Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Biryukov A, Wagner D (2000) Advanced slide attacks. In: Preneel B (ed) Advances in cryptology – Eurocrypt 2000. Lecture notes in computer science, vol 1807. Springer, Berlin, pp 589–606
Even S, Mansour Y (1997) A construction of a cipher from a single pseudorandom permutation. J Cryptol 10(3):151–161
Kaliski B, Robshaw M (1996) Multiple encryption: Weighing security and performance. Dr. Dobb’s J 243(1):123–127
Kelsey J, Schneier B, Wagner D (1997) Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han Y, Okamoto T, Qing S (eds) Proceedings of ICICS. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 233–246
Kilian J, Rogaway P (1996) How to protect against exhaustive key search. In: Koblitz N (ed) Advances in cryptology – crypto’96. Lecture notes in computer science, vol 1109. Springer, Berlin, pp 252–267
Shannon C (1949) Communication theory of secrecy systems. A declassified report from 1945. Bell Syst Tech J (28): 656–715
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Biryukov, A. (2011). DES-X (or DESX). In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_570
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_570
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering