How Hackers Can Exploit Weak ECDSA Signatures