Introduction.- Analysis of Reconfigurability of Cryptographic Algorithms.- Hardware Architecture.- Compilation Techniques.- Case Studies in Design.- Countermeasures against Physical Attacks.- Perspective: Application Trends.
"Sinopsis" puede pertenecer a otra edición de este libro.