Fig. 2From: Generic attacks on small-state stream cipher constructions in the multi-user settingThe general construction of small-state stream ciphersBack to article page