E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, Advances in Cryptology -EUROCRYPT '93, pp.398-409, 1993.
DOI : 10.1007/3-540-48285-7_34

E. Biham and A. Shamir, Differential Cryptanalysis of Feal and N-Hash, Advances in Cryptology -EUROCRYPT '91, pp.1-16, 1991.
DOI : 10.1007/3-540-46416-6_1

A. Biryukov and I. Nikolic, Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others, Advances in Cryptology -EUROCRYPT 2010, pp.322-344, 2010.
DOI : 10.1007/978-3-642-13190-5_17

G. Chu and P. J. Stuckey, Chuffed solver description, 2014.

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.
DOI : 10.1007/978-3-662-04722-4

D. De, A. Kumarasubramanian, and R. Venkatesan, Inversion Attacks on Secure Hash Functions Using sat Solvers, Theory and Applications of Satisfiability Testing -SAT 2007, pp.377-382, 2007.
DOI : 10.1007/978-3-540-72788-0_36

J. Fages, On the use of graphs within constraint-programming, Constraints, vol.20, issue.4, pp.498-499, 2015.
DOI : 10.1007/s10601-015-9223-9

URL : https://hal.archives-ouvertes.fr/tel-01085253

J. Pierre-alain-fouque, T. Jean, and . Peyrin, Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128, Advances in Cryptology - CRYPTO 2013, pp.183-203, 2013.
DOI : 10.1007/978-3-642-40041-4_11

G. Team and . Gecode, Generic constraint development environment Available from http, 2006.

P. Karpman, T. Peyrin, and M. Stevens, Practical Free-Start Collision Attacks on 76-step SHA-1, IACR Cryptology ePrint Archive, p.530, 2015.
DOI : 10.1007/978-3-662-47989-6_30

URL : https://hal.archives-ouvertes.fr/hal-01183066

F. Legendre, G. Dequen, and M. Krajecki, Encoding Hash Functions as a SAT Problem, 2012 IEEE 24th International Conference on Tools with Artificial Intelligence, pp.916-921, 2012.
DOI : 10.1109/ICTAI.2012.128

URL : https://hal.archives-ouvertes.fr/hal-00846945

D. Laurent, P. Michel, and . Van-hentenryck, Constraint satisfaction over bitvectors, Principles and Practice of Constraint Programming -18th International Conference, pp.527-543, 2012.

M. Minier, C. Solnon, and J. Reboul, Solving a Symmetric Key Cryptographic Problemwith Constraint Programming, ModRef 2014, Workshop of the CP 2014 Conference, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01092574

I. Mironov and L. Zhang, Applications of SAT Solvers to Cryptanalysis of Hash Functions, Theory and Applications of Satisfiability Testing -SAT 2006, pp.102-115, 2006.
DOI : 10.1007/11814948_13

P. Morawiecki and M. Srebrny, A SAT-based preimage analysis of reduced Keccak hash functions, Information Processing Letters, vol.113, issue.10-11, pp.10-11392, 2013.
DOI : 10.1016/j.ipl.2013.03.004

N. Mouha, Q. Wang, D. Gu, and B. Preneel, Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming, Information Security and Cryptology -7th International Conference, pp.57-76, 2011.
DOI : 10.1007/978-3-642-34704-7_5

N. Nethercote, P. J. Stuckey, R. Becket, S. Brand, G. J. Duck et al., MiniZinc: Towards a Standard CP Modelling Language, Proceedings of the 13th International Conference on Principles and Practice of Constraint Programming, CP'07, pp.529-543, 2007.
DOI : 10.1007/978-3-540-74970-7_38

C. Prudhomme and J. Fages, An introduction to choco 3.0: an open source java constraint programming library, CP Workshop on "CP Solvers: Modeling, Applications, Integration, and Standardization, 2013.

M. Soos, K. Nohl, and C. Castelluccia, Extending SAT Solvers to Cryptographic Problems, Theory and Applications of Satisfiability Testing -SAT 2009, pp.244-257, 2009.
DOI : 10.1007/s10817-007-9074-1

S. Sun, L. Hu, M. Wang, Q. Yang, K. Qiao et al., Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis, Information Security -18th International Conference, pp.141-157, 2015.
DOI : 10.1007/978-3-319-23318-5_8

S. Sun, L. Hu, P. Wang, K. Qiao, X. Ma et al., Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers, Advances in Cryptology -ASIACRYPT 2014. Proceedings, Part I, pp.158-178, 2014.
DOI : 10.1007/978-3-662-45611-8_9

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology -EUROCRYPT 2005, pp.19-35, 2005.
DOI : 10.1007/11426639_2

X. Wang, H. Yu, and Y. Lisa-yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology -CRYPTO 2005, pp.1-16, 2005.
DOI : 10.1007/11535218_1