Information security. Cryptographic techniques based on elliptic curves. Elliptic curve generation Part 5, (8th April 2022)