Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

AES encryption and decryption.

More »

Fig 1 Expand

Fig 2.

AES BIST architecture.

More »

Fig 2 Expand

Fig 3.

Functional blocks of the AES Crypto ASIC with BIST.

More »

Fig 3 Expand

Fig 4.

Flowchart of the AES Crypto ASIC with BIST.

More »

Fig 4 Expand

Table 1.

Used resources in FPGA simulation.

More »

Table 1 Expand

Fig 5.

Simulation result of encryption module in normal mode.

More »

Fig 5 Expand

Fig 6.

Simulation result of decryption module in normal mode.

More »

Fig 6 Expand

Fig 7.

Simulation result of decryption process following encryption process.

More »

Fig 7 Expand

Fig 8.

Simulation result of encryption module in test mode.

More »

Fig 8 Expand

Fig 9.

Simulation result of decryption module in test mode.

More »

Fig 9 Expand

Table 2.

Comparison results of the AES in terms of BIST implementation.

More »

Table 2 Expand