1.
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC. 2021;2021(3):137-169. doi:10.46586/tosc.v2021.i3.137-169