(1)
Boomeyong: Embedding Yoyo Within Boomerang and Its Applications to Key Recovery Attacks on AES and Pholkos. ToSC 2021, 2021 (3), 137-169. https://doi.org/10.46586/tosc.v2021.i3.137-169.