This approach makes use of ASICs (Application Specific Integrated Circuits) to implement a given cryptography algorithm in hardware. This policy allow controlling precisely the parameters but it is generally not optimum for the flexibility and cost parameters. In [7] a new logic style for secure IC against differential power analysis is presented.