Revisiting AES related-key differential attacks with constraint programming.
David GéraultPascal LafourcadeMarine MinierChristine SolnonPublished in: Inf. Process. Lett. (2018)
Keyphrases
- constraint programming
- combinatorial problems
- block cipher
- constraint satisfaction problems
- constraint propagation
- integer programming
- global constraints
- search strategies
- constraint satisfaction
- finite domain
- symmetry breaking
- np hard problems
- constraint solver
- cryptographic algorithms
- column generation
- search heuristics
- constraint logic programming
- constraint solving
- constraint optimization
- hard and soft constraints
- arc consistency
- data mining
- constraint solvers
- advanced encryption standard