Where Security Began.- to Secure Embedded Systems.- The Key.- Using Keys.- Elliptic Curve Protocols.- Symmetric Key Protocols Including Ciphers.- Data Integrity and Message Authentication.- Side Channel Attacks on the Embedded System.- Countermeasures.- Reliable Testable Secure Systems.- Summary, Standards, and Ongoing Efforts.