Fig. 4From: Research on transmission of technology of downward information security for wellbore trajectory controlShiftRows functionBack to article page