“…Considering the fact that cryptography – by its very nature – is always ever-changing, the need for a flexible platform that can implement a wide range of cryptographic primitives, algorithms, and protocols was soon recognized. Since the late 90s, activities concerning the implementation of multiple security algorithms have centred around three main approaches: Customized General Purpose Processor (GPP) [6] , [7] , [8] , [9] , [10] , [11] , [12] , Crypto Co-processor [13] , [14] , [15] , [16] , and Crypto Processor [17] , [18] , [19] , [20] , [21] . While throughput was almost always the prime metric, other figures of merit were sought such as flexibility and security.…”