The following publications are possibly variants of this publication:
- Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinnyLingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu. tosc, 2021(2):249-291, 2021. [doi]
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTBoxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. dcc, 88(6):1103-1126, 2020. [doi]
- Arnetminer: expertise oriented search using social networksJuanzi Li, Jie Tang, Jing Zhang, Qiong Luo, Yunhao Liu, MingCai Hong. fcsc, 2(1):94-105, 2008. [doi]
- Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNYLing Song 0001, Qinggan Fu, Qianqian Yang 0003, Yin Lv, Lei Hu. dcc, 93(7):2611-2655, July 2025. [doi]
- Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNYLing Song 0001, Qinggan Fu, Qianqian Yang 0003, Yin Lv, Lei Hu. iacr, 2024:1908, 2024. [doi]