International audienceThis paper tries to sum up a starting work at the edge between Cryptography and Constraint Programming. Indeed, many cryptographic problems are solved using Branch \& Bound approaches which are implemented from scratch using classical programming languages such as C. This implies quite a lot of programming work. Furthermore, these problems are NP-hard and solving them within a reasonable amount of time is still challenging.The main goal of this paper is to investigate the capabilities of classical Constraint Programming tools for solving these problems. In this very first study, we focus on a particular problem coming from the symmetric key cryptography world. This particular problem could help cryptographers to mount ...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
ModRef 2014, Workshop of the CP 2014 Conference, September 2014, Lyon, FranceThis paper tries to sum...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against diff...
In this thesis, we are interested in the use of constraint programming (CP) for solving differential...
International audienceConstraint Programming models have been recently proposed to solve cryptanalys...
International audienceWhen designing a new symmetric block cipher, it is necessary to evaluate its r...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
ModRef 2014, Workshop of the CP 2014 Conference, September 2014, Lyon, FranceThis paper tries to sum...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against diff...
In this thesis, we are interested in the use of constraint programming (CP) for solving differential...
International audienceConstraint Programming models have been recently proposed to solve cryptanalys...
International audienceWhen designing a new symmetric block cipher, it is necessary to evaluate its r...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...