APA (7th ed.) Citation

Zhang, J., Wang, H., & Tang, D. (2024). Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY. IACR Transactions on Symmetric Cryptology, 2024(2), 254-295. https://doi.org/10.46586/tosc.v2024.i2.254-295

Chicago Style (17th ed.) Citation

Zhang, Jianing, Haoyang Wang, and Deng Tang. "Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY." IACR Transactions on Symmetric Cryptology 2024, no. 2 (2024): 254-295. https://doi.org/10.46586/tosc.v2024.i2.254-295.

MLA (9th ed.) Citation

Zhang, Jianing, et al. "Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY." IACR Transactions on Symmetric Cryptology, vol. 2024, no. 2, 2024, pp. 254-295, https://doi.org/10.46586/tosc.v2024.i2.254-295.

Warning: These citations may not always be 100% accurate.