New Types of Cryptanalytic Attacks Using Related Keys, Advances in Cryptology -EUROCRYPT '93, pp.398-409, 1993. ,
DOI : 10.1007/3-540-48285-7_34
Differential Cryptanalysis of Feal and N-Hash, Advances in Cryptology -EUROCRYPT '91, pp.1-16, 1991. ,
DOI : 10.1007/3-540-46416-6_1
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others, Advances in Cryptology -EUROCRYPT 2010, pp.322-344, 2010. ,
DOI : 10.1007/978-3-642-13190-5_17
Chuffed solver description, 2014. ,
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Inversion Attacks on Secure Hash Functions Using sat Solvers, Theory and Applications of Satisfiability Testing -SAT 2007, pp.377-382, 2007. ,
DOI : 10.1007/978-3-540-72788-0_36
On the use of graphs within constraint-programming, Constraints, vol.20, issue.4, pp.498-499, 2015. ,
DOI : 10.1007/s10601-015-9223-9
URL : https://hal.archives-ouvertes.fr/tel-01085253
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128, Advances in Cryptology - CRYPTO 2013, pp.183-203, 2013. ,
DOI : 10.1007/978-3-642-40041-4_11
Generic constraint development environment Available from http, 2006. ,
Practical Free-Start Collision Attacks on 76-step SHA-1, IACR Cryptology ePrint Archive, p.530, 2015. ,
DOI : 10.1007/978-3-662-47989-6_30
URL : https://hal.archives-ouvertes.fr/hal-01183066
Encoding Hash Functions as a SAT Problem, 2012 IEEE 24th International Conference on Tools with Artificial Intelligence, pp.916-921, 2012. ,
DOI : 10.1109/ICTAI.2012.128
URL : https://hal.archives-ouvertes.fr/hal-00846945
Constraint satisfaction over bitvectors, Principles and Practice of Constraint Programming -18th International Conference, pp.527-543, 2012. ,
Solving a Symmetric Key Cryptographic Problemwith Constraint Programming, ModRef 2014, Workshop of the CP 2014 Conference, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01092574
Applications of SAT Solvers to Cryptanalysis of Hash Functions, Theory and Applications of Satisfiability Testing -SAT 2006, pp.102-115, 2006. ,
DOI : 10.1007/11814948_13
A SAT-based preimage analysis of reduced Keccak hash functions, Information Processing Letters, vol.113, issue.10-11, pp.10-11392, 2013. ,
DOI : 10.1016/j.ipl.2013.03.004
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming, Information Security and Cryptology -7th International Conference, pp.57-76, 2011. ,
DOI : 10.1007/978-3-642-34704-7_5
MiniZinc: Towards a Standard CP Modelling Language, Proceedings of the 13th International Conference on Principles and Practice of Constraint Programming, CP'07, pp.529-543, 2007. ,
DOI : 10.1007/978-3-540-74970-7_38
An introduction to choco 3.0: an open source java constraint programming library, CP Workshop on "CP Solvers: Modeling, Applications, Integration, and Standardization, 2013. ,
Extending SAT Solvers to Cryptographic Problems, Theory and Applications of Satisfiability Testing -SAT 2009, pp.244-257, 2009. ,
DOI : 10.1007/s10817-007-9074-1
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis, Information Security -18th International Conference, pp.141-157, 2015. ,
DOI : 10.1007/978-3-319-23318-5_8
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers, Advances in Cryptology -ASIACRYPT 2014. Proceedings, Part I, pp.158-178, 2014. ,
DOI : 10.1007/978-3-662-45611-8_9
How to Break MD5 and Other Hash Functions, Advances in Cryptology -EUROCRYPT 2005, pp.19-35, 2005. ,
DOI : 10.1007/11426639_2
Efficient Collision Search Attacks on SHA-0, Advances in Cryptology -CRYPTO 2005, pp.1-16, 2005. ,
DOI : 10.1007/11535218_1