Certainly! Here are some examples of popular cryptographic algorithms.1
References
1Chudasama DAK. Cryptography and Network Security: Ensuring Confidentiality and Integrity in the Digital Age. Samvad E-Journal. 2023;1(2):8-14. https://www.rangmatipublication.com/journals/Volume%201%20Issue%202%20Apr%20-%20Jun,%202023/002%20Cryptography%20and%20Network%20Security%20-%20Ensuring%20Confidentiality%20and%20Integrity%20in%20the%20Digital%20Age%20%5BDr.%20ASHISH%20KUMAR%20CHUDASAMA%5D%20008014.pdf