A cryptography circuit provides secure processing of data by utilizing
countermeasures that combat timing and power attacks. Superfluous
operations such as multiplication operations, modular reductions by an
integer, storage of data to memory are available for use by a processor to
disguise the amount of power usage and the amount of time required to
perform a cryptographic operation. A cryptographic key is available for
use in order to trigger when these emulated operations occur. The
occurrences of the emulated operations is controlled by the user to
provide the preferred tradeoff between security and use of resources.