Fig. 1From: Generic attacks on small-state stream cipher constructions in the multi-user settingThe general construction of stream ciphersBack to article page