Research Article

Novel Shuffling Countermeasure for Advanced Encryption Standard (AES) against Profiled Attack in Mobile Multimedia Services

Figure 4

Methods of applying the shuffling technique to the SubBytes function.
(a) In the case of the previous countermeasure
(b) In the case of a novel countermeasure