Fig. 3From: Generic attacks on small-state stream cipher constructions in the multi-user settingLizard-like small-state stream ciphersBack to article page