Hardware Security Primitives for Resource-Constrained Devices