MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
IntegrityDigital signature forgeryHmacThree-pass protocolCommunications securityError detection and correctionIdentity assuranceForward secrecyZero-knowledge proofCryptographic protocolChecksumError correction codeCryptographyData maskingData integrityMutual authenticationReferential integrityNetwork transparencyData validationInformation theoryCryptographic hash functionPostal address verificationOne-time padDerived unique key per transactionSecurity levelSemantic securityStrong cryptographyTokenizationTransactionFormal verificationDeniable encryptionCodeMalleabilityRekeyingImmutable objectPost-quantum cryptographyData communicationLength extension attackKerckhoffs's principleInformation-theoretic securityPadding oracle attackTraffic analysisProxy re-encryptionKeystreamFormat-preserving encryptionBlock cipherDeterministic encryptionAcidTake-grant protection modelCommunication protocolData sanitizationTrust boundaryLow-density parity-check codeSpoofing attackPre-shared keySignaling protocolTrusted third partyCipherTransposition cipherMultiple encryptionCertificate revocation listKey exchangePseudorandom permutationInitialization vectorRandom number generator attackBit error rateRam paritySupersingular isogeny key exchangeCoding theoryKey signatureProof of workAutomatic repeat requestProvenanceHash functionLocal differential privacyAudit trailBlind signaturePersistent data structureAtomic authorizationFunctional encryptionModel checkingHomomorphic secret sharingKey derivation functionRound-trip delayInteractive proof systemDigital dataTrust anchorEncapsulationInformation hidingAlgorithmic randomnessElgamal encryptionSaltData processing inequalityPrefix codeProtection ringKey-agreement protocolEvidentialitySelf-synchronizing codeHadamard codeCover