Towards Hardware-Intrinsic Security: Foundations and