Report on the Security Evaluation of Cryptographic Algorithms and Countermeasures when non Ideal Hardware Building Blocks are Used

Summary
This report is output of T3.1 and T3.2.