A security professional needs to set up an encrypted database to store sensitive information. The requirements given to the professional were that the asymmetric encryption algorithm needs to use complex algebra and calculations on curves while using few resources. Which algorithm would best suit the professional's needs?

A) AES
B) 3DES
C) RC5
D) ECC