Author of the publication

An industrially effective environment for formal hardware verification.

, , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 24 (9): 1381-1405 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An industrially effective environment for formal hardware verification., , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 24 (9): 1381-1405 (2005)Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic., , and . IEEE Trans. Computers, 68 (1): 67-82 (2019)Toward a Super Duper Hardware Tactic., , and . HUG, volume 780 of Lecture Notes in Computer Science, page 399-412. Springer, (1993)Lifted-FL: A Pragmatic Implementation of Combined Model Checking and Theorem Proving., , and . TPHOLs, volume 1690 of Lecture Notes in Computer Science, page 323-340. Springer, (1999)Simplifying design and verification for structural hazards and datapaths in pipelined circuits., and . HLDVT, page 31-36. IEEE Computer Society, (2004)A general decomposition strategy for verifying register renaming., and . DAC, page 234-237. ACM, (2004)Reasoning About Pipelines with Structural Hazards., and . TPCD, volume 901 of Lecture Notes in Computer Science, page 13-32. Springer, (1994)Xs are for Trajectory Evaluation, Booleans are for Theorem Proving., , and . CHARME, volume 1703 of Lecture Notes in Computer Science, page 202-218. Springer, (1999)Optimal parameters for the WG stream cipher family., , , and . Cryptography and Communications, 6 (2): 117-135 (2014)Hardware implementations of the WG-5 cipher for passive RFID tags., , and . HOST, page 29-34. IEEE Computer Society, (2013)