The first author cowrote a related textbook in 1993, and he's among the top researchers on this topic; the second author has developed cryptanalytic techniques related to the subject of the book.
Introduction .- Differential Cryptanalysis .- Linear Cryptanalysis .- More Cryptanalytic Methods .- Boomerangs and Rectangles .- Other Combined Attacks .- Appendix .- References.