Public key cryptanalysis.- Identity-based encryption.- Key derivation and quantum computing.- Secret-key analysis and implementations.- Obfuscation and multi linear maps.- Authenticated encryption.- Symmetric encryption.- Multi-party encryption.- Side-channel attacks.- Signatures and public-key encryption.- Functional encryption.- Foundations.- Multi-party computation.