Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Embedded Security Modules

Embedded Security Modules Semiconductor IP

In today's interconnected technological landscape, the security of embedded systems has emerged as a crucial challenge. This is where Embedded Security Modules (ESMs) in semiconductor IPs play a pivotal role. These modules are specialized components integrated into chips, offering enhanced protection against a variety of threats including unauthorized access, data breaches, and malicious attacks. By embedding security at the silicon level, these IPs provide a hardware root of trust, ensuring that the integrity, confidentiality, and authenticity of data and communications are uncompromised.

Embedded Security Modules are used across a spectrum of applications, catering to industries such as IoT, automotive, telecommunications, and consumer electronics. In the IoT realm, these modules protect smart devices from vulnerabilities and ensure secure data transmission between interconnected gadgets. In the automotive sector, ESMs safeguard vehicular communication systems and onboard diagnostics from hacking attempts. Similarly, telecommunications networks utilize these modules to establish secure channels and prevent espionage, maintaining the privacy of sensitive communications.

The products found within this category include a range of security-enhancing solutions such as secure boot processors, cryptographic accelerators, hardware random number generators, and secure element IPs. These products are designed to address specific security needs, offering flexibility and scalability to developers and manufacturers. For instance, secure boot processors ensure that only authenticated software runs on a device, while cryptographic accelerators speed up data encryption and decryption processes, vital for real-time secure communications.

Moreover, as digital threats evolve, Embedded Security Modules semiconductor IPs continue to advance, incorporating cutting-edge technologies like quantum encryption readiness and machine learning-led anomaly detection. This ongoing innovation not only fortifies existing systems but also prepares them for future challenges, making Embedded Security Modules a cornerstone of secure electronic design for years to come. Whether you are developing chips for personal gadgets or intricate industrial systems, integrating these security IPs ensures robust protection and compliance with stringent security standards, enhancing consumer trust and product reliability.

All semiconductor IP
66
IPs available

Integrated Diagnostics & Aftersales Transformation (iDART)

KPIT's iDART platform revolutionizes the diagnostics and after-sales service landscape by integrating advanced software and AI-powered diagnostics. This comprehensive platform offers real-time vehicle data analytics, predictive maintenance, and seamless integration of diagnostic functions, improving first-time fix ratios. By enhancing traditional service models with innovative digital tools, KPIT enables more efficient aftersales processes and improved customer satisfaction.

KPIT Technologies
Embedded Security Modules, Security Subsystems
View Details

AHB-Lite APB4 Bridge

The AHB-Lite APB4 Bridge by Roa Logic represents a pivotal element in connecting different bus standards, essentially acting as a bridge between the AMBA 3 AHB-Lite v1.0 and the AMBA APB v2.0 protocols. This interconnect component is designed to facilitate data transfer and communication between various system components, ensuring efficiency and compatibility across multiple architectures. As a parameterized soft IP core, the bridge allows for extensive customization, tailoring bandwidth and performance requirements to suit specific application demands in both FPGA and ASIC designs. This versatility makes it ideal for use in diverse environments where protocol conversion is necessary. Supporting an array of peripherals, the bridge enables seamless integration and operation within larger, complex architectures. Its design reduces latency and power consumption, making it a preferred choice for creating energy-efficient and high-performance systems. Available for non-commercial licensing, this bridge epitomizes Roa Logic’s commitment to innovation through practical, user-focused IP solutions.

Roa Logic BV
AMBA AHB / APB/ AXI, Embedded Security Modules, Interlaken, Smart Card
View Details

PQPerform Lattice

Post-Quantum Cryptography Processing Engine Adds support for lattice-based cryptographic operations such as ML-KEM and ML-DSA. PQPlatform-Lattice provides post-quantum support for these NIST-standardized algorithms with minimal area, and leverages an existing SHA-3 accelerator, powered by PQShield-supplied firmware. It’s designed for minimal area, and maximum compatibility, and is deployed with optional firmware-backed side-channel resistance.

PQShield
GLOBALFOUNDARIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

AHB-Lite Multilayer Switch

The AHB-Lite Multilayer Switch from Roa Logic is engineered for high-efficiency performance, serving as an interconnect fabric that supports numerous bus masters and slaves. This architecture is crucial in systems that require low latency data processing and robust bandwidth capacities to handle heavy data traffic between multiple modules. Designed to handle a virtually unlimited number of masters and slaves, this switch enhances system scalability, allowing the seamless expansion of functionalities in complex SOC configurations. Its low latency characteristics ensure data is transmitted with minimal delay, optimizing system performance and stability. Developed for both ASIC and FPGA implementations, this product aligns with AMBA interconnect specifications, ensuring compatibility and simplifying integration into existing designs. Its free non-commercial licensing promotes broader accessibility, encouraging experimentation and adoption in various technological projects.

Roa Logic BV
AMBA AHB / APB/ AXI, Embedded Security Modules
View Details

PUFrt

PUFrt represents PUFsecurity's Hardware Root of Trust solution, delivering essential security functionalities like TRNG, UID, and Secure OTP, all within a robust anti-tamper framework. As the cornerstone of their security offerings, PUFrt is designed to remain tamper-resistant, ensuring that keys and sensitive data stay on the chip, thus binding system integrity to hardware-level security. Utilizing a 1024-bit PUF-based identification, along with the entropic power of a true random number generator, PUFrt creates an unyielding security foundation for varied applications, from simple hardware keys to complex security coprocessors. This technology protects against malicious reverse engineering and counterfeiting, while also offering customization options to fit diverse system requirements, enhancing the security value across industries. Feature-rich and versatile, PUFrt easily integrates into diverse architectures, allowing for its use in a broad array of applications. By partnering with leading chip designers and foundries, PUFsecurity ensures that PUFrt not only meets current security needs but is also prepared to handle future challenges, making it a pivotal component for companies aiming to maintain a secure digital environment.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SphinX

SphinX is a high-performance AES-XTS encryption and decryption solution known for low latency and uncompromised security. Designed with independent non-blocking channels for encryption and decryption, this product offers robust data protection in real-time applications. Ideal for environments where security and efficiency are critical, SphinX ensures data privacy without affecting system speed.

