Design, build, and analyse hardware-based security primitives that work well | IEEE Conference Publication | IEEE Xplore