[1]
Sun, S. et al. 2017. Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Transactions on Symmetric Cryptology
. 2017, 1 (Mar. 2017), 281–306
. DOI:https://doi.org/10.13154/tosc.v2017.i1.281-306
.