Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Security Protocol Accelerators

Security Protocol Accelerators Semiconductor IP

Security Protocol Accelerators are crucial components within the realm of semiconductor IP, designed to boost the performance of security protocols in various applications. These accelerators play a pivotal role in enhancing the speed, efficiency, and reliability of data encryption and decryption processes, which are fundamental for secure communications and transactions across networks. By implementing specialized hardware for protocol acceleration, these semiconductor IPs offer significant improvements in processing speed compared to software-only solutions.

One of the primary uses of Security Protocol Accelerators is in network security devices, including routers, firewalls, and VPNs, where they ensure secure communication by accelerating tasks such as data encryption and IPsec processing. As data breaches and cyber threats continue to evolve, the demand for robust and efficient security solutions has never been higher. These accelerators enable the optimization of cryptographic operations, providing enterprises and individuals with the confidence that their sensitive data is well-protected during transmission.

In consumer electronics like smartphones, tablets, and smart home devices, security protocol accelerators are key to maintaining user privacy without compromising on performance. They ensure that devices can handle complex security tasks quickly, extending battery life and maintaining seamless user experiences. Whether it’s ensuring the security of cloud-based services or protecting communications over Wi-Fi and cellular networks, these semiconductor IPs are increasingly vital in an interconnected world.

Moreover, the rise of IoT devices and edge computing has expanded the need for security protocol accelerators. With the massive data exchange happening at the edge of networks, having efficient security IPs ensures not just the safety of the data but also compliance with regulatory standards. As companies continue to push for innovations in AI and machine learning, the integration of security protocol accelerators in their systems helps to safeguard intellectual property and sensitive algorithms, thereby maintaining a secure operational environment. Through leveraging these semiconductor IPs, creators can focus on innovation while relying on proven security foundations.

All semiconductor IP
51
IPs available

Akida 2nd Generation

The 2nd Generation Akida builds upon BrainChip's neuromorphic legacy, broadening the range of supported complex network models with enhancements in weight and activation precision up to 8 bits. This generation introduces additional energy efficiency, performance optimizations, and greater accuracy, catering to a broader set of intelligent applications. Notably, it supports advanced features like Temporal Event-Based Neural Networks (TENNs), Vision Transformers, and extensive use of skip connections, which elevate its capabilities within spatio-temporal and vision-based applications. Designed for a variety of industrial, automotive, healthcare, and smart city applications, the 2nd Generation Akida boasts on-chip learning which maintains data privacy by eliminating the need to send sensitive information to the cloud. This reduces latency and secures data, crucial for future autonomous and IoT applications. With its multipass processing capabilities, Akida addresses the challenge of limited hardware resources smartly, processing complex models efficiently on the edge. Offering a flexible and scalable IP platform, it is poised to enhance end-user experiences across various industries by enabling efficient real-time AI processing on compact devices. The introduction of long-range skip connections further supports intricate neural networks like ResNet and DenseNet, showcasing Akida's potential to drive deeper model efficiencies without excessive host CPU calculation dependence.

BrainChip
AI Processor, Digital Video Broadcast, IoT Processor, Multiprocessor / DSP, Security Protocol Accelerators, Vision Processor
View Details

PUFrt

PUFrt represents PUFsecurity's Hardware Root of Trust solution, delivering essential security functionalities like TRNG, UID, and Secure OTP, all within a robust anti-tamper framework. As the cornerstone of their security offerings, PUFrt is designed to remain tamper-resistant, ensuring that keys and sensitive data stay on the chip, thus binding system integrity to hardware-level security. Utilizing a 1024-bit PUF-based identification, along with the entropic power of a true random number generator, PUFrt creates an unyielding security foundation for varied applications, from simple hardware keys to complex security coprocessors. This technology protects against malicious reverse engineering and counterfeiting, while also offering customization options to fit diverse system requirements, enhancing the security value across industries. Feature-rich and versatile, PUFrt easily integrates into diverse architectures, allowing for its use in a broad array of applications. By partnering with leading chip designers and foundries, PUFsecurity ensures that PUFrt not only meets current security needs but is also prepared to handle future challenges, making it a pivotal component for companies aiming to maintain a secure digital environment.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

eSi-Crypto

eSi-Crypto offers a comprehensive suite of encryption and authentication intellectual property tailored for ASIC and FPGA applications. With low resource utilization and high throughput, the package includes True Random Number Generators (TRNGs), adhering to NIST 800-22 standards, available only as hard macros in target technologies. The IP cores can operate independently or interface through AMBA APB/AHB or AXI buses, supporting encryption algorithms such as CRYSTALS Kyber, ECC, RSA, and AES. By focusing on security, eSi-Crypto helps safeguard communications and data integrity, essential in today's digital landscape. The IP suite notably features advanced cryptographic algorithms, ensuring modern applications remain secured against evolving threats.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Polar ID Biometric Security System

