Mark D. Aagaard

Orcid: 0000-0002-7331-3177

Affiliations:
  • University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada


According to our database1, Mark D. Aagaard authored at least 55 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The welch-gong stream cipher - evolutionary path.
Cryptogr. Commun., January, 2024

2023
FFCSA - Finite Field Constructions, Search, and Algorithms.
ACM Commun. Comput. Algebra, June, 2023

Tower field support for synthesis of datapaths.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023

2021
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: (Preliminary Results).
IACR Cryptol. ePrint Arch., 2021

2020
Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences.
IEEE Trans. Computers, 2020

Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

2019
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic.
IEEE Trans. Computers, 2019

Hardware Design and Analysis of the ACE and WAGE Ciphers.
CoRR, 2019

2018
On ideal t-tuple distribution of filtering de Bruijn sequence generators.
Cryptogr. Commun., 2018

Rapid Hardware Design for Cryptographic Modules with Filtering Structures over Small Finite Fields.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

2017
Efficient Composited de Bruijn Sequence Generators.
IEEE Trans. Computers, 2017

2015
Window memoization: toward high-performance image processing software.
J. Real Time Image Process., 2015

The Simeck Family of Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator.
IACR Cryptol. ePrint Arch., 2015

2014
Optimal parameters for the WG stream cipher family.
Cryptogr. Commun., 2014

2013
Resilience to distinguishing attacks on WG-7 cipher and their generalizations.
Cryptogr. Commun., 2013

Hardware implementations of the WG-5 cipher for passive RFID tags.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

On selection of optimal parameters for the WG stream cipher family.
Proceedings of the 13th Canadian Workshop on Information Theory, 2013

Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic.
Proceedings of the TrustED'13, 2013

Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs.
Proceedings of the Workshop on Embedded Systems Security, 2013

2010
Window memoization: an efficient hardware architecture for high-performance image processing.
J. Real Time Image Process., 2010

2007
Improving the Usability of HOL Through Controlled Automation Tactics.
Proceedings of the Theorem Proving in Higher Order Logics, 20th International Conference, 2007

2005
Simplifying the design and automating the verification of pipelines with structural hazards.
ACM Trans. Design Autom. Electr. Syst., 2005

An industrially effective environment for formal hardware verification.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005

2004
Simplifying design and verification for structural hazards and datapaths in pipelined circuits.
Proceedings of the Ninth IEEE International High-Level Design Validation and Test Workshop 2004, 2004

Synchronization-at-Retirement for Pipeline Verification.
Proceedings of the Formal Methods in Computer-Aided Design, 5th International Conference, 2004

Combining Equivalence Verification and Completion Functions.
Proceedings of the Formal Methods in Computer-Aided Design, 5th International Conference, 2004

A general decomposition strategy for verifying register renaming.
Proceedings of the 41th Design Automation Conference, 2004

2003
A framework for superscalar microprocessor correctness statements.
Int. J. Softw. Tools Technol. Transf., 2003

A Hazards-Based Correctness Statement for Pipelined Circuits.
Proceedings of the Correct Hardware Design and Verification Methods, 2003

2002
Relating Multi-step and Single-Step Microprocessor Correctness Statements.
Proceedings of the Formal Methods in Computer-Aided Design, 4th International Conference, 2002

2001
Practical Formal Verification in Microprocessor Design.
IEEE Des. Test Comput., 2001

Applications of Hierarchical Verification in Model Checking.
Proceedings of the Correct Hardware Design and Verification Methods, 2001

A Framework for Microprocessor Correctness Statements.
Proceedings of the Correct Hardware Design and Verification Methods, 2001

2000
Divider Circuit Verification with Model Checking and Theorem Proving.
Proceedings of the Theorem Proving in Higher Order Logics, 13th International Conference, 2000

Combining Stream-Based and State-Based Verification Techniques.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000

A Methodology for Large-Scale Hardware Verification.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000

Formal verification of iterative algorithms in microprocessors.
Proceedings of the 37th Conference on Design Automation, 2000

1999
Lifted-FL: A Pragmatic Implementation of Combined Model Checking and Theorem Proving.
Proceedings of the Theorem Proving in Higher Order Logics, 12th International Conference, 1999

Parametric Representations of Boolean Constraints.
Proceedings of the 36th Conference on Design Automation, 1999

Xs are for Trajectory Evaluation, Booleans are for Theorem Proving.
Proceedings of the Correct Hardware Design and Verification Methods, 1999

1998
Combining Theorem Proving and Trajectory Evaluation in an Industrial Environment.
Proceedings of the 35th Conference on Design Automation, 1998

1995
Verifying a Logic-Synthesis Algorithm and Implementation: A Case Study in Software Verification.
IEEE Trans. Software Eng., 1995

The formal verification of a pipelined double-precision IEEE floating-point multiplier.
Proceedings of the 1995 IEEE/ACM International Conference on Computer-Aided Design, 1995

1994
PBS: proven Boolean simplification.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1994

A Methodology for Efficient Hardware Verification.
Formal Methods Syst. Des., 1994

Non-Restoring Integer Square Root: A Case Study in Design by Principled Optimization.
Proceedings of the Theorem Provers in Circuit Design, 1994

Reasoning About Pipelines with Structural Hazards.
Proceedings of the Theorem Provers in Circuit Design, 1994

1993
High level synthesis and generating FPGAs with the BEDROC system.
J. VLSI Signal Process., 1993

Toward a Super Duper Hardware Tactic.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

A Framework for Specifying and Designing Pipelines.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993

HML: A Hardware Description Language Based on Standard ML.
Proceedings of the Computer Hardware Description Languages and their Applications, Proceedings of the 11th IFIP WG10.2 International Conference on Computer Hardware Description Languages and their Applications, 1993

1992
A Methodology for Reusable Hardware Proofs.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992

Verifying a Logic Synthesis Tool in Nuprl: A Case Study in Software Verification.
Proceedings of the Computer Aided Verification, Fourth International Workshop, 1992

1991
A Formally Verified System for Logic Synthesis.
Proceedings of the Proceedings 1991 IEEE International Conference on Computer Design: VLSI in Computer & Processors, 1991


  Loading...