The security of modern ICT (Information and Communication Technologies) systems relies fundamentally on the integrity of hardware components. This is the case for user identification and authentication as in smartcards, e-Id, e-Passports, e-health devices or for the integrity checking of computers and mobile systems as in trusted computing and TPMs. But it is also the case for telecommunication i ...