Trends in Implementation Attacks and Technologies for Tamper Resistance