Fig. 1From: Full-round impossible differential attack on shadow block cipherThe ith round function of ShadowBack to article page