Challenges in designing trustworthy cryptographic co-processors | IEEE Conference Publication | IEEE Xplore