From: Generic attacks on small-state stream cipher constructions in the multi-user setting
Various | Limit \(2^{\lambda }\)-bit keystream per key | Limit \(2^{\lambda }\)-bit keystream per pair of (key, IV) |
---|---|---|
\(\theta\) | \(max(0,(n-2 \cdot {\lambda }))\) | \(max(0,(n-2 \cdot {\lambda } \cdot \ell _{IV}))\) |
\(\gamma\) | \(min(2^{\lambda },2^{n/2})\) | \(min(2^{\lambda } \cdot \ell _{IV}, 2^{n/2})\) |