TL;DR: The two elliptic curves implementation can be found here.
We aim to construct an elliptic curve satisfying the following criteria:
Prime order.
Efficient group operations.
Deterministc and efficient hash-to-curve encoding.
Security level of 128 bits.
Extension Field Selection