Designing Efficient Dyadic Operations for Cryptographic Applications