The Polar ID Biometric Security System is Metalenz's revolutionary solution for face authentication, delivering a new level of biometric security through advanced polarization imaging. Unlike conventional facial recognition systems, Polar ID captures the unique 'polarization signature' of each human face, offering enhanced security by effortlessly differentiating between real faces and potential spoofing attempts with sophisticated 3D masks. This innovative use of meta-optics not only enhances security but also reduces the need for complex optical modules traditionally required in consumer devices. Polar ID stands out in its ability to operate efficiently under varied lighting conditions, from bright sunlight to complete darkness. It achieves this with more than 10 times the resolution of current structured light systems, ensuring reliable and secure facial recognition performance even when users wear glasses or face coverings. By operating in the near-infrared spectrum, Polar ID extends its utility to scenarios previously challenging for facial recognition technology, thus broadening its application range. Designed for mass-market deployment, Polar ID minimizes the footprint and complexity of face unlock systems. By doing away with bulky modules, it offers a compact and cost-effective alternative while maintaining high-security standards. This innovation enables widespread adoption in consumer electronics, allowing a seamless integration into smartphones, tablets, and other mobile devices, potentially replacing less secure biometric methods like fingerprint recognition.

Metalenz Inc.
TSMC
16nm
10 Categories
View Details

HDCP Encryption-Decryption Engine

The HDCP Encryption-Decryption Engine developed by Trilinear Technologies is designed to protect digital audio and video content from unauthorized access during transmission. It aligns with the HDCP 2.2 standard, ensuring that all data exchanged between a display source and receiver remains secure and resistant to interception. This solution is vital for industries where content protection is paramount, such as in premium consumer electronics, professional audiovisual setups, and sensitive government or military communication channels. This engine supports the authentication protocols necessary for protected transactions over DisplayPort interfaces, using sophisticated AUX channels to seal data transfer securely. It is engineered to reduce the processing load by offloading encryption tasks from the system processor, thereby enhancing the overall system performance while maintaining robust security. Capable of integrating into a range of devices from set-top boxes to large multimedia systems, the HDCP Encryption-Decryption Engine offers developers a trustworthy method to shield content from piracy and unauthorized dissemination. Its implementation ensures that content providers can operate freely with the assurance that their digital rights are upheld across all endpoints.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Secure Protocol Engines

Secure Protocol Engines are designed to significantly enhance network and security processing capabilities. This IP offers high-performance processing of network traffic with secure protocol applications. It includes efficient engines for SSL/TLS handshakes and algorithms such as MACsec and IPsec, enabling swift encryption and decryption, thus enhancing security for data centers and similar infrastructures. These engines help in offloading intensive cryptographic operations from CPUs, thereby optimizing performance and resource allocation.

Secure-IC
AMBA AHB / APB/ AXI, CXL, Embedded Security Modules, Ethernet, I2C, IEEE1588, Security Protocol Accelerators, USB, V-by-One
View Details

xT CDx

The xT CDx is a sophisticated tumor profiling solution designed to advance precision oncology care for solid malignancies. This assay uses next-generation sequencing to assess alterations in 648 genes, identifying single nucleotide variants, multi-nucleotide variants, and insertions/deletions. It also evaluates microsatellite instability status and serves as a companion diagnostic to explore potential treatment avenues according to specific therapeutic product labeling. Uniquely, xT CDx offers mutation profiling through samplings from both formalin-fixed paraffin-embedded tumor tissues and matched normal samples such as blood or saliva, enhancing diagnostic clarity and treatment direction for patients with solid tumors. The comprehensive report generated includes valuable insights that can inform the personalized treatment path for cancer patients.

