International audienceWhen designing a new symmetric block cipher, it is necessary to evaluate its robustness against differential attacks. This is done by computing Truncated Differential Characteristics (TDCs) that provide bounds on the complexity of these attacks. TDCs are often computed by using declarative approaches such as CP (Constraint Programming), SAT, or ILP (Integer Linear Programming). However, designing accurate and efficient models for these solvers is a difficult, error-prone and time-consuming task, and it requires advanced skills on both symmetric cryptography and solvers. In this paper, we describe a tool for automatically generating these models, called Tagada (Tool for Automatic Generation of Abstraction-based Differen...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
In this thesis, we study how to enhance current cryptanalytic techniques, especially in Differential...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceWhen designing a new symmetric block cipher, it is necessary to evaluate its r...
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against diff...
An important criteria to assert the security of a cryptographic primitive is its resistance against ...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
In this thesis, we are interested in the use of constraint programming (CP) for solving differential...
International audienceEvaluating resistance of ciphers against differential cryptanalysis is essenti...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Differential Cryptanalysis (DC) is one of the oldest known attacks on block ciphers. DC is based on ...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
In this thesis, we study how to enhance current cryptanalytic techniques, especially in Differential...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceWhen designing a new symmetric block cipher, it is necessary to evaluate its r...
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against diff...
An important criteria to assert the security of a cryptographic primitive is its resistance against ...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
In this thesis, we are interested in the use of constraint programming (CP) for solving differential...
International audienceEvaluating resistance of ciphers against differential cryptanalysis is essenti...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Differential Cryptanalysis (DC) is one of the oldest known attacks on block ciphers. DC is based on ...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
In this thesis, we study how to enhance current cryptanalytic techniques, especially in Differential...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...