MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Advanced encryption standardPost-quantum cryptographyCurve25519Dual ec drbgElgamal encryptionQuantum key distributionSupersingular isogeny key exchangeEddsaNeural cryptographySecure multi-party computationNewhopeKey derivation functionFeistel cipherPaillier cryptosystemCurve448Key encapsulation mechanismRijndael s-boxInitialization vectorCryptosystemIntegrated encryption schemeHmacThreshold cryptosystemDerived unique key per transactionCorrelation attackEquihashBlock cipher mode of operationChacha20-poly1305Tiny encryption algorithmSuperdense codingInformation-theoretic securitySignal protocolAdiantumHybrid cryptosystemCryptographic key typesSha-2Cbc-macTriple desHomomorphic secret sharingKyberLattice-based access controlQuantum error correctionHomomorphic encryptionForward secrecyTls-pskDigital signature algorithmCryptographic protocolSchnorr signatureElgamal signature schemeIpsecMerkle signature schemeAnubisKey wrapSpin qubit quantum computerThreefishTransmission securityPrivate set intersectionDigital signature standardPseudorandom number generatorThree-pass protocolControlled not gateTls accelerationGalois/counter modeQuantum supremacyCipherOne-time padCryptonotePrivate biometricsPairing-based cryptographyNetwork security servicesGostSimdQuantum programmingShannon codingPhase qubitLamport signatureFluhrer, mantin and shamir attackGarbled circuitSymmetric-key algorithmTransposition cipherDouble ratchet algorithmDatagram transport layer securityLow-density parity-check codeSearchable symmetric encryptionCryptocurrencyAes implementationsTransport layer securityPrivate information retrievalNist hash function competitionPassword crackingBcryptIso/iec 9797-1KeystreamData encryption standardSecurity levelMeet-in-the-middle attackResource public key infrastructureTrusted platform modulePbkdf2Rotor machineSemantic security