Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Figure 1

Flow of the SHARK algorithm.
431794.fig.001