Exploiting lithography limits for hardware security applications