International audienceSearch for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show that a simple application of the CP approach proposed by Gerault et al. leads to the solution of the open problem of determining the exact lower bound of the number of active S-boxes for 6-round AES-128 in the related-key model. Subsequently, we show that the same approach can be applied in searching for integral distinguishers, impossible differentials, zero-correlation linear approximations, in both the single-key and related-(twea)key model. We implement the method using the open source constraint solver Choco and apply...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...