+The differential can be converted into a key-recovery attack against $n$
+rounds fairly easily, by obtaining the ciphertext for an appropriate
+plaintext pair and guessing the $n - 2$ round keys, testing the guesses by
+working backwards and finding out whether the expected output difference is
+visible. The attack requires a pair of chosen plaintexts, and
+$O(2^{96(n - 2)})$ work. It is only more efficient than exhaustive search
+when the key is longer than $96(n - 2)$ bits.
+
+This attack can be improved. Consider a 3-round variant of Storin, where the
+objective is to discover the postwhitening keys. The postwhitening stage can
+be commuted with the linear transform simply by applying the transform to the
+postwhitening keys. We do this, and guess the least significant 12 bits of
+each of the (transformed) postwhitening key words. Working through the
+matrix multiplication mod $2^{12}$ rather than mod $2^{24}$ then gives us the
+12 least significant bits of the state words on input to the matrix. Further
+key bits can then be guessed and tested, four at a time, to recover the
+remaining postwhitening key bits, by ensuring that the differences in the
+more significant bits of the third round matrix input obey the characteristic
+described above. This requires only about $2^{48}$ work, and may be extended
+to further rounds by exhaustively searching for the extra round keys.
+
+This attack can break Storin with $n$ rounds ($n \ge 3$) with minimal chosen
+plaintext and $O(2^{48 + 96(n - 3)})$ work. This is the best attack known
+against Storin.
+
+\subsubsection{Other attacks}
+