ZeroPoint Technologies
Cryptography Cores, Embedded Security Modules
View Details

Polar ID Biometric Security System

The Polar ID Biometric Security System is Metalenz's revolutionary solution for face authentication, delivering a new level of biometric security through advanced polarization imaging. Unlike conventional facial recognition systems, Polar ID captures the unique 'polarization signature' of each human face, offering enhanced security by effortlessly differentiating between real faces and potential spoofing attempts with sophisticated 3D masks. This innovative use of meta-optics not only enhances security but also reduces the need for complex optical modules traditionally required in consumer devices. Polar ID stands out in its ability to operate efficiently under varied lighting conditions, from bright sunlight to complete darkness. It achieves this with more than 10 times the resolution of current structured light systems, ensuring reliable and secure facial recognition performance even when users wear glasses or face coverings. By operating in the near-infrared spectrum, Polar ID extends its utility to scenarios previously challenging for facial recognition technology, thus broadening its application range. Designed for mass-market deployment, Polar ID minimizes the footprint and complexity of face unlock systems. By doing away with bulky modules, it offers a compact and cost-effective alternative while maintaining high-security standards. This innovation enables widespread adoption in consumer electronics, allowing a seamless integration into smartphones, tablets, and other mobile devices, potentially replacing less secure biometric methods like fingerprint recognition.

Metalenz Inc.
TSMC
16nm
10 Categories
View Details

eSi-Crypto

eSi-Crypto offers a comprehensive suite of encryption and authentication intellectual property tailored for ASIC and FPGA applications. With low resource utilization and high throughput, the package includes True Random Number Generators (TRNGs), adhering to NIST 800-22 standards, available only as hard macros in target technologies. The IP cores can operate independently or interface through AMBA APB/AHB or AXI buses, supporting encryption algorithms such as CRYSTALS Kyber, ECC, RSA, and AES. By focusing on security, eSi-Crypto helps safeguard communications and data integrity, essential in today's digital landscape. The IP suite notably features advanced cryptographic algorithms, ensuring modern applications remain secured against evolving threats.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

PLIC

Roa Logic's Platform-Level Interrupt Controller (PLIC) is a highly parameterized and configurable module that adheres to the RISC-V architecture, intended to manage interrupts in various system designs comprehensively. This component is a critical part of incorporating interactivity and responsiveness in embedded systems, handling a multitude of interrupt sources efficiently. The PLIC's compliance with the RISC-V standard ensures seamless integration into systems using this architecture, enabling straightforward implementation and management of interrupt-related functionality. Its flexible design allows users to customize the number of supported interrupts according to specific needs, making it adaptable to a wide range of applications, from small embedded devices to more complex multicore systems. Overall, Roa Logic’s PLIC offers a scalable solution for systems designers, providing the necessary configurability to tailor the interrupt handling according to platform-specific requirements. Its open-access policy for non-commercial applications further encourages experimentation and innovation within the RISC-V ecosystems.

Roa Logic BV
Arbiter, Embedded Security Modules, IEEE1588, Interrupt Controller, Platform Security
View Details

PQCryptoLib Embedded

Post-quantum cryptography library for memory-constrained platforms PQCryptoLib-Embedded is a version of PQCryptoLib, PQShield’s library of post-quantum cryptographic algorithms, which is designed for microcontrollers or memory-constrained platforms. The library is highly configurable at build time, which means binary size and memory footprint can be minimized, making this product ideal for constrained devices. Efficiency is important in implementing ML-DSA and ML-KEM, especially for devices or networks requiring quantum-safe TLS communication such as in IoT environment. As a standard software library, PQCryptoLib-Embedded is a versatile tool for developing post-quantum protocols in memory-constrained situations.

PQShield
Cryptography Software Library, Embedded Security Modules
View Details

HDCP Encryption-Decryption Engine

The HDCP Encryption-Decryption Engine developed by Trilinear Technologies is designed to protect digital audio and video content from unauthorized access during transmission. It aligns with the HDCP 2.2 standard, ensuring that all data exchanged between a display source and receiver remains secure and resistant to interception. This solution is vital for industries where content protection is paramount, such as in premium consumer electronics, professional audiovisual setups, and sensitive government or military communication channels. This engine supports the authentication protocols necessary for protected transactions over DisplayPort interfaces, using sophisticated AUX channels to seal data transfer securely. It is engineered to reduce the processing load by offloading encryption tasks from the system processor, thereby enhancing the overall system performance while maintaining robust security. Capable of integrating into a range of devices from set-top boxes to large multimedia systems, the HDCP Encryption-Decryption Engine offers developers a trustworthy method to shield content from piracy and unauthorized dissemination. Its implementation ensures that content providers can operate freely with the assurance that their digital rights are upheld across all endpoints.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Secure Protocol Engines

Secure Protocol Engines are designed to significantly enhance network and security processing capabilities. This IP offers high-performance processing of network traffic with secure protocol applications. It includes efficient engines for SSL/TLS handshakes and algorithms such as MACsec and IPsec, enabling swift encryption and decryption, thus enhancing security for data centers and similar infrastructures. These engines help in offloading intensive cryptographic operations from CPUs, thereby optimizing performance and resource allocation.

