Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Hosein HadipourPatrick DerbezMaria EichlsederPublished in: IACR Cryptol. ePrint Arch. (2024)