https://9lib.net/document/nzw2or0z-implementation-security-wallace-approach-using-elliptical-curve-cryptography.html