In Mitsuru Matsui, editor, Fast Software Encryption: 8th International Workshop, Lecture Notes in Computer Science, Yokohama, Japan, April 2001. Springer-Verlag. To appear.
Abstract. We show two methods
    of distinguishing the LEVIATHAN stream cipher from a random stream
    using 
 bytes of output and
    proportional effort; both arise from compression within the
    cipher. The first models the cipher as two random functions in
    sequence, and shows that the probability of a collision in 64-bit
    output blocks is doubled as a result; the second shows artifacts
    where the same inputs are presented to the key-dependent S-boxes
    in the final stage of the cipher for two successive outputs. Both
    distinguishers are demonstrated with experiments on a reduced
    variant of the cipher.
LEVIATHAN is a new stream cipher developed by David McGrew and Scott Fluhrer of Cisco for the NESSIE project, which uses an innovative structure based on a forest of binary trees to map a key onto a stream of 2^48 32-bit word outputs, in such a way that it is efficient to seek in the stream, or to produce many consecutive outputs. This makes it especially well suited to IPSec encryption.
The NESSIE submission states "Cisco has a patent pending related to LEVIATHAN."
Amusingly, Scott Fluhrer presented the first cryptanalysis of my block cipher, Mercy, at the same conference that this paper was presented.