Secure-IC
AMBA AHB / APB/ AXI, CXL, Embedded Security Modules, Ethernet, I2C, IEEE1588, Security Protocol Accelerators, USB, V-by-One
View Details

Secure OTP

The Secure OTP (One-Time Programmable) solution by PUFsecurity elevates standard OTP technology by integrating anti-fuse memory and robust encryption techniques, ensuring the high-level protection of sensitive data. This sophisticated approach allows for secure data storage and management, even under duress from advanced attack methodologies. Secure OTP transforms how critical data like encryption keys and configuration states are stored, enabling devices to maintain data integrity during storage and transit. By encapsulating both physical macro implementations and digital RTL designs with intuitive control, Secure OTP allows seamless integration into a host of applications while safeguarding against unauthorized data extraction. The integration of diverse interface protocols makes Secure OTP adaptable to a wide range of industrial requirements. It stands as a robust defensive measure in the face of modern threats, offering reliability in an era where secure data storage solutions are more important than ever.

PUFsecurity
Cryptography Cores, Embedded Memories, Embedded Security Modules, Flash Controller, Platform Security, Security Subsystems, SRAM Controller, Standard cell
View Details

AES Key Wrap Core

The AES Key Wrap Core developed by IP Cores, Inc. implements the NIST-approved AES Key Wrap specification, ensuring secure key exchange and management. Utilizing both 128-bit and 256-bit AES keys for wrapping and unwrapping operations, this core fortifies the security infrastructure for communication and encryption-based applications. This IP core excels in scenarios requiring compact size without compromising security, starting from less than 8,000 gates and featuring a fully self-contained design that excludes the need for external memory. This, combined with its flow-through architecture, enhances its simplicity in integration and operation. Available in source code and netlist forms, the core also supports both encryption and decryption-only variants, further offering flexibility to meet varied design needs. Applications include secure key management systems complying with strict security protocols.

IP Cores, Inc.
Samsung
55nm
Cryptography Cores, Embedded Security Modules
View Details

DAES Cryptographic Processor

The DAES processor is an ultra-secure cryptographic co-processor that efficiently implements the Rijndael encryption algorithm. This processor provides robust support for both 128 and 256-bit key lengths, while also facilitating a variety of block cipher modes such as ECB, CBC, and other standards. It incorporates an internal key expansion module to guarantee prompt and secure data encryption processes, positioning it as a vital asset for environments where data confidentiality is paramount. By integrating smoothly via APB, AHB, and AXI bus interfaces, it adapts seamlessly across differing systems requiring top-tier security.

DCD-SEMI
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is a cutting-edge security solution designed to enhance the protection and management of digital assets within the crypto industry. Combining microcontroller technology with secure elements, Cramium PHSM delivers a robust security framework that outperforms traditional measures. The module is engineered to offer top-tier tamper-resistance, ensuring that sensitive keys and cryptographic data remain secure against physical and logical threats. Cramium PHSM is pivotal in redefining industry standards by integrating advanced protection mechanisms that cater specifically to the fast-evolving demands of cryptocurrency and blockchain applications. Its architecture is designed for adaptability and high performance, ensuring seamless integration into various systems and promoting secure, decentralized operations. Moreover, CrossBar is committed to providing open-source solutions that foster transparency and reliability in the digital asset space. The PHSM not only bolsters security but also enhances trust, thereby supporting open collaboration and innovation within the industry. By focusing on delivering secure and flexible solutions, the Cramium PHSM is set to play a crucial role in safeguarding digital assets and ensuring the integrity of next-generation secure computing systems. Overall, Cramium PHSM exemplifies CrossBar's forward-thinking approach in addressing the cybersecurity needs of modern technologies, reaffirming their position as leaders in secure memory component design. It supports global security standards, making it indispensable for developers and companies aiming to fortify their digital infrastructure against emerging cyber threats.

CrossBar
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, provides a comprehensive security solution for devices throughout their lifecycle. It enables zero-touch security lifecycle services, including provisioning, firmware updates, security monitoring, and device identity management. The platform integrates Secure-IC's Root of Trust, ensuring robust system protection from chip-level threats. By combining strong hardware and software security measures, it ensures end-to-end protection for devices operating in various environments.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Aeonic Insight

The Aeonic Insight delivers advanced on-die telemetry for SoCs, allowing for actionable insights into power grids, clock health, and silicon security. Suitable for applications ranging from data centers to automotive systems, it features programmability and process portability, ensuring high efficiency and scalability through advanced process technologies. It integrates seamlessly with third-party analytics platforms through industry-standard interfaces.

Movellus
Tower
All Process Nodes
Analog Front Ends, Embedded Security Modules, Platform Security, Security Subsystems, Sensor, Temperature Sensor
View Details

PQPlatform Lattice

Post-Quantum Cryptography Processing Engine Adds support for lattice-based cryptographic operations such as ML-KEM and ML-DSA. PQPlatform-Lattice provides post-quantum support for these NIST-standardized algorithms with minimal area, and leverages an existing SHA-3 accelerator, powered by PQShield-supplied firmware. It’s designed for minimal area, and maximum compatibility, and is deployed with optional firmware-backed side-channel resistance.

PQShield
GLOBALFOUNDARIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

PQPlatform SubSys

Post-Quantum Security Subsystem A cryptographic subsystem, designed to provide cryptographic services. These services include post-quantum signature generation, verification, and secure key establishment. PQPlatform-SubSys uses its built-in CPU independently from the surrounding system, allowing cryptographic services to be offloaded efficiently from the system processor.

PQShield
Samsung
12nm
Cryptography Cores, Embedded Security Modules
View Details

ATEK367P4 (Phase Shifter)

The ATEK367P4 is an advanced phase shifter designed for precise microwave frequency manipulation between 2 GHz and 4 GHz. Offering a continuous phase range of up to 375 degrees, it supports a variety of communication and signal processing applications. The minimal insertion loss of 3 dB ensures effective signal transmission without significant degradation. Control is achieved through a broad dynamic range, making the ATEK367P4 suitable for systems requiring fine-tuned phase control and high precision. Encased in a 4×4 mm QFN package, this phase shifter is ideal for integration into modular designs, enhancing compactness and functionality.

