Generation, Verification, And Attacks On Elliptic Curves And Their Applications In Signal Protocol