Revisiting AES Related-Key Differential Attacks with Constraint Programming.
David GéraultPascal LafourcadeMarine MinierChristine SolnonPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- constraint programming
- constraint satisfaction problems
- combinatorial problems
- constraint propagation
- block cipher
- constraint satisfaction
- global constraints
- integer programming
- column generation
- search strategies
- symmetry breaking
- cryptographic algorithms
- constraint solving
- finite domain
- constraint solver
- itemset mining
- constraint optimization
- arc consistency
- np hard problems
- evolutionary algorithm
- hard and soft constraints
- constraint logic programming
- propositional satisfiability
- search heuristics
- advanced encryption standard
- intrusion detection