Revisiting Related-Key Boomerang attacks on AES using computer-aided tool

Date: