1. Overview
  2. Key Schedule
  3. Intro to PRESENT
  4. Hello World
  5. Brute Force
  6. Meet-in-the-middle
  7. Slide attack
  8. More slide attacks
  9. Differential Cryptanalysis
  10. Intro to differential cryptanalysis
  11. The S-Box
  12. Differentials
  13. Differential trails
  14. Finding trails
  15. Key recovery
  16. Linear Cryptanalysis
  17. Intro to linear cryptanalysis
  18. Linear Approximation Table (LAT)
  19. Linear trails
  20. Approximations in practice
  21. Linear hull
  22. Supplementary
  23. Intro to MILP
  24. Correlation in depth