Database cryptography.
This covers a lot of ground, but mostly culminates in guidance for application-layer client-side encryption when working with databases, encrypted search, etc.
https://soatok.blog/2023/03/01/database-cryptography-fur-the-rest-of-us/
Password cryptography.
Password hashing, key stretching, KDFs, and bears (oh my!)
https://soatok.blog/2022/12/29/what-we-do-in-the-etc-shadow-cryptography-with-passwords/