Zhang, J., Wang, H., & Tang, D. (2024). Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY. IACR Transactions on Symmetric Cryptology, 2024(2), 254-295. https://doi.org/10.46586/tosc.v2024.i2.254-295
Chicago Style (17th ed.) CitationZhang, Jianing, Haoyang Wang, and Deng Tang. "Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY." IACR Transactions on Symmetric Cryptology 2024, no. 2 (2024): 254-295. https://doi.org/10.46586/tosc.v2024.i2.254-295.
MLA (9th ed.) CitationZhang, Jianing, et al. "Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY." IACR Transactions on Symmetric Cryptology, vol. 2024, no. 2, 2024, pp. 254-295, https://doi.org/10.46586/tosc.v2024.i2.254-295.