A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Analysis of AES, SKINNY, and Others with Constraint Programming
2017
IACR Transactions on Symmetric Cryptology
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show that a simple application of the CP approach proposed by Gerault et al. leads to the solution of the open problem of determining the exact lower bound of the number of active S-boxes for 6-round AES-128 in the related-key model. Subsequently, we show that the same approach can be applied in
doi:10.13154/tosc.v2017.i1.281-306
dblp:journals/tosc/SunGLYTQH17
fatcat:txrp6m7oxjbq3nbvcwxzfw4jky