[1]
M. Rahman, D. Saha, and G. Paul, “Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos”, ToSC, vol. 2021, no. 3, pp. 137–169, Sep. 2021.