Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Figure 4

Modification of the last round of SHARK.
431794.fig.004a
(a) The last round of SHARK 
431794.fig.004b
(b) The modified last round of SHARK