Return to Article Details Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks Download Download PDF