. Open-mobile-alliance, DRM Specification V2.0 Candidate Version 2, 2005.

M. Akkar and C. Giraud, An Implementation of DES and AES, Secure against Some Attacks, Proceedings of the Workshop on Cryptographic Hardware and Embedded Systmes, pp.309-318, 2001.
DOI : 10.1007/3-540-44709-1_26

J. Zambreno, A. Choudhary, R. Simha, and B. Narari, Flexible software protection using hardware/software codesign techniques, Proceedings Design, Automation and Test in Europe Conference and Exhibition, p.10636, 2004.
DOI : 10.1109/DATE.2004.1268916

J. Dhem and N. Feyt, Hardware and software symbiosis helps smart card evolution, IEEE Micro, vol.21, issue.6, pp.14-25, 2001.
DOI : 10.1109/40.977754

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.1073

J. P. Mcgregor and R. Lee, Architectural techniques for accelerating subword permutations with repetitions, IEEE Transactions on Very Large Scale Integration (VLSI) systems, pp.325-335, 2003.
DOI : 10.1109/TVLSI.2003.812318

J. Groszschaedl and G. Kamendje, Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2/sup m/), Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003, pp.455-468, 2003.
DOI : 10.1109/ASAP.2003.1212868

A. F. Tenca, C. ¸. , and K. Koç, A Scalable Architecture for Montgomery Multiplication, Proceedings of CHES'99, pp.94-108, 1999.

D. Folegnani and A. González, Energy Effective Issue Logic, Proceedings of 28 th Annual International Symposium on Computer Architecture 2001 (ISCA'2001), pp.230-239, 2001.
DOI : 10.1145/384285.379266

E. Brier, C. Clavier, and F. Olivier, Optimal Statistical Power Analysis, Cryptology ePrint Archive, issue.152, 2003.

. Mips-t-m, Architecture For Programmers Volume II: The MIPS32 T M Instruction Set, pp.94043-1353, 1225.

J. Dhem, Design of an efficient public-key cryptographic library for RISC-based smart-cards, 1998.

P. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

I. Blake, G. Seroussi, and N. Smart, of Lecture Note Series, Elliptic Curves in Cryptography, vol.265

C. Koç and T. Acar, Montgomery Multiplication in GF(2 m ), Designs, Codes and Cryptography, vol.14, issue.1, pp.57-69, 1998.
DOI : 10.1023/A:1008208521515

R. M. Russell, The CRAY-1 computer system, Communications of the ACM, vol.21, issue.1, pp.63-72, 1978.
DOI : 10.1145/359327.359336

J. L. Hennessy and D. A. Patterson, Computer Architecture: A Quantitative Approach, 2003.

T. A. Team, The Archc Architecture Description Language - Reference Manual, 2004.