MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Secure multi-party computationPrivate set intersectionKey exchangeSupersingular isogeny key exchangeIpsecThree-pass protocolElgamal encryptionPre-shared keyCryptographic protocolComputational trustAuthentication protocolPairing-based cryptographyCryptosystemKey encapsulation mechanismHybrid cryptosystemTrusted third partyHomomorphic secret sharingHomomorphic encryptionIntegrated encryption schemeMutual authenticationThreshold cryptosystemCurve25519Interactive proof systemIndistinguishability obfuscationProxy re-encryptionAuthenticated encryptionShared secretQuantum key distributionTrust boundaryDual ec drbgCircuit switchingDatagram transport layer securitySignal protocolCipherSignaling protocolChaffing and winnowingHmacCryptographic key typesBitmessageChacha20-poly1305Forward secrecyCommitment schemeTls-pskDigital signature forgeryProof of workGarlic routingCryptographyError correction codeGalois/counter modeCbc-macTransmission securityElgamal signature schemeError detection and correctionCommunication protocolDining cryptographers problemCiphertextKey derivation functionBlock cipher mode of operationPrivate information retrievalCodeKeystreamCipher suiteOpensslPost-quantum cryptographyPublic key certificateOff-the-record messagingCryptographic hash functionDatabase encryptionNeural cryptographyConvolutional codeAnonymous p2pMeet-in-the-middle attackSchnorr signatureSecure channelHardware-based encryptionTransposition cipherHadamard codeKey signatureTransport layer securityCryptographic primitiveClient certificateSymmetric-key algorithmPassword crackingCompiler-compilerDynamic circuit networkTwo generals' problemEnd-to-end encryptionEigentrustBlind signatureCode signingTunneling protocolKey distributionDeniable encryptionStation-to-station protocolFormal equivalence checkingSmart contractPaillier cryptosystemSecure copy protocolDisk encryptionTrademark