[1]
“Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos”, ToSC, vol. 2021, no. 3, pp. 137–169, Sep. 2021, doi: 10.46586/tosc.v2021.i3.137-169.