Atek Midas
AMBA AHB / APB/ AXI, Analog Front Ends, Embedded Security Modules, GPU, USB, V-by-One
View Details

Quantum Resistant Encryption Core

Crypto Quantique’s Quantum Resistant Encryption Core offers a robust solution for post-quantum cryptography challenges. This core is designed to withstand potential vulnerabilities that arise with quantum computing technology. It leverages advanced quantum-driven technology to create secure cryptographic keys that are resistant to traditional and quantum-based attacks. It is aimed at providing a future-proof security framework for next-generation electronic devices. The product ensures data integrity and confidentiality, crucial for applications where data breaches could have severe consequences. With a strong emphasis on secure key storage and management, the Quantum Resistant Encryption Core is ideal for industries needing enhanced security measures, such as finance, healthcare, and government sectors. Additionally, this encryption core supports scalable and efficient deployment across various IoT devices. Its compatibility with existing cryptographic systems ensures that companies can integrate it into their current infrastructure without significant overhauls, enabling seamless transitions to quantum-secure communications.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Monolithic Microsystems

Monolithic Microsystems from Imec are revolutionizing how electronic integration is perceived by offering a platform that seamlessly combines microelectronics and microsystems. These systems are engineered to provide high functionality while maintaining a compact footprint, making them ideal for applications in areas like sensing, actuation, and control across a variety of sectors including industrial automation, medical devices, and consumer electronics. The Monolithic Microsystems platform enables the integration of various subsystems onto a single semiconductor chip, thereby reducing the size, power consumption, and cost of complex electronic devices. This not only streamlines device architecture but also enhances reliability and performance by mitigating the interconnect challenges associated with multi-chip assemblies. Imec’s comprehensive resources and expertise in semiconductor manufacturing are harnessed to deliver solutions that meet the rigorous demands of cutting-edge applications. From design to production, the Monolithic Microsystems offer a leap in capability for next-generation devices, facilitating innovations that require robust, integrated microsystem technologies.

Imec
Tower
28nm
Analog Subsystems, Building Blocks, CPU, Embedded Security Modules, Input/Output Controller, Interrupt Controller, Processor Core Dependent, Processor Core Independent, Sensor, Standard cell
View Details

Securyzr Key Management System

The Securyzr Key Management System provides a robust framework for managing cryptographic keys within embedded systems. By ensuring secure storage, key generation, and access protocols, it strengthens the cryptographic foundation of devices. This system supports multiple security applications and meets stringent certification requirements, ensuring that key information remains protected throughout the device lifecycle. It enhances security by preventing unauthorized access and preserving data integrity through effective key management strategies.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

WiseEye2 AI Solution

WiseEye2 AI Solution by Himax revolutionizes edge computing in AI applications with its unique blend of an ultralow power CMOS image sensor and the HX6538 AI microcontroller. This solution is specifically engineered for battery-powered applications that require continuous operation, yet consume minimal power. The HX6538 microcontroller boasts unmatched power efficiency and performance gains, driven by its ARM-based architecture sporting Cortex M55 CPU and Ethos U55 NPU. This enables highly complex and accurate AI computations to be made directly at the endpoint, without exorbitant power usage.<br> <br> In terms of security and functionality, the WiseEye2 incorporates sophisticated cryptography engines and a layered power management system. These features ensure the solution not only processes data efficiently but also safeguards sensitive information. Its prowess in executing intricate AI models and seamless sensor fusion makes it an ideal player in the AIoT landscape, powering intelligent devices across various verticals from smart home solutions to advanced security systems.<br> <br> Himax's WiseEye2 thus extends its capabilities beyond typical AI solutions, facilitating continuous, real-time processing that is both resource-conservative and remarkably thorough. This blend of low-energy operation with high computational capability positions WiseEye2 as a frontline solution in the push towards smarter, more secure IoT ecosystems.

Himax Technologies, Inc.
AI Processor, Audio Processor, Cryptography Cores, Embedded Security Modules, Multiprocessor / DSP, Other, Platform Security, Processor Cores, Security Subsystems, Vision Processor
View Details

GL3004

The GL3004 is a highly capable fisheye image processor designed to cater to high-performance wide-angle applications. It is equipped with multiple dewarping modes, allowing it to process and correct images from fisheye lenses effectively. The GL3004 integrates a hardware image signal processor that enhances visual quality by applying wide dynamic range techniques and real-time image corrections. Supporting input resolutions up to 3 megapixels, the GL3004 is tailored for a range of wide-angle camera applications. The integrated display engines allow for dynamic overlay, multipoint views, and customized fisheye corrections, enhancing the user experience with enriched visual presentations. This image processor also includes various input and output interfaces, such as MIPI, DVP, and BT601/656, making it highly versatile. With its advanced hardware-based ISP, the GL3004 supports essential features like auto exposure, color interpolation, and on-screen display functions, making it a robust choice for improving wide-angle imaging technology.

Genesys Logic, Inc.
2D / 3D, DMA Controller, Embedded Security Modules, Graphics & Video Modules, Image Conversion, JPEG, Keyboard Controller, Network on Chip, Other, Peripheral Controller, Sensor
View Details

PQPlatform CoPro

Post-Quantum Cryptography Processor PQPlatform-CoPro (PQP-HW-COP) adds PQShield’s state-of-the-art post-quantum cryptography (PQC) to your security sub-system, with optional side-channel countermeasures (SCA). PQPlatform-CoPro can be optimized for minimum area as part of an existing security sub-system. PQPlatform-CoPro is designed to be run by an existing CPU in your security system, using PQShield’s supplied firmware.

