S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari et al., Midori : A block cipher for low energy, ASIACRYPT, volume 9453 de LNCS, pp.411-436, 2015.

A. Biere, Yet another local search solver and lingeling and friends entering the sat competition, vol.01, pp.39-40, 2014.

E. Biham, New types of cryptoanalytic attacks using related keys (extended abstract), EUROCRYPT, vol.765, pp.398-409, 1993.

E. Biham and A. Shamir, Differential cryptoanalysis of feal and n-hash, EUROCRYPT, volume 547 de LNCS, pp.1-16, 1991.

F. Boussemart, F. Hemery, C. Lecoutre, and L. Sais, Boosting systematic search by weighting constraints, ECAI, pp.146-150, 2004.

C. Cid, T. Huang, T. Peyrin, Y. Sasaki, and L. Song, Boomerang connectivity table : A new cryptanalysis tool, pp.683-714, 2018.

H. Comon-lundh and V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings, pp.271-280, 2003.

, Advanced Encryption Standard. Federal Information Processing Standards Publication, vol.197, 2001.

D. Gérault, Security Analysis of Contactless Communication Protocols, 2018.

D. Gérault, P. Lafourcade, and M. Minier, Solnon : Revisiting AES related-key differential attacks with constraint programming, Inf. Process. Lett, vol.139, pp.24-29, 2018.

D. Gérault, M. Minier, and C. Solnon, Constraint programming models for chosen key differential cryptanalysis, CP, volume 9892 de LNCS, pp.584-601, 2016.

R. M. Karp, Reducibility among combinatorial problems, In Symposium on the Complexity of Computer Computations, pp.85-103, 1972.

L. Knudsen, Truncated and higher order differentials, Fast Software Encryption, pp.196-211, 1995.

D. E. Knuth, Dancing links. Millenial Perspectives in Computer Science, vol.18, p.4, 2000.

T. Laitinen, T. Junttila, and I. Niemelä, Conflict-Driven XOR-Clause Learning (extended version), 2014.

C. Prud'homme, J. Fages, and X. Lorca, , 2016.

Y. Todo, T. Isobe, Y. Hao, and W. Meier, Cube attacks on non-blackbox polynomials based on division property, CRYPTO, volume 10403 de LNCS, pp.250-279, 2017.

N. Zhou, H. Kjellerstrand, and J. Fruhman, Constraint Solving and Planning with Picat, 2015.

N. Zhou and H. Kjellerstrand, Optimizing SAT encodings for arithmetic constraints