1.
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC [Internet]. 2021 Sep. 17 [cited 2024 Jul. 17];2021(3):137-69. Available from: https://tosc.iacr.org/index.php/ToSC/article/view/9177