PQShield
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

DSHA2-256 Cryptography Co-Processor

The DSHA2-256 co-processor is adept at boosting the SHA2-256 hash function's execution, following the FIPS PUB 180-4 compliance. Designed to handle rigorous data integrity and authentication tasks, it supports HMAC natively and accommodates SHA2 hashing in both 224 and 256-bit modes. This cryptographic part seamlessly interfaces with APB, AHB, and AXI buses, ensuring versatility across platforms. By enhancing data security protocols such as digital signatures, this co-processor plays a critical role in safeguarding modern digital communications.

DCD-SEMI
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

PUFcc

PUFcc is an advanced crypto coprocessor that combines a Hardware Root of Trust with a comprehensive set of cryptographic algorithms, creating a versatile security module suitable for a wide range of system architectures. This turnkey solution enables seamless integration of security protocols into existing systems, making it a critical component in industries such as IoT, AI, automotive, and fintech. It establishes a secure foundation for device security, complementing existing software solutions by providing deep hardware-level protection from design to deployment. The PUFcc integrates a NIST CAVP-certified crypto accelerator, along with OSCCA-compliant ciphers and key derivation algorithms. It features advanced components like the APB and AXI interfaces, facilitating rapid memory access, and a sequencer to eliminate the need for additional processors or boot ROMs. The coprocessor also offers capabilities for extending protection to external flash memory, ensuring secure handling of sensitive data across its lifecycle. With over-the-air secure boot, TLS support, and robust key management possibilities, PUFcc simplifies and strengthens SoC design while providing a secure boundary to protect against threats like cloning and unauthorized access. Its scalable and customizable nature, exemplified by the addition of the PUFcc7 model, allows it to adapt to evolving security requirements, making it an indispensable tool for developers and manufacturers focused on robust cybersecurity infrastructures.

PUFsecurity
Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM Memory

CrossBar's ReRAM Memory is a pioneering memory solution that significantly enhances data storage capabilities for modern applications. Employing a minimalist three-layer structure, ReRAM Memory utilizes a silicon-based switching medium between two electrodes to facilitate resistive switching. This setup results in a highly stable memory cell that operates across varied temperatures and conditions. ReRAM Memory's ability to scale vertically in 3D allows it to deliver extensive terabyte-level storage on a single chip, alongside providing incredible endurance and rapid read/write capabilities. The technology's compatibility with standard CMOS processes facilitates easy integration into existing manufacturing setups, making it highly versatile for a wide range of applications, from IoT devices to data centers, and more. Notably, ReRAM Memory's unique design addresses some critical challenges facing conventional memory technologies. By reducing energy consumption to a mere 1/20th of traditional memory solutions, it delivers unmatched performance, sustaining up to 1000 times more write cycles and operating reliably with significant endurance and retention capabilities. Furthermore, its potential to be combined directly with logic circuits in a foundry augments the memory performance significantly while optimizing space and power requirements. Applications of ReRAM Memory spread across various domains such as artificial intelligence, mobile computing, and secure computing. Its benefits are clearly outlined in its secure features, where the memory is deployed for developing advanced applications involving secure cryptographic keys and tamper-resistant solutions. This makes ReRAM Memory an ideal choice for scenarios demanding high security and reliability, paving the way for future innovations in the semiconductor industry. CrossBar's ReRAM Memory showcases a perfect blend of cutting-edge design and practical implementation potential, enabling the semiconductor field to explore new possibilities in data processing and storage technologies. As digital landscapes continue to evolve, CrossBar's ReRAM offers lifecycle improvements and operational efficiencies that align with the industry's growing needs for high-density, reliable, and energy-efficient memory technologies.

CrossBar
CPU, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile SDR Controller, SDRAM Controller, Security Processor, SRAM Controller, Standard cell
View Details

NVM Defender

NVM Defender is a pioneering hardware module focused on safeguarding integrated circuits from common invasive attacks that aim to extract non-volatile memory (NVM). This solution provides protection against unauthorized replication, emulation, cloning, and counterfeiting by being self-aware, detecting attacks instantly, and employing a structure that resists bypass attempts. NVM Defender ensures 'Security by Design,' offering a robust protective measure that chip makers and integrators can deploy to protect their intellectual assets seamlessly. Throughout the years, Texplained has discovered that many components remain vulnerable to NVM code extraction. This necessity led to the development of the NVM Defender, a hardware-only countermeasure that strengthens security against such attacks. Unlike conventional solutions which often rely on software and may fail under comprehensive invasive attacks, NVM Defender's hardware-centric approach guarantees that even if the ICs architecture secrets are exposed, code extraction remains impractical. The module not only serves to secure embedded software and cryptographic keys but also effectively safeguards personal data embedded within chips, making it a sought-after solution in today's security-conscious environment. NVM Defender stands out for being user-friendly and cost-effective while maintaining a high level of security that deters both physical and remote attempts of intrusion.

Texplained
Embedded Security Modules, Security Subsystems
View Details

Human Body Detector for Ultra-Low-Power

Microdul's innovative Human Body Detector for Ultra-Low-Power is engineered to ensure minimal energy consumption, making it ideal for battery-operated wearable devices. Utilizing capacitive sensing technology, it efficiently detects the presence of a human body, triggering power-saving modes when the device is not worn. This feature significantly enhances the battery life of the device, making it particularly useful for portable applications. The Human Body Detector is designed for both dynamic and static detection, ensuring versatility in a variety of scenarios. When not in active use, it can reduce the power draw of the device, contributing to overall energy efficiency. Its seamless integration into existing systems makes it a valuable component for manufacturers focusing on enhancing product longevity without compromising performance. This detector is part of Microdul's suite of Ultra-Low-Power solutions, reflecting the company's commitment to providing efficient, reliable, and innovative components for the IoT and wearable technology markets.

