MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
CipherSecurity levelSignaling protocolCodeKey derivation functionHmacAlgorithmCryptographyThree-pass protocolBlock cipherFunctional encryptionLattice-based cryptographyCommunication protocolTake-grant protection modelKey exchangeStrong cryptographyPairing-based cryptographyFormal verificationInitialization vectorKey-agreement protocolSpecification languageAccess control matrixKey wrapCryptographic hash functionFormal specificationIntegrityType systemModel of computationKeystreamHybrid cryptosystemHash functionForward secrecySecure multi-party computationStructSymmetric-key algorithmDerived unique key per transactionCommunications securityEncapsulationProtection ringError correction codePost-quantum cryptographySupersingular isogeny key exchangeProxy re-encryptionMessage authenticationPrivate set intersectionChecksumComposite data typeOne-time padOperational semanticsPseudorandom number generatorElgamal encryptionFunctional requirementHomomorphic secret sharingKey sizeSyntaxAlgorithmic paradigmCircuitQuantum circuitProgramming language theoryAlgorithmic information theoryAnalysis of algorithmsSequential algorithmPhysical symbol systemInformation processorKey signatureMultiple encryptionFunction modelEventProof of workZero-knowledge proofKerckhoffs's principleCommitment schemeDifferential cryptanalysisPseudorandom generatorNeural cryptographyElliptic-curve cryptographyError detection and correctionLockGarbled circuitLattice-based access controlComputable functionClosureTheory of computationTrust boundaryData typeAnalysis of parallel algorithmsMutual authenticationMultilevel securityNaming conventionSoftware design patternThreatClassNetwork transparencyFormalismPermutation boxPredefined functionSearch algorithmAccess controlProof systemAction language