... size, respectively. The size of table R depends on the desiredbitlength L of the keystream — each 1K byte of keystream requires 16 bytes of R. Handbook of Applied Cryptography by A. Menezes, ... bits of k. If the bitlengths of k1and k are l1and l, respectively,the attack demonstrates that the security level of the generator is 2l1+2l−l1, rather than 2l. Handbook of Applied Cryptography ... order up to the nonlinear order of f.c1997 by CRC Press, Inc. — See accompanying notice at front of chapter.This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P....