[1]
R. Rohit, K. Hu, S. Sarkar, and S. Sun, “Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon”, ToSC, vol. 2021, no. 1, pp. 130–155, Mar. 2021.