Cryptographic algorithms
C
E
S
- S-box
- SANDstorm hash
- Scrypt
- Scrypt proof of work
- Secp256k1
- Secret sharing using the Chinese remainder theorem
- SecureLog
- SHA-1
- SHA-2
- SHA-3
- Sha1sum
- SIMD (hash function)
- Six-State Protocol
- Smart contract
- SMASH (hash)
- Software taggant
- Spectral Hash
- Sponge function
- Streebog
- Substitution–permutation network
- Supersingular isogeny key exchange
- SWIFFT
- Symmetric-key algorithm