[PDF][PDF] Choco-solver

C Prud'homme, JG Fages - Journal of Open Source Software, 2022 - hal.science
Choco-solver Page 1 HAL Id: hal-03932507 https://hal.science/hal-03932507 Submitted on 10
Jan 2023 HAL is a multi-disciplinary open access archive for the deposit and dissemination of …

Constraint programming models for chosen key differential cryptanalysis

D Gerault, M Minier, C Solnon - … CP 2016, Toulouse, France, September 5 …, 2016 - Springer
In this paper, we introduce Constraint Programming (CP) models to solve a cryptanalytic
problem: the chosen key differential attack against the standard block cipher AES. The …

An algorithm based on ant colony optimization for the minimum connected dominating set problem

S Bouamama, C Blum, JG Fages - Applied Soft Computing, 2019 - Elsevier
Ant colony optimization is a well established metaheuristic from the swarm intelligence field
for solving difficult optimization problems. In this work we present an application of ant …

A simpler model for recovering superpoly on trivium

S Delaune, P Derbez, A Gontier… - … Conference on Selected …, 2021 - Springer
The cube attack is a powerful cryptanalysis technique against symmetric primitives,
especially for stream ciphers. One of the key step in a cube attack is recovering the …

Global domain views for expressive and cross-domain constraint programming

D Justeau-Allaire, C Prud'homme - Constraints, 2022 - Springer
The concept of domain views is a powerful abstraction in constraint programming. It permits
to define variables that do not declare any domain but instead rely on a variable x and a …

The dungeon variations problem using constraint programming

G Glorian, A Debesson, S Yvon-Paliot… - … on Principles and …, 2021 - drops.dagstuhl.de
The video games industry generates billions of dollars in sales every year. Video games can
offer increasingly complex gaming experiences, with gigantic (but consistent) open worlds …

Constraints for generating graphs with imposed and forbidden patterns: an application to molecular graphs

MA Omrani, W Naanaa - Constraints, 2020 - Springer
Although graphs are widely used to encode and solve various computational problems, little
research exists on constrained graph construction. The current research was carried out to …

Cryptanalysis of symmetric cipher using generic solvers

A Gontier - 2023 - theses.hal.science
Cryptography is a critical science for our connected societies. It involves the design, analysis
and implementation of cipher algorithms. Analyzing ciphers is a mandatory step to ensure …

Generating random graphs with hard and soft constraints

MA Omrani, W Naanaa - International Journal of Computer …, 2022 - inderscienceonline.com
Since its appearance in discrete mathematics, graphs have gained increasing importance
due to their capacity to model and solve real-world computational problems. They even …

[PDF][PDF] Vues de domaine globales

D Justeau-Allaire, C Prud'homme - JFPC - ut3-toulouseinp.hal.science
Résumé Le concept de vues de domaine est une abstraction puissante en programmation
par contraintes. Il permet de définir des variables qui ne déclarent aucun domaine, mais qui …