“…Note that two different values of α are used here such that 16 equations, 15 superpoly equations are chosen such that γ = γ 1 (as there are |S (4,0,64) | − 1 = 15 different values of φ, excluding the instances where φ = γ 1 ), whereas only one superpoly is chosen where γ = γ 2 . As a result, this yields 2 3 .16 = 2 7 encryptions. Finally, following the same rule, the superpoly equation in Observation 4 requires |S (4,0,64) | = 16 different values of φ and two different values of φ such that 1 , 2 , ∈ S (4,0,64) .…”