Microdul AG
Embedded Security Modules, Sensor, Temperature Sensor, Wireless Processor
View Details

Capacitive Proximity Switch for Energy Efficiency

Microdul's Capacitive Proximity Switch for Energy Efficiency is a cutting-edge component designed to optimize power consumption by detecting proximity events with high precision. Leveraging capacitive sensing technology, this switch is adept at identifying nearby objects, triggering device functions upon detecting user interaction without requiring direct contact. This proximity switch allows designers to implement sophisticated touch and gesture-based controls in devices, providing a modern, interactive user experience. Its low power requirements are perfect for consumer electronics and automated systems where energy efficiency is a priority. The switch opens up new possibilities for enhancing user interfaces, replacing mechanical switches with more reliable, intuitive sensor-based solutions. Its application ranges from simple touch-activated panels to complex gesture recognition systems, making it highly adaptable across a range of electronic products.

Microdul AG
Embedded Security Modules, Input/Output Controller, LCD Controller, Sensor, USB
View Details

VibroSense AI Chip for Vibration Analysis

The VibroSense AI Chip is a cutting-edge solution designed for vibration analysis in Industrial IoT applications. It is based on the Neuromorphic Analog Signal Processor, which preprocesses raw sensor data, significantly reducing the amount of data to be stored and transmitted. This chip is particularly beneficial in predictive maintenance applications, where it helps in the early detection of potential machinery failures by analyzing vibrations generated by industrial equipment. VibroSense excels in overcoming the traditional challenges linked to data processing for condition monitoring systems. By performing data preprocessing at the sensor level, it minimizes data volumes by a thousand times or more, making it feasible to conduct condition monitoring over narrow-bandwidth communications and at lower operational costs. This ensures industrial operations can identify issues like bearing wear or imbalance effectively, ultimately extending equipment life and improving safety. The implementation of VibroSense's neural network architecture enables it to handle complex vibration signals with high accuracy. It supports energy-efficient designs, providing a compelling solution for industries aiming to optimize maintenance operations without increasing their OPEX. Its ease of integration with standard sensor nodes and support for energy harvesting applications further enhances its market appeal.

Polyn Technology Ltd.
Arbiter, DSP Core, Embedded Security Modules, GPU, Mobile SDR Controller, Network on Chip
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator from ResQuant is specifically designed to cater to unique client needs, with a variety of configurable options ensuring peak quantum-safe security. It is designed for seamless integration and supports all NIST PQC standards, including algorithms such as Dilithium, Kyber, XMSS, and Sphinx+. The accelerator is adaptable, allowing extensions by other algorithms and customer-specific requirements. This flexibility, combined with resilience against various side-channel attacks like Differential Power Analysis (DPA) and Timing, makes it a robust choice for secure implementations. The accelerator is further enhanced by its readiness for AXI 4 integration, positioning it well for incorporation into modern system designs. This makes it an efficient and future-proof solution for entities looking to adopt quantum-resistant security measures. Cost-effectiveness, coupled with superior security features, positions ResQuant's solution as a prime candidate for industries looking to shield their operations against future quantum threats. Their workshop offerings empower organizations, providing insights into quantum computing threats and strategies for transitioning to post-quantum cryptography. Participants gain an understanding of how to reinforce their infrastructure to withstand emerging quantum challenges, setting a foundation for proactive, quantum-safe security strategies moving forward.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

Side-channel Attack Resistance

FortifyIQ's Side-channel Attack Resistance offers advanced security solutions designed to protect devices against SCA vulnerabilities during the early design stages. By enabling integrated simulations of side-channel scenarios, it supports identifying and mitigating potential weaknesses before hardware manufacturing. This capacity ensures cost-effective and timely preventative measures that preempt costly post-production fixes. Integrating advanced testing methodologies such as the rigorous Test Vector Leakage Assessment (TVLA), FortifyIQ’s SCA solution allows comprehensive assessment and validation of security under extreme scenarios. The technology successfully detects fault injection risks, ensuring the highest standards of security compliance are met. This system is particularly vital for sectors where data integrity and security are paramount, including automotive, defense, and Internet of Things (IoT). Its extensive simulation and analysis capabilities allow users to optimize systems efficiently, ensuring safe deployment and continuous protection of sensitive data against evolving security challenges.

FortifyIQ
UMC
28nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SiFive Automotive

SiFive's Automotive solutions offer the latest in high-end applications and deterministic real-time processors. These processors are optimized for modern vehicle requirements, providing industry-leading performance with a focus on minimal area and optimized power consumption. SiFive Automotive products are designed to meet stringent automotive standards, including ISO26262 for functional safety and ISO/SAE 21434 for cybersecurity compliance. The Automotive family includes a range of RISC-V safety processors qualified for ADAS/AD, infotainment, body control, and powertrain applications. With features such as Safety Islands and compliance to ASIL B and D standards, the SiFive Automotive processors are tailored to meet critical safety and performance needs of modern vehicles, addressing the industry's demand for reliable and secure solutions in software-defined vehicles. Moreover, SiFive collaborates with industry leaders to ensure robust support across the automotive ecosystem. Whether it's through partnerships to enhance trace and debug solutions or collaborations to leverage robust development tools, SiFive Automotive solutions emphasize ease of integration and comprehensive support, making them a preferred choice for next-generation automotive applications.

SiFive, Inc.
Embedded Security Modules, Processor Cores, Safe Ethernet
View Details

Integrated Secure Element

Secure-IC's Integrated Secure Element (iSE) serves as a cornerstone for secure computing environments. Embedded on the main system-on-chip (SoC), it provides services including secure boot, key isolation, and anti-tampering measures. The iSE ensures security at a hardware level, creating a more robust defense against advanced cyber threats. Its design incorporates features to maintain strong isolation, offering dual computation capabilities that aid in resisting various forms of attacks while maintaining high performance.

