Sciweavers

11 search results - page 3 / 3
» Symbolic Multi-Level Verification of Refinement
Sort
View
155
Voted
ICST
2009
IEEE
15 years 16 days ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz