Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation