MILP modeling for (large) sboxes to optimize probability of differential characteristics, IACR Trans. Symmetric Cryptol, vol.2017, issue.4, pp.99-129, 2017. ,
Midori: A block cipher for low energy, ASIACRYPT. LNCS, vol.9453, pp.411-436, 2015. ,
The SKINNY family of block ciphers and its low-latency variant MANTIS, CRYPTO 2016 -36th Annual International Cryptology Conference, vol.9815, pp.123-153, 2016. ,
Yet another local search solver and lingeling and friends entering the sat competition, pp.39-40, 2014. ,
New types of cryptoanalytic attacks using related keys (extended abstract), EUROCRYPT, LNCS 765, pp.398-409, 1993. ,
Differential cryptoanalysis of feal and n-hash, EUROCRYPT. LNCS, vol.547, pp.1-16, 1991. ,
Automatic search for related-key differential characteristics in byteoriented block ciphers: Application to AES, camellia, khazad and others, Advances in Cryptology, vol.6110, pp.322-344, 2010. ,
Boosting systematic search by weighting constraints, Proceedings of the 16th Eureopean Conference on Artificial Intelligence, pp.146-150, 2004. ,
, Boomerang connectivity table: A new cryptanalysis tool. In: EUROCRYPT. LNCS, vol.10821, pp.683-714, 2018.
, Advanced Encryption Standard. Federal Information Processing Standards Publication, vol.197, 2001.
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128, Advances in Cryptology -CRYPTO 2013 -Part I, vol.8042, pp.183-203, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00870453
Security Analysis of Contactless Communication Protocols, 2018. ,
Related-key cryptanalysis of midori, Progress in Cryptology -INDOCRYPT 2016, vol.10095, pp.287-304, 2016. ,
Computing AES related-key differential characteristics with constraint programming, Artif. Intell, vol.278, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02327893
Constraint programming models for chosen key differential cryptanalysis, CP. LNCS, vol.9892, pp.584-601, 2016. ,
Truncated and higher order differentials, Fast Software Encryption, pp.196-211, 1995. ,
Observations on the SIMON block cipher family, CRYPTO -35th Annual Cryptology Conference, vol.9215, pp.161-185, 2015. ,
Cryptosat: a tool for sat-based cryptanalysis, IET Information Security, vol.12, issue.6, pp.463-474, 2018. ,
Sparse-Sets for Domain Implementation, CP workshop on Techniques foR Implementing Constraint programming Systems (TRICS), 2013. ,
Solving a Symmetric Key Cryptographic Problem with Constraint Programming, Workshop on Constraint Modelling and Reformulation (Mod-Ref), pp.1-13, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01092574
A proof that the ARX cipher salsa20 is secure against differential cryptanalysis. IACR Cryptology ePrint Archive, p.328, 2013. ,
, , 2016.
Extending SAT solvers to cryptographic problems, SAT. LNCS, vol.5584, pp.244-257, 2009. ,
More accurate differential properties of led64 and midori64, IACR Transactions on Symmetric Cryptology, vol.2018, issue.3, pp.93-123, 2018. ,
Analysis of aes, skinny, and others with constraint programming, 24th International Conference on Fast Software Encryption, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01615487
Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, DES(L) and other bit-oriented block ciphers, ASIACRYPT. LNCS, vol.8873, pp.158-178, 2014. ,
Cube attacks on non-blackbox polynomials based on division property, CRYPTO. LNCS, vol.10403, pp.250-279, 2017. ,
Constraint Solving and Planning with Picat, 2015. ,