The Boomerang Attack on ChaCha Stream Cipher Permutation | IEEE Conference Publication | IEEE Xplore