- Overview
- Key Schedule
- 1. Intro to PRESENT
- 2. Hello World
- 3. Brute Force
- 4. Meet-in-the-middle
- 5. Slide attack
- 6. More slide attacks
- Differential Cryptanalysis
- 7. Intro to differential cryptanalysis
- 8. The S-Box
- 9. Differentials
- 10. Differential trails
- 11. Finding trails
- 12. Key recovery
- Linear Cryptanalysis
- 13. Intro to linear cryptanalysis
- 14. Linear Approximation Table (LAT)
- 15. Linear trails
- 16. Approximations in practice
- 17. Linear hull
- Supplementary
- 18. Intro to MILP
19. Correlation in depth