Secure-IC
Embedded Security Modules, Platform Security, Security Subsystems
View Details

NeoPUF

NeoPUF stands out as a revolutionary hardware security technology leveraging the concept of Physically Unclonable Functions (PUF). NeoPUF is predicated on the intrinsic variances found in silicon during the manufacturing process, providing a unique and immutable identifier akin to a fingerprint for semiconductor devices. As a foundation for hardware security, NeoPUF excels in delivering unmatched protection by generating random, unique numbers for each device. These numbers can be utilized as identifiers, root keys, or cryptographic nonces, ensuring secure key management, authentication, and data encryption. Its tamperproof nature makes it an ideal component for applications where security is paramount. The introduction of NeoPUF allows companies to integrate a hardware root of trust directly into their silicon designs, offering a straightforward, cost-effective solution to modern security challenges. Whether for IoT devices, mobile computing, or enterprise-level systems, its deployment offers heightened security while simplifying the key management infrastructure.

eMemory Technology Inc
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures address vulnerabilities in pre-silicon stages, allowing design engineers to detect potential weaknesses early in the development cycle. This method replaces traditional post-manufacture testing, thereby reducing costs and development timelines. Using simulation techniques within FaultInjection Studio, these countermeasures ensure robust system integrity against fault injection attacks. The platform supports accurate and detailed analysis, identifying vulnerabilities through simulation engines like FAST IQ, tailored to simulate various fault scenarios. This preemptive approach facilitates immediate corrective measures, ensuring compliance with emerging security standards and significantly mitigating potential risks associated with hardware flaws. Employing this technology enhances reliability in critical infrastructures such as telecommunications, finance, and secure manufacturing. It combines the latest cryptographic protections to offer a balanced, safe operating environment for devices susceptible to fault-induced breaches. These countermeasures are integrated seamlessly, maximizing system uptime and security resilience in sensitive applications.

FortifyIQ
Samsung
20nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Digital Systems and Security Solutions

VeriSyno's Digital Systems and Security Solutions focus on ensuring high-performance operations within digital frameworks while emphasizing secure data management. These solutions cover a vast array of applications, from memory controller interfaces and network solutions to advanced security protocols. The goal is to provide digital systems that are not only efficient but also robust against modern security challenges. These digital IP components, including network IP solutions like vMAC, attend to contemporary issues by integrating AI and authentication technologies. Such innovations are designed to meet the security demands of today’s digital landscape, empowering enterprises with reliable solutions that safeguard data while optimizing performance. By offering these advanced digital components, VeriSyno empowers industries such as finance, healthcare, and IT with crucial IP that enhances data processing capabilities and secures operational integrity. Their security solutions are instrumental in facilitating secure and efficient operations in a variety of digital environments.

VeriSyno Microelectronics Co., Ltd.
Arbiter, Cryptography Cores, DDR, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

ReRAM IP Cores for High-Density Data Storage

CrossBar's ReRAM IP Cores focused on High-Density Data Storage offer a breakthrough in managing extensive data volumes within compact integrated circuits. Designed for high scalability and integration, these cores utilize ReRAM technology to provide unparalleled storage density, making them suitable for systems where storing large amounts of data efficiently is critical. These cores leverage the unique 3D stackable and energy-efficient properties of ReRAM, allowing them to provide terabytes of storage on minimal footprint, which is essential for applications in data centers and advanced computing. Their robust architecture ensures superior performance, maintaining rapid access speeds and low latency, which are vital for today’s high-performance systems. Moreover, the scalability of ReRAM technology incorporated in these IP cores aids in reducing overall system cost and complexity, while simultaneously enhancing capacity. This makes them ideal for enterprise-level storage solutions and applications requiring rapid, reliable access to extensive datasets. CrossBar's ReRAM IP Cores for High-Density Storage thus represent a significant advancement in data management technology, offering a practical solution for industries in need of high-capacity, energy-efficient storage options. By deploying these cores, companies can leverage superior memory performance and adaptability, keeping pace with the rapid expansion of data-driven applications globally.

CrossBar
Embedded Memories, Embedded Security Modules, Flash Controller, NAND Flash, Other, SDRAM Controller
View Details

DES/3DES Ultra-Compact Data Encryption Standard

The DES/3DES Ultra-Compact Data Encryption Standard core by IP Cores, Inc. offers a compact implementation of the DES and Triple DES encryption standards, ideal for applications where size and efficiency are crucial. Supporting 64-bit block sizes and accommodating one to three 56-bit keys, it provides robust data security compliant with NIST FIPS standards. Engineered for minimal resource footprint, this core requires only 3,000 ASIC gates, making it perfect for areas where space and cost-efficiency are necessary. The DES/3DES core supports various cipher modes including ECB, CBC, and CTR, enabling flexibility in secure communication implementations. The fully synchronous design available in both Verilog and netlist forms allows for seamless integration and offers high throughput up to 3 Gbps, customizable for different process technologies. Deliverables include test benches and self-checking vectors for streamlining deployment.

IP Cores, Inc.
TSMC
130nm
Cryptography Cores, Embedded Security Modules
View Details

ReRAM IP Cores for Embedded NVM in MCU & SOCs

CrossBar's ReRAM IP Cores specifically tailored for Embedded Non-Volatile Memory (NVM) applications in Microcontroller Units (MCUs) and Systems-on-Chip (SoCs) offer a next-generation solution for memory integration. Designed for high adaptability, these IP cores leverage the inherent benefits of ReRAM technology to enhance system performance and efficiency significantly. They provide robust support for embedding secure and reliable memory functionalities in complex integrated circuits. These IP cores allow for a reduction in chip area and manufacturing costs, as the inherent scalability and stackability of ReRAM enable high-density memory storage on a minimal footprint. This makes them an ideal choice for embedded systems requiring secure, high-speed, and efficient data storage solutions. ReRAM IP Cores for Embedded NVM are also designed to be highly compatible with existing fabrication processes, making their adoption relatively straightforward for industry partners looking to upscale their system capabilities without substantial redesign. As a non-volatile memory solution, they excel in low power consumption and endurance, thereby supporting a wide range of applications from automotive to consumer electronics and smart devices. Through seamless integration and superior performance features, CrossBar's ReRAM IP Cores cater to the growing need for compact and durable embedded memory solutions. By offering a reliable and powerful alternative to traditional NVM solutions, they significantly enhance the functionality and lifecycle of modern integrated systems.

