{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:10Z","timestamp":1750220950114,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T00:00:00Z","timestamp":1553644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,27]]},"DOI":"10.1145\/3320326.3320367","type":"proceedings-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T15:12:03Z","timestamp":1558451523000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal verification of cryptographic circuits"],"prefix":"10.1145","author":[{"given":"Abir","family":"Bitat","sequence":"first","affiliation":[{"name":"MISC laboratory, IFA department, Abdelhamid Mehri university 2 of Constantine"}]},{"given":"Salah","family":"merniz","sequence":"additional","affiliation":[{"name":"MISC laboratory, IFA department, Abdelhamid Mehri university 2 of Constantine"}]}],"member":"320","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1998.776849"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2157687"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314436.1314442"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 32nd WIC Symposium on Information Theory in the Benelux (pp. 194--201)","author":"Wolfs D.","year":"2011","unstructured":"D. Wolfs , K. Aerts , J. Moelans , and N. Mentens , \" Design automation for cryptographic hardware using functional languages \". In Proceedings of the 32nd WIC Symposium on Information Theory in the Benelux (pp. 194--201) . Werkgemeen-schap voor Informatie-en Communicatietheorie. 2011 . D. Wolfs, K.Aerts, J. Moelans, and N. Mentens, \"Design automation for cryptographic hardware using functional languages\". In Proceedings of the 32nd WIC Symposium on Information Theory in the Benelux (pp. 194--201). Werkgemeen-schap voor Informatie-en Communicatietheorie.2011."},{"key":"e_1_3_2_1_6_1","unstructured":"C. H. Lam. \"Verification of pipelined ciphers\" (Master's thesis University of Waterloo).2009.  C. H. Lam. \"Verification of pipelined ciphers\" (Master's thesis University of Waterloo).2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-007-0028-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.131"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2014.49"},{"key":"e_1_3_2_1_10_1","unstructured":"K. P. Singh and S. Parmar \"Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm.\" arXiv preprint arXiv:1503.03166.2015.  K. P. Singh and S. Parmar \"Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm.\" arXiv preprint arXiv:1503.03166.2015."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Bond B.","year":"2017","unstructured":"B. Bond , C. Hawblitzel , M. Kapritsos , K. R. M. Leino , J. R. Lorch , B. Parno , ... and L. Thompson . \" Vale: Verifying high-performance cryptographic assembly code \". In Proceedings of the USENIX Security Symposium. 2017 . B. Bond, C. Hawblitzel, M. Kapritsos, K. R. M. Leino, J. R. Lorch, B. Parno, ... and L. Thompson. \"Vale: Verifying high-performance cryptographic assembly code\". In Proceedings of the USENIX Security Symposium. 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747939"},{"key":"e_1_3_2_1_13_1","volume-title":"ISRN Electronics","author":"Chen G.","year":"2012","unstructured":"G. Chen . \" A short historical survey of functional hardware languages\". ISRN Electronics . 2012 . G. Chen. \"A short historical survey of functional hardware languages\". ISRN Electronics. 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47597-4_7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18535\/ijecs\/v5i10.30"},{"key":"e_1_3_2_1_16_1","unstructured":"Encryption cores overview. Ocean logic. 2005 http:\/\/www.ocean-logic.com\/  Encryption cores overview. Ocean logic. 2005 http:\/\/www.ocean-logic.com\/"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE","author":"B.","year":"2018","unstructured":"Abir, B. I. T. A. T., and M. E. R. N. I. Z. Salah . \"Towards formal verification of cryptographic circuits: A functional approach.\" 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS) . IEEE , 2018 . Abir, B. I. T. A. T., and M. E. R. N. I. Z. Salah. \"Towards formal verification of cryptographic circuits: A functional approach.\" 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE, 2018."}],"event":{"name":"NISS19: Networking, Information Systems & Security","acronym":"NISS19","location":"Rabat Morocco"},"container-title":["Proceedings of the 2nd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320326.3320367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:56Z","timestamp":1750204436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320367"}},"subtitle":["A semi-automatic functional approach"],"short-title":[],"issued":{"date-parts":[[2019,3,27]]},"references-count":16,"alternative-id":["10.1145\/3320326.3320367","10.1145\/3320326"],"URL":"https:\/\/doi.org\/10.1145\/3320326.3320367","relation":{},"subject":[],"published":{"date-parts":[[2019,3,27]]},"assertion":[{"value":"2019-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}