Skip to main content

Table 1 The value of the two different ways on the number of recipients \(2^\theta\) and the size of the hash table \(\gamma\)

From: Generic attacks on small-state stream cipher constructions in the multi-user setting

Various

Limit \(2^{\lambda }\)-bit keystream

per key

Limit \(2^{\lambda }\)-bit keystream

per pair of (keyIV)

\(\theta\)

\(max(0,(n-2 \cdot {\lambda }))\)

\(max(0,(n-2 \cdot {\lambda } \cdot \ell _{IV}))\)

\(\gamma\)

\(min(2^{\lambda },2^{n/2})\)

\(min(2^{\lambda } \cdot \ell _{IV}, 2^{n/2})\)