1
See Menezes et.
al., “Handbook of Applied Cryptography”, p.
239–240, for details.