Tags

safety
hardware
protocol
security
theorem proving
$k$-induction
pulp fictions
polynomial programs