Fig. 3From: Research on transmission of technology of downward information security for wellbore trajectory controlSubBytes functionBack to article page