Cryptographic techniques based on elliptic curves -- Part 1: General