Research Article

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

Table 2

Number of operations in the fast software implementation of .

OperationNumber of operationsFormula

Multiplication table lookup
Bit addition
T-Box table lookup28