1.
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC [Internet]. 2021 Sep. 17 [cited 2024 Dec. 22];2021(3):137-69. Available from: https://moving-the-social.ub.rub.de/index.php/ToSC/article/view/9177