T. Baignères, P. Sepehrdad, and S. Vaudenay, Distinguishing distributions using chernoff information, Provable Security-4th International Conference, vol.6402, pp.144-165, 2010.

S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari et al., Midori: A block cipher for low energy, Advances in Cryptology-ASIACRYPT 2015-21st International Conference on the Theory and Application of Cryptology and Information Security, vol.9453, pp.411-436, 2015.

E. Biham, Advances in Cryptology-EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, 1993.

E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, 1993.

A. Biryukov and I. Nikolic, Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to aes, camellia, khazad and others, Advances in Cryptology-EUROCRYPT 2010, vol.6110, pp.322-344, 2010.

Z. Chen and X. Wang, Impossible differential cryptanalysis of midori, IACR Cryptology ePrint Archive, p.535, 2016.

X. Dong, Cryptanalysis of reduced-round midori64 block cipher, Cryptology ePrint Archive, 2016.

P. Fouque, J. Jean, and T. Peyrin, Structural evaluation of aes and chosenkey distinguisher of 9-round aes-128, Advances in Cryptology-CRYPTO 2013, vol.8042, pp.183-203, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01094302

D. Gerault, M. Minier, and C. Solnon, Constraint programming models for chosen key differential cryptanalysis, The 22nd Internation Conference on Principles and Practice of Constraint Programming, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01331222

H. Gilbert and T. Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AESLike Permutations, pp.365-383, 2010.

J. Guo, J. Jean, I. Nikoli´cnikoli´c, K. Qiao, Y. Sasaki et al., Invariant subspace attack against full midori64. Cryptology ePrint Archive, 1189.

L. R. Knudsen, Cryptanalysis of LOKI 91, pp.196-208, 1993.

L. Lin and W. Wu, Meet-in-the-middle attacks on reduced-round midori-64, Cryptology ePrint Archive, 1165.

N. Mouha, Q. Wang, D. Gu, and B. Preneel, Differential and linear cryptanalysis using mixed-integer linear programming, Information Security and Cryptology-7th International Conference, vol.7537, pp.57-76, 2011.

C. Prud'homme, J. Fages, and X. Lorca, Choco Documentation. TASC, INRIA Rennes, LINA CNRS UMR 6241, 2016.

A. A. Selçuk, On probability of success in linear and differential cryptanalysis, Journal of Cryptology, vol.21, issue.1, pp.131-147, 2008.

S. Sun, L. Hu, M. Wang, Q. Yang, K. Qiao et al., Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis, Information Security-18th International Conference, vol.9290, pp.141-157, 2015.

S. Sun, L. Hu, P. Wang, K. Qiao, X. Ma et al., Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, DES(L) and other bit-oriented block ciphers, Advances in Cryptology-ASIACRYPT 2014. Proceedings, Part I, vol.8873, pp.158-178, 2014.

D. J. Wheeler and R. M. Needham, Tea, a tiny encryption algorithm, Fast Software Encryption: Second International Workshop Leuven, pp.363-366, 1994.