Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | IEEE Journals & Magazine | IEEE Xplore