How Does Elliptic Curve Cryptography Work