“…, partially decrypt R l 1 and R l 2 with K 45, [27,32] and K 45, [27,32] ⊕ ρ 6 6 , respectively, under the two possibilities 0 and 1 of the carry bit occurred in bit (26) of the left add modulo operation to get the corresponding values for the most significant 6 bits of the left and right halves just before Round 45; we denote them by U s,l 1 and U s,l 2 , respectively, and partially decrypt R * l 1 and R * l 2 with K 45, [27,32] and K 45, [27,32] ⊕ ρ 6 6 , respectively, under the two possibilities 0 and 1 of the carry bit occurred in bit (26) …”