Tempus Inc.
15 Categories
View Details

DAES Cryptographic Processor

The DAES processor is an ultra-secure cryptographic co-processor that efficiently implements the Rijndael encryption algorithm. This processor provides robust support for both 128 and 256-bit key lengths, while also facilitating a variety of block cipher modes such as ECB, CBC, and other standards. It incorporates an internal key expansion module to guarantee prompt and secure data encryption processes, positioning it as a vital asset for environments where data confidentiality is paramount. By integrating smoothly via APB, AHB, and AXI bus interfaces, it adapts seamlessly across differing systems requiring top-tier security.

DCD-SEMI
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is a cutting-edge security solution designed to enhance the protection and management of digital assets within the crypto industry. Combining microcontroller technology with secure elements, Cramium PHSM delivers a robust security framework that outperforms traditional measures. The module is engineered to offer top-tier tamper-resistance, ensuring that sensitive keys and cryptographic data remain secure against physical and logical threats. Cramium PHSM is pivotal in redefining industry standards by integrating advanced protection mechanisms that cater specifically to the fast-evolving demands of cryptocurrency and blockchain applications. Its architecture is designed for adaptability and high performance, ensuring seamless integration into various systems and promoting secure, decentralized operations. Moreover, CrossBar is committed to providing open-source solutions that foster transparency and reliability in the digital asset space. The PHSM not only bolsters security but also enhances trust, thereby supporting open collaboration and innovation within the industry. By focusing on delivering secure and flexible solutions, the Cramium PHSM is set to play a crucial role in safeguarding digital assets and ensuring the integrity of next-generation secure computing systems. Overall, Cramium PHSM exemplifies CrossBar's forward-thinking approach in addressing the cybersecurity needs of modern technologies, reaffirming their position as leaders in secure memory component design. It supports global security standards, making it indispensable for developers and companies aiming to fortify their digital infrastructure against emerging cyber threats.

CrossBar
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, provides a comprehensive security solution for devices throughout their lifecycle. It enables zero-touch security lifecycle services, including provisioning, firmware updates, security monitoring, and device identity management. The platform integrates Secure-IC's Root of Trust, ensuring robust system protection from chip-level threats. By combining strong hardware and software security measures, it ensures end-to-end protection for devices operating in various environments.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AES Core

The AES Core by Green IP Core is designed for robust encryption standards in digital systems. This core provides advanced encryption standard (AES) operations, implementing secure encryption and decryption processes crucial for protecting sensitive information in today's digital age. With its efficient design, the AES Core ensures data security across various applications, including communications and financial systems. Engineered for flexibility, this core is compatible with a variety of bus systems and interfaces, allowing seamless integration with existing infrastructure. The AES Core can be synthesized across different FPGA platforms, making it an ideal choice for organizations that need reliable encryption solutions adaptable to diverse hardware configurations. Its versatility and compliance with established encryption standards make the AES Core a valuable asset for industries that demand high security. Whether dealing with sensitive data exchanges or protecting intellectual property, the AES Core provides an effective measure against unauthorized access and cyber threats.

Green IP Core
All Foundries
All Process Nodes
Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

aiWare

aiWare stands out as a premier hardware IP for high-performance neural processing, tailored for complex automotive AI applications. By offering exceptional efficiency and scalability, aiWare empowers automotive systems to harness the full power of neural networks across a wide variety of functions, from Advanced Driver Assistance Systems (ADAS) to fully autonomous driving platforms. It boasts an innovative architecture optimized for both performance and energy efficiency, making it capable of handling the rigorous demands of next-generation AI workloads. The aiWare hardware features an NPU designed to achieve up to 256 Effective Tera Operations Per Second (TOPS), delivering high performance at significantly lower power. This is made possible through a thoughtfully engineered dataflow and memory architecture that minimizes the need for external memory bandwidth, thus enhancing processing speed and reducing energy consumption. The design ensures that aiWare can operate efficiently across a broad range of conditions, maintaining its edge in both small and large-scale applications. A key advantage of aiWare is its compatibility with aiMotive's aiDrive software, facilitating seamless integration and optimizing neural network configurations for automotive production environments. aiWare's development emphasizes strong support for AI algorithms, ensuring robust performance in diverse applications, from edge processing in sensor nodes to high central computational capacity. This makes aiWare a critical component in deploying advanced, scalable automotive AI solutions, designed specifically to meet the safety and performance standards required in modern vehicles.

