“…what we call the impossible boomerang attack, combines the boomerang attack with impossible differential cryptanalysis. Possible combinations of cryptanalytic techniques have been proposed in the past, and have proved effective [8,9,34,40,53,67]; a good example is provided by differential-linear cryptanalysis [7,67].…”