MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Shared secretDisk encryptionCryptosystemSecurity through obscurityCryptographic key typesComputational trustKey distributionPlaintextDatabase encryptionEncryption softwareData maskingKey encapsulation mechanismTransmission securitySoftware development securityStrong cryptographyAuthenticated encryptionInformation-theoretic securityQuantum key distributionOne-time padEmail encryptionNsa suite a cryptographySemantic securitySecure channelPasswordSecurity levelEnd-to-end encryptionPassword crackingCiphertextPre-shared keyCommunications securityCodeHomomorphic encryptionPrivate information retrievalHardware-based encryptionBlock cipher mode of operationTrust anchorNsa cryptographySaltEntropyBlack boxDeniable encryptionClient-side encryptionDerived unique key per transactionLocal differential privacyForward secrecyPost-quantum cryptographyInformation securityProxy re-encryptionMessage authenticationCommitment schemeElectronic authenticationAuthorizationSecurity testingCiphertext-only attackSecurity engineeringDigital securityHomomorphic secret sharingIntegrated encryption schemeCryptographyKey sizeData securitySecure codingData breachKey signatureData encapsulationData-centric securityDark dataData center securityCryptographic primitiveCipherChain of trustPseudorandom binary sequenceCryptanalysisInformation rights managementSensitive but unclassifiedElgamal encryptionTls-pskSymmetric-key algorithmMultiple encryptionObfuscationHistory of bitcoinQuantum error correctionKey distribution centerNetwork transparencyCode nameKey exchangeEnigma machineKeystreamData encryption standardPublic key certificateOpen-source software securityContent formatCryptographic protocolInformation security managementInternet privacyTransposition cipherInformation assuranceSecurity controlsAuthentication protocolHybrid cryptosystem