3.3 Secure Hardware Primitives and Implementations