Introduction.- Analysis of Reconfigurability of Cryptographic Algorithms.- Hardware Architecture.- Compilation Techniques.- Case Studies in Design.- Countermeasures against Physical Attacks.- Perspective: Application Trends.
"synopsis" may belong to another edition of this title.