A. Abdelkhalek, Y. Sasaki, Y. Todo, M. Tolba, and A. Youssef, MILP modeling for (large) sboxes to optimize probability of differential characteristics, IACR Trans. Symmetric Cryptol, vol.2017, issue.4, pp.99-129, 2017.

S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari et al., Midori: A block cipher for low energy, ASIACRYPT. LNCS, vol.9453, pp.411-436, 2015.

C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi et al., The SKINNY family of block ciphers and its low-latency variant MANTIS, CRYPTO 2016 -36th Annual International Cryptology Conference, vol.9815, pp.123-153, 2016.

A. Biere, Yet another local search solver and lingeling and friends entering the sat competition, pp.39-40, 2014.

E. Biham, New types of cryptoanalytic attacks using related keys (extended abstract), EUROCRYPT, LNCS 765, pp.398-409, 1993.

E. Biham and A. Shamir, Differential cryptoanalysis of feal and n-hash, EUROCRYPT. LNCS, vol.547, pp.1-16, 1991.

A. Biryukov and I. Nikolic, Automatic search for related-key differential characteristics in byteoriented block ciphers: Application to AES, camellia, khazad and others, Advances in Cryptology, vol.6110, pp.322-344, 2010.

F. Boussemart, F. Hemery, C. Lecoutre, and L. Sais, Boosting systematic search by weighting constraints, Proceedings of the 16th Eureopean Conference on Artificial Intelligence, pp.146-150, 2004.

C. Cid, T. Huang, T. Peyrin, Y. Sasaki, and L. Song, Boomerang connectivity table: A new cryptanalysis tool. In: EUROCRYPT. LNCS, vol.10821, pp.683-714, 2018.

, Advanced Encryption Standard. Federal Information Processing Standards Publication, vol.197, 2001.

P. Fouque, J. Jean, and T. Peyrin, Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128, Advances in Cryptology -CRYPTO 2013 -Part I, vol.8042, pp.183-203, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00870453

D. Gérault, Security Analysis of Contactless Communication Protocols, 2018.

D. Gérault and P. Lafourcade, Related-key cryptanalysis of midori, Progress in Cryptology -INDOCRYPT 2016, vol.10095, pp.287-304, 2016.

D. Gerault, P. Lafourcade, M. Minier, and C. Solnon, Computing AES related-key differential characteristics with constraint programming, Artif. Intell, vol.278, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02327893

D. Gérault, M. Minier, and C. Solnon, Constraint programming models for chosen key differential cryptanalysis, CP. LNCS, vol.9892, pp.584-601, 2016.

L. Knudsen, Truncated and higher order differentials, Fast Software Encryption, pp.196-211, 1995.

S. Kölbl, G. Leander, and T. Tiessen, Observations on the SIMON block cipher family, CRYPTO -35th Annual Cryptology Conference, vol.9215, pp.161-185, 2015.

F. Lafitte, Cryptosat: a tool for sat-based cryptanalysis, IET Information Security, vol.12, issue.6, pp.463-474, 2018.

V. Le-clément-de-saint-marcq, P. Schaus, C. Solnon, and C. Lecoutre, Sparse-Sets for Domain Implementation, CP workshop on Techniques foR Implementing Constraint programming Systems (TRICS), 2013.

M. Minier, C. Solnon, and J. Reboul, Solving a Symmetric Key Cryptographic Problem with Constraint Programming, Workshop on Constraint Modelling and Reformulation (Mod-Ref), pp.1-13, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01092574

N. Mouha and B. Preneel, A proof that the ARX cipher salsa20 is secure against differential cryptanalysis. IACR Cryptology ePrint Archive, p.328, 2013.

C. Prud'homme, J. G. Fages, and X. Lorca, , 2016.

M. Soos, K. Nohl, and C. Castelluccia, Extending SAT solvers to cryptographic problems, SAT. LNCS, vol.5584, pp.244-257, 2009.

L. Sun, W. Wang, and M. Wang, More accurate differential properties of led64 and midori64, IACR Transactions on Symmetric Cryptology, vol.2018, issue.3, pp.93-123, 2018.

S. Sun, D. Gérault, P. Lafourcade, Q. Yang, Y. Todo et al., Analysis of aes, skinny, and others with constraint programming, 24th International Conference on Fast Software Encryption, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01615487

S. Sun, L. Hu, P. Wang, K. Qiao, X. Ma et al., Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, DES(L) and other bit-oriented block ciphers, ASIACRYPT. LNCS, vol.8873, pp.158-178, 2014.

Y. Todo, T. Isobe, Y. Hao, and W. Meier, Cube attacks on non-blackbox polynomials based on division property, CRYPTO. LNCS, vol.10403, pp.250-279, 2017.

N. F. Zhou, H. Kjellerstrand, and J. Fruhman, Constraint Solving and Planning with Picat, 2015.