MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Zero-knowledge proofDerived unique key per transactionKey-agreement protocolKey derivation functionCipherCryptographic protocolHomomorphic secret sharingSecure multi-party computationSecret sharingCodeForward secrecyHmacPre-shared keyKerckhoffs's principleOne-time padBlind signatureCryptographic hash functionFunctional encryptionHybrid cryptosystemKey exchangeBlock cipherSecurity levelProof of workProxy re-encryptionAxiom schemeMerkle signature schemeNothing-up-my-sleeve numberDigital signature forgeryKey wrapIntegrityKeystreamThree-pass protocolCode wordCryptographyPrivate set intersectionElgamal encryptionHash functionEncryptionProof of knowledgePairing-based cryptographyGarbled circuitAxiom schemaRandom number generator attackCertificateChosen-ciphertext attackConditional proofDifferential privacyTransposition cipherProbabilistically checkable proofKey signaturePseudorandom number generatorMathematical constantFormal verificationSaltPost-quantum cryptographyMask generation functionElliptic-curve cryptographySupersingular isogeny key exchangeCommitment deviceSteganographyModel of computationCryptanalysisSwitch statementPseudorandom permutationInitialization vectorInformation hidingComposite data typeSchemaChecksumAffine cipherQuantum circuitProof systemPseudorandom noiseDeclarationDeterministic encryptionInformation-theoretic securityTrapdoor functionDual ec drbgOne-way compression functionSymmetric-key algorithmPseudorandomnessFunction problemInteractive proof systemPermutation boxTransactionTrust anchorConsistency modelRekeyingSignaling protocolType systemSubstitution cipherProof by contradictionRabin cryptosystemMathematical proofPepperDeniable encryptionSemantic securityPseudorandom binary sequenceRecursive data typeGroup scheme