MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
HmacMessage authenticationKey signatureSpoofing attackBlind signaturePreimage attackLength extension attackIntegrityDeniable encryptionKey derivation functionKeystreamMalleabilityKey exchangeFormal verificationCryptographyPost-quantum cryptographyCryptographic hash functionPadding oracle attackDerived unique key per transactionMerkle signature schemePseudorandom permutationZero-knowledge proofForward secrecyKey signing partyMutual authenticationProxy re-encryptionIdentity assurancePre-shared keyCipherFunctional encryptionPairing-based cryptographyProof of workCollision attackCertificate revocation listChecksumTcp sequence prediction attackSupersingular isogeny key exchangeTransposition cipherOne-time padHybrid cryptosystemPhishingElgamal encryptionTiming attackRing signatureKey-agreement protocolRekeyingCodeMeet-in-the-middle attackIndistinguishability obfuscationEddsaHash functionRelated-key attackPseudorandom generatorBlock cipherSteganographyThree-pass protocolReplay attackError detection and correctionCommitment schemePseudorandom binary sequenceMitmEqual signProof by contradictionCryptographic protocolCorrelation attackSplit keySubstitution cipherData maskingHomomorphic secret sharingDeterministic encryptionError correction codeEncryptionNothing-up-my-sleeve numberGarbled circuitTrusted third partyFormat-preserving encryptionPersonal identifierPseudorandom number generatorSymmetric-key algorithmRsa problemConstructive proofChaotic cryptologyCiphertext-only attackSignatureCiphertext stealingThreatStrong cryptographyKerckhoffs's principleDual ec drbgSelf-synchronizing codeDigital dataSemantic securityMultiple encryptionTransactionInformation theoryHolographPrivate set intersectionPseudorandomnessBit error rateAtomic authorization