Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Figure 2

Data flow of the standard and the obfuscated implementation of the round functions for rounds 0 to 5.
431794.fig.002