MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
CryptosystemSecurity levelInformation-theoretic securityCiphertext-only attackShared secretCiphertextSecure channelCodeDisk encryptionBlock cipher mode of operationStrong cryptographyIntegrated encryption schemePlaintextDeniable encryptionOne-time padTransposition cipherPassword crackingCipherSearchable symmetric encryptionPost-quantum cryptographyEnd-to-end encryptionDatabase encryptionHybrid cryptosystemKey encapsulation mechanismTransmission securityEncryption softwareHomomorphic secret sharingHomomorphic encryptionPrivate information retrievalCryptographic key typesSymmetric-key algorithmKeystreamPurely functional data structureBlock cipherCiphertext stealingFormat-preserving encryptionQuantum key distributionPadding oracle attackDerived unique key per transactionRandom number generator attackData maskingTokenizationChaffing and winnowingKey sizeTiny encryption algorithmMessage authenticationCbc-macEmail encryptionLow-density parity-check codeCryptographic protocolKey derivation functionSecure codingForward secrecyKey wrapElgamal encryptionCryptographyChosen-plaintext attackData encryption standardNsa suite a cryptographyClient-side encryptionSecurity through obscurityMessage authentication codeKnown-plaintext attackLamport signatureCaesar cipherComputational trustBlind signatureLossless compressionHmacData compressionCurve25519Classical cipherSystematic codeAuthenticated encryptionCipher suiteElgamal signature schemeMemory-hard functionCryptographic primitiveIn-place algorithmThree-pass protocolSecure by designAutokey cipherSupersingular isogeny key exchangeHardware-based encryptionCommunications securityLength extension attackType safetyRotor machineKey distribution centerDigital signature forgeryHash-based cryptographyKey signaturePrefix codeCryptanalysisImmutable objectSecure shellRekeyingProxy re-encryptionSecurity engineeringSelf-synchronizing code