Research Article
Novel Shuffling Countermeasure for Advanced Encryption Standard (AES) against Profiled Attack in Mobile Multimedia Services
Figure 4
Methods of applying the shuffling technique to the SubBytes function.
(a) In the case of the previous countermeasure |
(b) In the case of a novel countermeasure |