- Algorithms
- >
- Cryptographic algorithms
- >
- Symmetric-key algorithms
- >
- Message authentication codes

- Applied mathematics
- >
- Algorithms
- >
- Error detection and correction
- >
- Message authentication codes

- Cryptography
- >
- Cryptographic algorithms
- >
- Symmetric-key algorithms
- >
- Message authentication codes

- Cryptography
- >
- Symmetric-key cryptography
- >
- Symmetric-key algorithms
- >
- Message authentication codes

- Discrete mathematics
- >
- Coding theory
- >
- Error detection and correction
- >
- Message authentication codes

- Information theory
- >
- Coding theory
- >
- Error detection and correction
- >
- Message authentication codes

- Mathematical logic
- >
- Algorithms
- >
- Error detection and correction
- >
- Message authentication codes

- Statistical theory
- >
- Information theory
- >
- Error detection and correction
- >
- Message authentication codes

- Theoretical computer science
- >
- Algorithms
- >
- Error detection and correction
- >
- Message authentication codes

- Theoretical computer science
- >
- Information theory
- >
- Error detection and correction
- >
- Message authentication codes

UMAC

In cryptography, a message authentication code based on universal hashing, or UMAC, is a type of message authentication code (MAC) calculated choosing a hash function from a class of hash functions ac

Data Authentication Algorithm

The Data Authentication Algorithm (DAA) is a former U.S. government standard for producing cryptographic message authentication codes. DAA is defined in FIPS PUB 113, which was withdrawn on September

Authenticated encryption

Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data.

AES-GCM-SIV

AES-GCM-SIV is a mode of operation for the Advanced Encryption Standard which provides similar performance to Galois/Counter Mode as well as misuse resistance in the event of the reuse of a cryptograp

SSS (cipher)

In cryptography, SSS is a stream cypher algorithm developed by Gregory Rose, , , and . It includes a message authentication code feature. It has been submitted to the eSTREAM Project of the eCRYPT net

ChaCha20-Poly1305

ChaCha20-Poly1305 is an authenticated encryption with additional data (AEAD) algorithm, that combines the ChaCha20 stream cipher with the Poly1305 message authentication code. Its usage in IETF protoc

Two-Track-MAC

Two-Track-MAC algorithm has been selected as a finalist for NESSIE in November 2000 and was conceived as a fast and reliable method to hash data. The development was attended by Bart of Van Rompay ( E

VMAC

VMAC is a block cipher-based message authentication code (MAC) algorithm using a universal hash proposed by Ted Krovetz and Wei Dai in April 2007. The algorithm was designed for high performance backe

Galois/Counter Mode

In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates for state-of-the-art,

PMAC (cryptography)

PMAC, which stands for parallelizable MAC, is a message authentication code algorithm. It was created by Phillip Rogaway.PMAC is a method of taking a block cipher and creating an efficient message aut

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used for authenticating a message. In other words, to confirm that the message came from

Poly1305

Poly1305 is a universal hash family designed by Daniel J. Bernstein for use in cryptography. As with any universal hash family, Poly1305 can be used as a one-time message authentication code to authen

One-key MAC

One-key MAC (OMAC) is a message authentication code constructed from a block cipher much like the CBC-MAC algorithm. Officially there are two OMAC algorithms (OMAC1 and OMAC2) which are both essential

VEST

VEST (Very Efficient Substitution Transposition) ciphers are a set of families of general-purpose hardware-dedicated ciphers that support single pass authenticated encryption and can operate as collis

HMAC

In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involvi

MMH-Badger MAC

Badger is a Message Authentication Code (MAC) based on the idea of universal hashing and was developed by Boesgaard, Scavenius, Pedersen, Christensen, and Zenner. It is constructed by strengthening th

CMAC

No description available.

CBC-MAC

In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code (MAC) from a block cipher. The message is encrypted with so

ISO/IEC 9797-1

ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipher is an international standard that defines methods for calcul

© 2023 Useful Links.