Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff

1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, China 2 School of Cyber Science and Technology, Shandong University, Qingdao 266237, China Institute for Advanced Study, Tsinghua University, China 4 Department of Computer Science and Technology, Tsinghua University, China FHNW, Switzerland Email: Corresponding author: ktjia@tsinghua.edu.cn