MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Sha-2Mdc-2Pkcs 1BcryptGostSiphashCram-md5Hash-based cryptographyDigidocAdvanced encryption standardDual ec drbgStrongarmMerkle signature schemeTigerTurbo codeBlowfishAes implementationsElgamal encryptionCryptographic hash functionSimdCurve25519AkelarreMceliece cryptosystemPower7Sha-3CryptosystemFluhrer, mantin and shamir attackIntel sha extensionsTwofishSquareHmacDynamic perfect hashingDigital signature algorithmPbkdf2Block cipherCamelliaPaillier cryptosystemRsa securidMips architectureHamming codeSchnorr signatureCryptgenrandomJenkins hash functionMarsDigital signature standardCoppersmith's attackSymmetric-key algorithmNist hash function competitionRotor machineHashcashPower8Data encryption standardBlock cipher mode of operationElgamal signature schemeEddsaSerpentKey derivation functionRdramSecurity levelShmemGolomb codingS3 texture compressionNsa suite b cryptographyPresentGalois/counter modeHash tableCcm modeOne-key macOsi protocolsPowerpc 400RigelPseudorandom number generatorFortunaCbc-macSkeinSha-1Key scheduleMacguffinTabulation hashingAmd am29000Quadratic probingOuroborosBlock codeRijndael s-boxDec alphaDerived unique key per transactionIa-64Classical cipherDouble ratchet algorithmPower9Cryptographic primitivePassword hashing competitionArm architecture familyMotorola 68000 seriesLossless jpegPowerpc 7xxHash treeFinancial information exchangeSparcPassword cracking