Operating modes.- Stream-cipher cryptanalysis.- Components.- Side-channels and implementations.- Automated tools for cryptanalysis.- Designs.- Block-cipher cryptanalysis.- Foundations and theory.- Authenticated-encryption and hash function cryptanalysis.