Login / Signup
Automated Verification of Real-World Cryptographic Implementations.
Aaron Tomb
Published in:
IEEE Secur. Priv. (2016)
Keyphrases
</>
automated verification
real world
model checking
automated reasoning
formal verification
data sets
case study
synthetic data
random number generators
wide range
real life
smart card
security protocols
neural network
artificial intelligence