Here is a list of all modules:
[detail level 12]
 Block CiphersBlock ciphers are a n-bit permutation for some small n, typically 64 or 128 bits. It is a cryptographic primitive used to generate higher level operations such as authenticated encryption
 AlgorithmsAlgorithms are meant to provide encryption interface similar to STL algorithms' one
 Block Cipher Modes
 Entropy Sources
 Hash Functions & ChecksumsHash functions are one-way functions, which map data of arbitrary size to a fixed output length. Most of the hash functions in crypto3 are designed to be cryptographically secure, which means that it is computationally infeasible to create a collision (finding two inputs with the same hash) or preimages (given a hash output, generating an arbitrary input with the same hash). But note that not all such hash functions meet their goals, in particular MD4 and MD5 are trivially broken. However they are still included due to their wide adoption in various protocols
 AlgorithmsAlgorithms are meant to provide hashing interface similar to STL algorithms' one
 Key Derivation FunctionsKey derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function. KDFs can be used to stretch keys into longer keys or to obtain keys of a required format, such as converting a group element that is the result of a Diffie–Hellman key exchange into a symmetric key for use with AES. Keyed cryptographic hash functions are popular examples of pseudorandom functions used for key derivation
 Message Authentication CodesA message authentication code (MAC) can be used to verify the integrity of data and the authenticity of a message