Xceed Encryption Library v1.1 was extensively checked and processed with the help of Numega's BoundsChecker, TrueCoverage, TrueTime software and of course, lots of beta testing! BoundsChecker finds memory and resource leaks, checks API calls for accuracy, and finds a host of other potential problems. TrueCoverage makes sure every single line of code was tested. TrueTime allows you to find out what the bottlenecks are in your code and helps you optimize and fine tune your code for maximum speed. These products may not come cheap, but they're worth every penny.
The official National Institute of Standards and Technologies (NIST). Home of, among other things, the AES selection. http://csrc.nist.gov
The John Savard’s Cryptographic Compendium page. Very good introduction, history and more. http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.html
The Handbook of Applied Cryptography. The complete book of the same name by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Very technical. http://cacr.math.uwaterloo.ca/hac/
Also, the www.counterpane.com web site is very interesting.
The Codebreakers, by David Kahn (Macmillan, 1967). For a non technical review of cryptography history.
Handbook of Applied Cryptography, by Menezes, van Oorschot and Vanstone (CRC Press, 1997).
Applied Cryptography, Second Edition, by Bruce Schneier (John Wiley & Sons, 1996). Maybe the only book that you’ll need. It has been translated in french, german and polish.
The Twofish code used by the Xceed Encryption Library comes from the Counterpane web site (http://www.counterpane.com/download-twofish.htmll) and was created by Bruce Schneier (the creator of Blowfish from which twofish derives), John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson. The optimized C implementation version is used.
The source code was created by Dr Brian R. Gladman (http://fp.gladman.plus.com/).
Copyright © 1992 Yuliang Zheng. Yuliang Zheng is a professor at the School of Network Computing, Monash University, Australia. Permission has been obtained to use Haval in this library.
The SHA-2 and RSA algorithms used in this library originate from the Crypto++ public domain library compiled by Wei Dai. The library is a compilation Copyright © 1995-2001 by Wei Dai. All rights reserved.