MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Hash-based cryptographyBcryptSha-2SkeinMerkle signature schemeSchnorr signatureCryptographic key typesCryptographic hash functionSimdMceliece cryptosystemBlowfishHash tableHash listCryptosystemGostPublic key fingerprintHmacThreefishTigerCoppersmith's attackBalloon hashingPaillier cryptosystemOne-key macBlock cipherFortunaRainbow tableKey sizeKey wrapSymmetric-key algorithmLamport signatureTwofishDynamic perfect hashingMacguffinElgamal signature schemeMdc-2Hash joinSiphashCurve25519Perceptual hashingKey derivation functionCram-md5Cbc-macQuadratic probingHash array mapped trieHybrid cryptosystemHash treeShamir's secret sharingConcurrent hash tableBlock cipher mode of operationKey signatureElgamal encryptionPkcs 12Derived unique key per transactionDouble hashingHomomorphic secret sharingHkdfAes implementationsData encryption standardQuantum key distributionRoot certificateChacha20-poly1305Tabulation hashingKey encapsulation mechanismKeystreamFletcher's checksumSteane codeCamelliaPassword hashing competitionCounting sortKey distribution centerJava collections frameworkRipemdFibonacci heapFluhrer, mantin and shamir attackDual ec drbgKeeloqEddsaNsa suite b cryptographyScreamSecurity levelC string handlingJava keystoreIntel sha extensionsHamming codeS-boxPkcs 1Golomb codingCiphertextChordDbcsBase64Homomorphic encryptionSaltIndex mappingSearch algorithmLocality-sensitive hashingPublic key certificateNist hash function competitionBit arrayScrypt