Fig. 2From: Full-round impossible differential attack on shadow block cipherThe detailed operation procedure of Generator1Back to article page