Fig. 1From: Verifiable delay functions and delay encryptions from hyperelliptic curvesVerifiable delay functions from hyperelliptic curvesBack to article page