Publication

Elliptic and Hyperelliptic Curves: A Practical Security Analysis