Secure Cloud Storage and Computing.- Digital Signature and Authentication.- Authenticated Encryption and Key Exchange.- Security Models.- Lattice and Post-Quantum Cryptography.- Public Key Encryption and Signcryption.- Proxy Re-encryption and Functional Encryption.- Protocols.