Message Authentication Codes.- Signatures.- Cryptography Based Upon Physical Assumptions.- Multi-Party Computation.- Cryptographic Primitives.- Analysis, Cryptanalysis and Passwords.- Leakage-Resilient Cryptography.- Two-Party Computation.- Hash Functions.