[1]
Sun, S. et al. 2017. Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Transactions on Symmetric Cryptology. 2017, 1 (Mar. 2017), 281–306. DOI:https://doi.org/10.13154/tosc.v2017.i1.281-306.