Fig. 2From: Verifiable delay functions and delay encryptions from hyperelliptic curvesDelay encryption from hyperelliptic curvesBack to article page