CrossBar
CPU, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile DDR Controller, Mobile SDR Controller, SDRAM Controller
View Details

RecAccel N3000 PCIe for AI Recommendation System

The RecAccel N3000 PCIe Card is engineered to revolutionize recommendation systems through extraordinary efficiency and precision. It harnesses the capabilities of AI-optimized hardware to streamline data processing, empowering enterprises to deploy robust recommendation services with unparalleled accuracy. This card is specifically tailored for data-rich AI environments, facilitating high-speed computation necessary for real-time recommendations. Built to excel in demanding workloads, the RecAccel N3000 supports INT8 precision, augmenting the DLRM (Deep Learning Recommendation Model) performance with superb power efficiency. Its unique architecture ensures that it can handle millions of inferences per Joule, making it a superior choice for businesses focused on cutting-edge AI applications. With an emphasis on compatibility, the RecAccel N3000 PCIe Card integrates smoothly into diverse computing setups, minimizing installation complexity while maximizing output. It significantly elevates the capabilities of AI systems to deliver prompt and highly accurate recommendations, reinforcing business intelligence and customer engagement across platforms.

Neuchips Corporation
TSMC
16nm, 28nm
AI Processor, AMBA AHB / APB/ AXI, Coprocessor, Embedded Security Modules, Ethernet, Vision Processor
View Details

Evo Gen 5 PCIe Card for AI Inferencing

The Evo Gen 5 PCIe Card is meticulously designed for high-performance AI inferencing tasks, providing an ideal solution for enterprise-grade applications. This PCIe card leverages advanced technology to deliver outstanding efficiency in large-scale AI computations, particularly focusing on supporting LLMs (Large Language Models). By optimizing the distribution of processing loads, it significantly enhances the performance of resource-intensive AI models, ensuring seamless and rapid computations required in modern-day AI workloads. An integral feature of the Evo Gen 5 is its capability to offload the majority of processing demands from CPUs, enabling systems to achieve maximal output without overburdening core computing resources. This card not only improves throughput but also maintains energy efficiency, making it an attractive choice for data centers seeking to upgrade their infrastructure for AI tasks. Moreover, its seamless integration with existing systems ensures that businesses can easily adopt this cutting-edge technology without extensive modifications. The Evo Gen 5 PCIe Card stands out with its robust reliability and scalable AI solutions tailored to meet diverse industrial needs, driving innovation in AI deployment across a myriad of sectors.

Neuchips Corporation
TSMC
16nm, 28nm
AI Processor, AMBA AHB / APB/ AXI, CPU, D2D, Embedded Security Modules, Ethernet, RapidIO, Security Processor, Vision Processor
View Details

Physically Unclonable Function (PUF)

This innovation in silicon-based security provides a robust method for generating unique identifiers based on the intrinsic physical variations within semiconductor devices. Such variability creates a unique 'fingerprint' for each device, which can be employed for secure identification and attestation purposes. Ideal for applications requiring stringent security measures, the PUF is a versatile solution for hardware security, enabling secure key generation, anti-counterfeiting, and device authentication with unparalleled reliability.

IC Alps
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

ReRAM as FTP/OTP Memory

CrossBar's ReRAM integrated as FTP (Few-Time Programmable) and OTP (One-Time Programmable) Memory solutions represent a flexible and secure alternative for memory applications demanding configurability and permanence. This integration employs the ReRAM’s intrinsic properties to deliver robust performance and flexibility for varied programming needs. As a non-volatile memory, ReRAM FTP/OTP excels in energy efficiency, ensuring consistent performance across multiple write and read cycles. The adoption of FTP and OTP memory configurations is ideal for applications in fields such as security, IoT, and automotive where durability and reliability of stored data are paramount. By utilizing a simple memory cell structure, these configurations can be compactly designed to fit within minimal space while delivering high memory density and programming flexibility. Moreover, the capability to integrate both FTP and OTP configurations in a single memory solution offers versatility for developers needing the dual benefits of multi-use programmability and secure, single-use data setting. This combination enhances the overall utility of ReRAM in scenarios where data integrity and low power usage are essential. CrossBar's ReRAM solutions as FTP and OTP memory stand at the forefront of innovation, offering a new horizon for manufacturers seeking to advance their memory technologies. Through their adaptable nature, they support a broad spectrum of industrial applications, leveraging ReRAM's core attributes to maximize memory efficacy and reliability.

CrossBar
Cryptography Cores, Embedded Memories, Embedded Security Modules, Flash Controller, HBM, Mobile DDR Controller, Mobile SDR Controller
View Details

Security Protocol Accelerator

The Security Protocol Accelerator is engineered to enhance cryptographic processes within digital systems by offloading computationally intensive operations. By integrating this solution, systems benefit from accelerated security protocols while maintaining a low power footprint and efficient resource usage. Designed specifically for secure data transactions, this accelerator manages both symmetric and asymmetric cryptography. It enables seamless encryption processes for secure communications channels, ensuring data privacy and integrity across various platforms. As systems evolve to address ever-growing security challenges, the Security Protocol Accelerator provides the necessary infrastructure for enhancing real-time data protection protocols. This product not only ensures compliance with contemporary security standards but also prepares systems for future technology advancements, laying a foundation for post-quantum cryptographic frameworks.

PQ Secure Technologies, LLC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt