Guide to elliptic curve cryptography