Xceed Encryption Library Documentation
Acknowledgments
Legal information > Acknowledgments

Numega

Xceed Encryption Library v1.1 was extensively checked and processed with the help of Numega's BoundsChecker, TrueCoverage, TrueTime software and of course, lots of beta testing! BoundsChecker finds memory and resource leaks, checks API calls for accuracy, and finds a host of other potential problems. TrueCoverage makes sure every single line of code was tested. TrueTime allows you to find out what the bottlenecks are in your code and helps you optimize and fine tune your code for maximum speed. These products may not come cheap, but they're worth every penny.

Web sites

The official National Institute of Standards and Technologies (NIST). Home of, among other things, the AES selection. http://csrc.nist.gov

The John Savard’s Cryptographic Compendium page. Very good introduction, history and more. http://home.ecn.ab.ca/~jsavard/crypto/jscrypt.html

The Handbook of Applied Cryptography. The complete book of the same name by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Very technical. http://cacr.math.uwaterloo.ca/hac/

Also, the www.counterpane.com web site is very interesting.

Books

The Codebreakers, by David Kahn (Macmillan, 1967). For a non technical review of cryptography history.

Handbook of Applied Cryptography, by Menezes, van Oorschot and Vanstone (CRC Press, 1997).

Applied Cryptography, Second Edition, by Bruce Schneier (John Wiley & Sons, 1996). Maybe the only book that you’ll need. It has been translated in french, german and polish.

Twofish

The Twofish code used by the Xceed Encryption Library comes from the Counterpane web site (http://www.counterpane.com/download-twofish.htmll) and was created by Bruce Schneier (the creator of Blowfish from which twofish derives), John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson. The optimized C implementation version is used.

Rijndael

The source code was created by Dr Brian R. Gladman (http://fp.gladman.plus.com/).

Haval

Copyright © 1992 Yuliang Zheng. Yuliang Zheng is a professor at the School of Network Computing, Monash University, Australia. Permission has been obtained to use Haval in this library.

SHA, RSA

The SHA-2 and RSA algorithms used in this library originate from the Crypto++ public domain library compiled by Wei Dai. The library is a compilation Copyright © 1995-2001 by Wei Dai. All rights reserved.