Message authentication code
In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message and to provide integrity and authenticity assurances on the message. Integrity...
Poly1305-AES
Poly1305-AES is a cryptographic message authentication code (MAC) written by Daniel J. Bernstein. It can be used to verify the data integrity and the authenticity of a message.
Poly1305-AES comput...
Public domain software
Public domain software is software that has been placed in the public domain, in other words there is absolutely no ownership such as copyright, trademark, or patent. Unlike other classes of licenses,...
Public domain software - Wikipedia
WorldWideWeb
WorldWideWeb (later renamed to Nexus to avoid confusion between the software and the World Wide Web) is the first web browser and editor. When it was written, WorldWideWeb was the only way to view the...
WorldWideWeb - Wikipedia
PMAC (cryptography)
PMAC, which stands for Parallelizable MAC, is a message authentication code algorithm. It was created by Phillip Rogaway (patent pending).PMAC is a method of taking a block cipher and creating an eff...
Steel Bank Common Lisp
Steel Bank Common Lisp (SBCL) is a free Common Lisp implementation that features ahigh performance native compiler, Unicode support and threading.The name "Steel Bank Common Lisp" is a reference to Ca...
Steel Bank Common Lisp - Wikipedia
Hash-based message authentication code
In cryptography, a keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination w...
Hash-based message authentication code - Wikipedia
X-12-ARIMA
X-12-ARIMA is the U.S. Census Bureau's software package for seasonal adjustment. It can be used together with many statistical packages, such as Gretl or EViews which provides a graphical user interfa...
WorldVistA
WorldVistA is an open source implementation of the Veteran Administration's Electronic Health Record system intended for use in health care facilities outside the VA.
The US Veterans Administratio...
Galois/Counter Mode
Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance. GCM throughput rates for state of...
Galois/Counter Mode - Wikipedia
VistA
The Veterans Health Information Systems and Technology Architecture (VistA) is an enterprise-wide information system built around an Electronic Health Record (EHR), used throughout the United States D...
VistA - Wikipedia
VistA Web
VistAWeb is a portal accessible through CPRS (Computerized Patient Recordkeeping System), the graphical user interface forthe Veterans Health Information Systems and Technology Architecture (VistA), t...
VEST
VEST (Very Efficient Substitution Transposition) ciphers are a set of families of general-purpose hardware-dedicated ciphers that support single pass authenticated encryption and can operate as collis...
VEST - Wikipedia
VistA imaging
VistA Imaging is an FDA-listed Image Management system used in the Department of Veterans Affairs healthcare facilities nationwide. It is one of the most widely used image management systems in routin...
VistA imaging - Wikipedia
CBC-MAC
In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a block cipher. The message is encrypted with some bl...
CBC-MAC - Wikipedia
CMAC
In cryptography, CMAC (Cipher-based Message Authentication Code) is a block cipher-based message authentication code algorithm. It may be used to provide assurance of the authenticity and, hence, the ...
CMAC - Wikipedia
UMAC
In cryptography, a message authentication code based on universal hashing, or UMAC, is a type of message authentication code (MAC) calculated choosing a hash function from a class of hash functions ac...
ISO/IEC 9797-1
ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher is an international standard that defines methods for calcul...
Second Reality
Unreal ][ - The 2nd Reality (later known as Second Reality), is a demo created by Future Crew for the Assembly '93 demoparty. In the PC demo competition, Second Reality placed first with its demonstra...
Second Reality - Wikipedia
MMH-Badger MAC
In cryptography, to guarantee the integrity of a message, one can use either public key digital signatures or use a Message Authentication Code (MAC). A MAC is one of the possible authentication techn...
MMH-Badger MAC - Wikipedia
VMAC
VMAC is a block cipher-based message authentication code (MAC) algorithm using a universal hash proposed by Ted Krovetz and Wei Dai in April 2007. The algorithm was designed for high performance backe...
SQLite
SQLite (/ˌɛskjuːɛlˈlaɪt/ or /ˈsiːkwəl.laɪt/) is a relational database management system contained in a C programming library. In contrast to other database management systems, SQLite is not a client–s...
SSS (cipher)
In cryptography, SSS is a stream cypher algorithm developed by Gregory Rose, Philip Hawkes, Michael Paddon, and Miriam Wiggers de Vries. It includes a message authentication code feature. It has been ...
Data Authentication Algorithm
The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. According to the standard, a code produced by the DAA is called ...
One-key MAC
OMAC (One-key MAC) is a message authentication code constructed from a block cipher much like the CBC-MAC algorithm. Officially there are two OMAC algorithms (OMAC1 and OMAC2) which are both essentia...