[1]
S. Sun, “Analysis of AES, SKINNY, and Others with Constraint Programming”,
ToSC
, vol. 2017, no. 1, pp. 281–306, Mar. 2017,
doi: 10.13154/tosc.v2017.i1.281-306.