MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Key derivation functionPassword crackingHmacSymmetric-key algorithmCurve25519Dual ec drbgKey stretchingElgamal encryptionBlock cipher mode of operationKey encapsulation mechanismCorrelation attackCryptosystemCryptographic key typesBcryptDerived unique key per transactionSha-2Cryptographic primitiveDouble hashingKey wrapCbc-macSecurity levelTls-pskSecure multi-party computationHybrid cryptosystemPost-quantum cryptographyKey sizeCipherAuthenticated encryptionKey exchangeHash-based cryptographyPkcs 11Block cipherIntegrated encryption schemeAdiantumMdc-2Cryptographic hash functionKey scheduleDigital signature algorithmPairing-based cryptographyPermutation boxDynamic perfect hashingEddsaIpsecNeural cryptographyHomomorphic secret sharingBalloon hashingMerkle signature schemeKeystreamCryptographic protocolChacha20-poly1305Forward secrecyPrivate set intersectionConvolutional codeTwofishTreapPaillier cryptosystemPadding oracle attackLength extension attackTriple desHomomorphic encryptionElgamal signature schemeCiphertextSupersingular isogeny key exchangeDisk encryption softwareFilesystem-level encryptionDictionary attackSaltHashcashCcm modeGalois/counter modeIndistinguishability obfuscationKey distribution centerRsa securidPseudorandom number generatorHkdfInitialization vectorCache replacement policiesCurve448Ciphertext stealingStrong cryptographyAnalysis of parallel algorithmsPkcs 1Computational trustDatabase encryptionCoppersmith's attackDisk encryptionCram-md5Public key certificateHardware-based encryptionGoogle authenticatorHash tableProof of workSearchable symmetric encryptionAnalysis of algorithmsSiphashProtection ringAdvanced encryption standardMeet-in-the-middle attackDouble ratchet algorithmFluhrer, mantin and shamir attack