“…In addition, we extended the technique, allowing it to handle more complicated update and output rules, and used it to mount a distinguishing attack on the cipher mv3 [9], requiring less than 2 82 words of output. 10 The values of the 22 optimal quadruples (i 1 , i 1 + l, i 2 , i 2 + l) are: (0, 1, 14, 15), (0, 1, 18, 19), (1,2,15,16), (3,4,21,22), (4,5,18,19), (4,5,22,23), (5,6,19,20), (5,6,23,24), (6,7,20,21), (6,7,24,25), (7,8,21,22), (7,8,25,26), (8,9,22,23), (8,9,26,27), (9,10,…”