Elliptic curves in Network Security