Latticed-based schemes.- Zero-knowledge.- Pseudorandom functions.- Multi-party computation.- Separations.- Protocols.- Round complexity.- Commitments.- Lattices.- Leakage.- In differentiability.- Obfuscation.- Automated analysis, functional encryption, and non-malleable codes.