Research Article

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

Table 7

The constraints used to describe the nontrivial mask propagations for the activeness of Sbox.

No.ClauseNo.ClauseNo.Clause

11528
21629
31730
41831
51932
62033
72134
82235
92336
102437
112538
122639
132740
14