“…In [10, Section 5.2.1] Hankerson, Menezes and Vanstone outline a hierarchy of operations in ECC as protocols, point multiplication, elliptic-curve addition and doubling, finite-field arithmetic. Fan, Sakiyama & Verbauwhede expand this in [7] to describe a 5-layer pyramid of 1. Integrity, confidentially, authentication, 2.…”