Security Analysis of Isogeny-Based Cryptosystems