Authentication and Key Establishment.- Signatures with Advanced Properties.- DoS Attacks and Network Anomaly Detection.- Deterministic and Functional Encryption.- Computing on Encrypted Data.- Non-Interactive Proofs and PRFs.- Symmetric Ciphers.- Cryptography in Software.- Security for Human Use.