Encrypting in a Dangerous World

Suppose you have a very difficult threat model for your embedded system. Not only is your adversary technically skilled, but they are going to have physical access to your device.Maybe you are exporting a SCADA controller containing critical or trade secret data to a...