[1]
“Analysis of AES, SKINNY, and Others with Constraint Programming”, ToSC, vol. 2017, no. 1, pp. 281–306, Mar. 2017, doi: 10.13154/tosc.v2017.i1.281-306.