Version Information
Download 0.88 Mb. Pdf ko'rish
|
TrueCrypt User Guide
- Bu sahifa navigatsiya:
- Legal Information License
- Copyright Information
- Trademark Information
- Acknowledgements
Future Development
For the list of features that are planned for a future release, please refer to: http://www.truecrypt.org/future Contact Information on how to contact us can be found at: http://www.truecrypt.org/contact Legal Information License The text of the license under which TrueCrypt is distributed is contained in the file License.txt that is included in the TrueCrypt binary and source code distribution packages, and is also available at: http://www.truecrypt.org/legal/license Copyright Information This software as a whole: Copyright © 2012 TrueCrypt Developers Association. All rights reserved. Portions of this software: Copyright © 2003-2012 TrueCrypt Developers Association. All rights reserved. Copyright © 1998-2000 Paul Le Roux. All rights reserved. Copyright © 1998-2008 Brian Gladman, Worcester, UK. All rights reserved. Copyright © 2002-2004 Mark Adler. All rights reserved. For more information, please see the legal notices attached to parts of the source code. Trademark Information Any trademarks mentioned in this document are the sole property of their respective owners. 147 Version History 7.1a February 7, 2012 Improvements and bug fixes: • Minor improvements and bug fixes (Windows, Mac OS X, and Linux) For a list of changes in older versions, see: http://www.truecrypt.org/docs/?s=version-history 148 Acknowledgements We would like to thank the following people: Paul Le Roux for making his E4M source code available. TrueCrypt 1.0 was derived from E4M and some parts of the E4M source code are still incorporated in the latest version of the TrueCrypt source code. Brian Gladman, who wrote the excellent AES, Twofish, and SHA-512 routines. Peter Gutmann for his paper on random numbers, and for creating his cryptlib, which was the source of parts of the random number generator source code. Wei Dai, who wrote the Serpent and RIPEMD-160 routines . Mark Adler et al., who wrote the Inflate routine. The designers of the encryption algorithms, hash algorithms, and the mode of operation: Horst Feistel, Don Coppersmith, Walt Tuchmann, Lars Knudsen, Ross Anderson, Eli Biham, Bruce Schneier, David Wagner, John Kelsey, Niels Ferguson, Doug Whiting, Chris Hall, Joan Daemen, Vincent Rijmen, Carlisle Adams, Stafford Tavares, Phillip Rogaway, Hans Dobbertin, Antoon Bosselaers, Bart Preneel, Paulo S. L. M. Barreto. All the others who have made this project possible, all who have morally supported us, and all who sent us bug reports or suggestions for improvements. Thank you very much. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling