1.
Rahman M, Saha D, Paul G. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC [Internet]. 2021 Sep. 17 [cited 2025 Jan. 17];2021(3):137-69. Available from: https://er.ceres.rub.de/index.php/ToSC/article/view/9177