* Authenticated encryption schemes: (GCM, CCM, EAX)
* High speed stream ciphers: ChaCha (ChaCha8/12/20), Panama
* AES and AES candidates: AES (Rijndael), RC6, MARS, Twofish, Serpent
* Other block ciphers: IDEA, DES, Camellia, SEED, RC5, Blowfish,
* Block cipher modes of operation: ECB, CBC, CBC (CTS), CFB, OFB
* Message authentication codes: VMAC, HMAC, GMAC, CMAC, CBC-MAC, DMAC
* Hash functions: BLAKE2 (BLAKE2b, BLAKE2s), SHA-1, SHA-2, SHA-3
* Public-key cryptography: RSA, DSA, ElGamal, Nyberg-Rueppel (NR)
* Padding schemes for public-key systems: PKCS#1 v2.0, OAEP, PSS,
* Key agreement schemes: Diffie-Hellman (DH), Unified Diffie-Hellman (DH2),
* Elliptic curve cryptography: ECDSA, ECNR, ECIES, ECDH, ECMQV
* Insecure or obsolescent algorithms: MD2, MD4, MD5
* And many more other algorithms.