Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Table 1

Number of operations in the algorithm .

OperationNumber of operationsFormula

Bit multiplication
Bit addition
T-Box table lookup28