Contents 1 Introduction: how to use this book Part I Cryptanalysis 2 The block cipher keeloq and algebraic attacks 3 The fixed-point attack 4 Iteratrd permutations 5 Stream ciphers Part II Linear systems mod 2 6 Some basic facts about linear algebra over GF (2) 7 The complexity of GF (2)-matrix operations 8 On the exponent of certain matrix operations 9 The method of fou…