A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware | IEEE Conference Publication | IEEE Xplore