[1]
Rahman, M., Saha, D. and Paul, G. 2021. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Transactions on Symmetric Cryptology. 2021, 3 (Sep. 2021), 137–169. DOI:https://doi.org/10.46586/tosc.v2021.i3.137-169.