“…After clocking, an output bit is generated from the values of R 1 , R 2 , and R 3 by XORing their most significant bits, as shown in Equation (Biham & Dunkelman, 2000), KellerSeitz's attack (Keller & Seitz, 2001) and Gendrullis-Novotny-Rupp's attack (also known as the modified KellerSeitz attack) (Gendrullis, Novotny, & Rupp, 2008). All these attacks assume that consecutive 64 bits of the keystream are known.…”