- Symmetric
- Asymmetric
- RSA - factorisation
- ECC - DLP
- Pairing-based
- NTRU - lattice-based
- XTR - DLP
- Authenticated encryption
- Homomorphic encryption
- MPC
- Lightweight Cryptography - LWC
- Functional Encryption

- AES - Wikipedia
- NIST -
*AES project, FIPS standards, ...*Among many other things, NIST was responsible for: - FIPS 197: AES
- NIST -
*AES candidates* - NIST -
*AES discussion*

- RFC 3766 Determining Strengths For Public Keys Used For Exchanging Symmetric Keys

- Weil-pairing - Wikipedia
- IETF on pairing-friendly curves - several applications using pairing-based cryptography are standardized and implemented.
- IETF issues RFCs for pairing-based cryptography such as identity-based cryptography, certificateless signatures, Sakai-Kasahara Key Encryption (SAKKE), and Identity-Based Authenticated Key Exchange (IBAKE), SAKKE is applied to Multimedia Internet KEYing (MIKEY) and used in 3GPP
- Pairing-based key agreement protocols are standardized in ISO/IEC 11770-3:2015, which contains a key agreement scheme by Joux, identity-based key agreement schemes by Smart-Chen-Cheng and by Fujioka-Suzuki-Ustaoglu.
- MIRACL implements M-Pin, a multi-factor authentication protocol. M-Pin protocol includes a kind of zero-knowledge proof, where pairing is used for its construction.
- Trusted Computing Group (TCG) specifies ECDAA (Elliptic Curve Direct Anonymous Attestation) in the specification of Trusted Platform Module (TPM). ECDAA is a protocol for proving the attestation held by a TPM to a verifier without revealing the attestation held by that TPM. Pairing is used for constructing ECDAA.
- FIDO Alliance and W3C also published ECDAA algorithm similar to TCG.
- Zcash implements their zero-knowledge proof algorithm named zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge), used for protecting privacy of transactions of Zcash. T hey use pairing for constructing zk-SNARKS.
- Cloudflare introduced Geo Key Manager to restrict distribution of customers' private keys to the subset of their data centers. To achieve this functionality, attribute-based encryption is used based on pairing.
- DFINITY utilized threshold signature scheme to generate the decentralized random beacons. They constructed a BLS signature-based scheme, which is based on pairings.
- In Ethereum 2.0, project Prysm applies signature aggregation for scalability benefits by leveraging DFINITY's random-beacon chain playground. Their codes are published on GitHub.

- NTRU - Wikipedia
- 1996 by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman
- 2016, Daniel Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal released NTRU Prime

- Authenticated encryption - Wikipedia
- Authenticated encryption - RFC 5116
- AEGIS
*Hongjun-Preneel*- 2013

- Homomorphic encryption - Wikipedia
- Homomorphic encryption consortium - a consortium of industry, government and academia to standardise homomorphic encryption

- Paillier - Wikipedia
- Invented by and named after Pascal Paillier in 1999
- Is a probabilistic asymmetric algorithm for public key cryptography
- Based on the problem of computing n-th residue classes, i.e. the decisional composite residuosity assumption
- Is an additive homomorphic cryptosystem; this means that, given only the public key and the encryption
of m
_{1}and m_{2}, one can compute the encryption of m_{1}+ m_{2}.

- MPC - Wikipedia
- Nigel Smart
- UnboundNigel Smart and Yehuda Lindell
- Rosario Gennaro
- Steven Goldfeder
- Gennaro and Goldfeder Threshold ECDSA

- NIST
- Nigel Smart
- UnboundNigel Smart and Yehuda Lindell
- Rosario Gennaro
- Steven Goldfeder
- Gennaro and Goldfeder Threshold ECDSA

- FE
*- Wikipedia*