E. Biham, New types of cryptoanalytic attacks using related keys (extended abstract, Advances in Cryptology -EUROCRYPT '93, pp.398-409, 1993.
DOI : 10.1007/3-540-48285-7_34

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48285-7_34.pdf

L. R. Knudsen and V. Rijmen, Known-Key Distinguishers for Some Block Ciphers, Advances in Cryptology -ASIACRYPT 2007, pp.315-324, 2007.
DOI : 10.1007/978-3-540-76900-2_19

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-76900-2_19.pdf

P. Fouque, J. Jean, and T. Peyrin, Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128, LNCS, vol.8042, pp.183-203, 2013.
DOI : 10.1007/978-3-642-40041-4_11

URL : https://hal.archives-ouvertes.fr/hal-00870453

A. Biryukov, D. Khovratovich, and I. Nikolic, Distinguisher and Related-Key Attack on the Full AES-256, LNCS, vol.5677, pp.231-249, 2009.
DOI : 10.1007/978-3-642-03356-8_14

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_14.pdf

D. Gerault, M. Minier, and C. Solnon, Constraint Programming Models for Chosen Key Differential Cryptanalysis, Principles and Practice of Constraint Programming -CP 2016, pp.584-601, 2016.
DOI : 10.1007/978-3-662-45611-8_9

URL : https://hal.archives-ouvertes.fr/hal-01331222

J. Kim, S. Hong, and B. , Related-Key Rectangle Attacks on Reduced AES-192 and AES-256, LNCS, vol.4593, pp.225-241, 2007.
DOI : 10.1007/978-3-540-74619-5_15

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74619-5_15.pdf

A. Biryukov and D. Khovratovich, Related-Key Cryptanalysis of the Full AES-192 and AES-256, Advances in Cryptology -ASIACRYPT 2009, pp.1-18, 2009.
DOI : 10.1007/978-3-642-10366-7_1

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-10366-7_1.pdf

E. Biham and A. Shamir, Differential cryptoanalysis of feal and n-hash, Advances in Cryptology -EUROCRYPT '91, pp.1-16, 1991.
DOI : 10.1007/3-540-46416-6_1

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-46416-6_1.pdf

A. Biryukov and I. Nikolic, Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others, Advances in Cryptology -EUROCRYPT 2010, pp.322-344, 2010.
DOI : 10.1007/978-3-642-13190-5_17

URL : http://www.iacr.org/archive/eurocrypt2010/66320220/66320220.pdf

D. Gérault, P. Lafourcade, M. Minier, and C. Solnon, Revisiting aes related-key differential attacks with constraint programming, Cryptology ePrint Archive, 2017.

D. Gerault, P. Lafourcade, M. Minier, and C. Solnon, Combining Solvers to Solve a Cryptanalytic Problem, SAT Doctoral Program -part of the conference CP 2017, 2017.
DOI : 10.24963/ijcai.2017/679

URL : https://www.ijcai.org/proceedings/2017/0679.pdf

I. Nicolic, Cryptanalysis and design of symmetric primitives, 2011.