026
Submission Date
January 23, 2026
Acceptance Date
March 18, 2026
Published in Issue
Year 2026 Volume: 15 Number: 1
APA
Hışıl, H., & Pala, N. F. (2026). LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves. International Journal of Information Security Science, 15(1), 48-65. https://doi.org/10.55859/ijiss.1867564
AMA
1.Hışıl H, Pala NF. LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves. IJISS. 2026;15(1):48-65. doi:10.55859/ijiss.1867564
Chicago
Hışıl, Hüseyin, and Nuri Furkan Pala. 2026. “LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves”. International Journal of Information Security Science 15 (1): 48-65. https://doi.org/10.55859/ijiss.1867564.
EndNote
Hışıl H, Pala NF (March 1, 2026) LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves. International Journal of Information Security Science 15 1 48–65.
IEEE
[1]H. Hışıl and N. F. Pala, “LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves”, IJISS, vol. 15, no. 1, pp. 48–65, Mar. 2026, doi: 10.55859/ijiss.1867564.
ISNAD
Hışıl, Hüseyin - Pala, Nuri Furkan. “LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves”. International Journal of Information Security Science 15/1 (March 1, 2026): 48-65. https://doi.org/10.55859/ijiss.1867564.
JAMA
1.Hışıl H, Pala NF. LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves. IJISS. 2026;15:48–65.
MLA
Hışıl, Hüseyin, and Nuri Furkan Pala. “LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves”. International Journal of Information Security Science, vol. 15, no. 1, Mar. 2026, pp. 48-65, doi:10.55859/ijiss.1867564.
Vancouver
1.Hüseyin Hışıl, Nuri Furkan Pala. LadderPrime: Exception-Free, Twist-Insensitive, and Constant-Time Ladder for Prime-Order Elliptic Curves. IJISS. 2026 Mar. 1;15(1):48-65. doi:10.55859/ijiss.1867564