cryptographycryptographic protocolspublic key cryptographytelecommunication securityefficient elliptic curve Diffie-Hellman computation256-bit security levelefficient 64-bit assembly implementationsDiffie-Hellman key agreement protocolMontgomery curve224-bit security level64-bit implementation