Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems