Tracked Changes. Information security. Cryptographic techniques based on elliptic curves. Elliptic curve generation Part 5, (27th April 2022)