Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Figure 3

Data flow of the standard and the obfuscated implementation of round 6.
431794.fig.003