Implementing Elliptic Curve Cryptography