The following publications are possibly variants of this publication:
- Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key ScheduleBoxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. iacr, 2019:714, 2019. [doi]
- Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinnyLingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu. iacr, 2021:656, 2021. [doi]
- Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinnyLingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu. tosc, 2021(2):249-291, 2021. [doi]
- MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBSLele Chen, Gaoli Wang, Guoyan Zhang. cj, 62(12):1805-1821, 2019. [doi]