1.
Rahman M, Saha D, Paul G. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ToSC [Internet]. 2021 Sep. 17 [cited 2025 Feb. 5];2021(3):137-69. Available from: https://tches.iacr.org/index.php/ToSC/article/view/9177