The design and analysis of ciphers, public-key cryptography, digital signature, user and data authentication, nonrepudiation, data integrity, public-key infrastructure, secret sharing, key management, cryptographic protocols, systems security, network security, and Web security.