Unveiling ECC Vulnerabilities: LSTM Networks for Operation Recognition in Side-Channel Attacks