Midori : A block cipher for low energy, ASIACRYPT, volume 9453 de LNCS, pp.411-436, 2015. ,
Yet another local search solver and lingeling and friends entering the sat competition, vol.01, pp.39-40, 2014. ,
New types of cryptoanalytic attacks using related keys (extended abstract), EUROCRYPT, vol.765, pp.398-409, 1993. ,
Differential cryptoanalysis of feal and n-hash, EUROCRYPT, volume 547 de LNCS, pp.1-16, 1991. ,
Boosting systematic search by weighting constraints, ECAI, pp.146-150, 2004. ,
, Boomerang connectivity table : A new cryptanalysis tool, pp.683-714, 2018.
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings, pp.271-280, 2003. ,
, Advanced Encryption Standard. Federal Information Processing Standards Publication, vol.197, 2001.
Security Analysis of Contactless Communication Protocols, 2018. ,
Solnon : Revisiting AES related-key differential attacks with constraint programming, Inf. Process. Lett, vol.139, pp.24-29, 2018. ,
Constraint programming models for chosen key differential cryptanalysis, CP, volume 9892 de LNCS, pp.584-601, 2016. ,
Reducibility among combinatorial problems, In Symposium on the Complexity of Computer Computations, pp.85-103, 1972. ,
Truncated and higher order differentials, Fast Software Encryption, pp.196-211, 1995. ,
Dancing links. Millenial Perspectives in Computer Science, vol.18, p.4, 2000. ,
Conflict-Driven XOR-Clause Learning (extended version), 2014. ,
, , 2016.
Cube attacks on non-blackbox polynomials based on division property, CRYPTO, volume 10403 de LNCS, pp.250-279, 2017. ,
, Constraint Solving and Planning with Picat, 2015.
Optimizing SAT encodings for arithmetic constraints ,