共 25 条
- [1] Verification of a Cryptographic Primitive: SHA-256 [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 37 (02):
- [2] Appel AW, 2011, LECT NOTES COMPUT SC, V6602, P1, DOI 10.1007/978-3-642-19718-5_1
- [3] Appel Andrew W, 2014, PROGRAM LOGICS CERTI, DOI DOI 10.1017/CBO9781107256552
- [4] Baudin P, ACSL: ANSI/ISO C Specification Language
- [5] Bertot Y., 2004, TEXT THEORET COMP S
- [6] Blanchard Allan, 2015, Formal Methods for Industrial Critical Systems. 20th International Workshop, FMICS 2015. Proceedings: LNCS 9128, P15, DOI 10.1007/978-3-319-19458-5_2
- [7] Brookes Stephen, 2016, ACM SIGLOG News, V3, P47
- [8] Clarke L. A., 2006, Software Engineering Notes, V31, P25, DOI 10.1145/1127878.1127900
- [9] Auto-Active Proof of Red-Black Trees in SPARK [J]. NASA FORMAL METHODS (NFM 2017), 2017, 10227 : 68 - 83
- [10] Dunkels A., 2004, LCN 2014