Certainly! Here are some examples of popular cryptographic algorithms.1
References
1Chudasama AK. Cryptography and network security: Ensuring confidentiality and integrity in the digital age. Samvad E-Journal. 2023;1(2):8-14. https://www.rangmatipublication.com/journals/Volume%201%20Issue%202%20Apr%20-%20Jun,%202023/002%20Cryptography%20and%20Network%20Security%20-%20Ensuring%20Confidentiality%20and%20Integrity%20in%20the%20Digital%20Age%20[Dr.%20ASHISH%20KUMAR%20CHUDASAMA]%20008014.pdf