Xceed Encryption Library Documentation
Legal information / Acknowledgments
In This Topic
    Acknowledgments
    In This Topic

    Numega

    Xceed Encryption Library v1.1 was extensively checked and processed with the help of Numega's BoundsChecker, TrueCoverage, TrueTime software and of course, lots of beta testing! BoundsChecker finds memory and resource leaks, checks API calls for accuracy, and finds a host of other potential problems. TrueCoverage makes sure every single line of code was tested. TrueTime allows you to find out what the bottlenecks are in your code and helps you optimize and fine tune your code for maximum speed. These products may not come cheap, but they're worth every penny.

    Web sites

    The official National Institute of Standards and Technologies (NIST). Home of, among other things, the AES selection. http://csrc.nist.gov

    The John Savard’s Cryptographic Compendium page. Very good introduction, history and more. http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.html

    The Handbook of Applied Cryptography. The complete book of the same name by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Very technical. http://cacr.math.uwaterloo.ca/hac/

    Also, the www.counterpane.com web site is very interesting.

    Books

    The Codebreakers, by David Kahn (Macmillan, 1967). For a non technical review of cryptography history.

    Handbook of Applied Cryptography, by Menezes, van Oorschot and Vanstone (CRC Press, 1997).

    Applied Cryptography, Second Edition, by Bruce Schneier (John Wiley & Sons, 1996). Maybe the only book that you’ll need. It has been translated in french, german and polish.

    Twofish

    The Twofish code used by the Xceed Encryption Library comes from the Counterpane web site (http://www.counterpane.com/download-twofish.htmll) and was created by Bruce Schneier (the creator of Blowfish from which twofish derives), John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson. The optimized C implementation version is used.

    Rijndael

    The source code was created by Dr Brian R. Gladman (http://fp.gladman.plus.com/).

    Haval

    Copyright © 1992 Yuliang Zheng. Yuliang Zheng is a professor at the School of Network Computing, Monash University, Australia. Permission has been obtained to use Haval in this library.

    SHA, RSA

    The SHA-2 and RSA algorithms used in this library originate from the Crypto++ public domain library compiled by Wei Dai. The library is a compilation Copyright © 1995-2001 by Wei Dai. All rights reserved.