On the Attacks over the Elliptic Curve-Based Cryptosystems | IEEE Conference Publication | IEEE Xplore