Private Information Retrieval and Privacy-preserving Data Mining

Differential Privacy

Secure Multiparty Computation of Approximations

Efficiency of Secure Multiparty Protocols

Homomorphic Encryption

Foundational Results on Zero Knowledge

Foundational Results on Oblivious Transfer

Cryptography with Imperfect Randomness and Leakage-Resilient Cryptography

Other Notions of Security