1.
Rahman M, Saha D, Paul G. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC [Internet]. 2021 Sep. 17 [cited 2024 Apr. 26];2021(3):137-69. Available from: https://tosc.iacr.org/index.php/ToSC/article/view/9177