Stream cipher attacks

Methods to break a stream cipher From Wikipedia, the free encyclopedia