Verification of Pipelined Ciphers