Fig. 5From: Research on transmission of technology of downward information security for wellbore trajectory controlMixColumns functionBack to article page