aiMotive
AI Processor, Building Blocks, CPU, Cryptography Cores, Platform Security, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

HOTLink II IP Core

The HOTLink II core delivers a comprehensive layer 2 hardware implementation tailored for High-Speed Interface (HSI) applications. This core facilitates easy integration through its adept frame interface, supporting full-rate, half-rate, and quarter-rate operations, adhering strictly to established standards. Its design is tailored to seamlessly fit within the F-18 compatible interfaces. Strategically developed for efficiency, it allows precise control processes at the data link layer, reducing latency and optimizing transmission speed. Whether integrated into aerospace systems or complex defense architectures, HOTLink II ensures high-speed, error-free communications crucial for mission-critical scenarios. This solution provides essential functionalities that bolster data exchange in sophisticated environments by minimizing the risk factors inherent in high-velocity data transmissions. With its ability to maintain consistent performance across various rates, HOTLink II stands as a critical solution for modern high-frequency connectivity challenges.

New Wave Design
AMBA AHB / APB/ AXI, Ethernet, Security Protocol Accelerators
View Details

FortiPKA-RISC-V

The FortiPKA-RISC-V is a highly specialized Public Key Algorithm coprocessor designed to streamline cryptographic operations by integrating modular multiplication with protections against side-channel and fault injection threats. It operates without the need for Montgomery domain transformations, optimizing the coprocessor’s performance while reducing area requirements. Tailored for applications demanding high efficiency and security, FortiPKA-RISC-V ensures robust performance in public key operations, suitable for secure communications and data protection scenarios. With a focus on reduced latency and power efficiency, this coprocessor can be implemented in various platforms, enhancing protection in devices and systems The coprocessor is part of FortifyIQ's line of advanced IP solutions, providing a technology-agnostic approach that is adaptable to diverse environments. The FortiPKA-RISC-V offers benefits in applications requiring stringent security and efficiency, making it an ideal solution for developers looking to enhance cryptographic functionalities.

FortifyIQ
AMBA AHB / APB/ AXI, Coprocessor, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems, Vision Processor
View Details

AES-XTS for Encryption of Storage Devices

Helion Technology's AES-XTS solution offers state-of-the-art encryption for data-at-rest in storage systems, adept at mitigating threats such as copy-paste and dictionary attacks. AES-XTS operates by encrypting disk sector data with blocks of 16-bytes under a secret AES key, incorporating a modifier value corresponding to each block's logical disk location. This method ensures that identical plaintext sectors stored at different positions yield different encrypted outputs. Designed to handle high performance requirements, Helion's AES-XTS cores enable custom levels of throughput scaling from 1Gbps up to over 64Gbps, suitable for diverse scenarios like servers and high-speed SSDs. The product range includes single, twin, quad, and giga variants, aligning closely with specific performance and logic resource parameters, optimizing both hardware usage and security efficacy. This flexibility and adherence to the IEEE 1619 standard make Helion's AES-XTS cores valuable for any application demanding secure disk-level encryption. Available for either ASIC or FPGA platforms, these cores are constructed to leverage the unique capabilities of each technology, achieving the best possible performance across different use cases.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details

JPEG-LS Encoder

The Lancero JPEG-LS Encoder IP is a highly efficient FPGA-based implementation of the JPEG-LS standard, designed for superior lossless image compression. This IP core sets a high benchmark for image compression with minimal resource usage and eliminates the need for external memory. JPEG-LS excels in lower complexity and resource demand compared to JPEG-2000, delivering better compression for numerous lossless scenarios. The core is capable of handling image samples ranging from 8 to 16 bits, providing flexibility across various image-processing tasks. Its architecture supports pixel and data FIFO interfaces in addition to the Avalon Streaming interface with back-pressure control, ensuring robust data management and throughput. The IP's design allows one pixel to be encoded per clock cycle, optimizing performance for high-speed image processing applications. Developers can configure output data word widths and adapt image sizes up to ultra-high-definition, accommodating diverse applications from medical imaging to high-end photography.

Parretto B.V.
JPEG, JPEG 2000, Security Protocol Accelerators
View Details

Quantum Resistant Encryption Core

Crypto Quantique’s Quantum Resistant Encryption Core offers a robust solution for post-quantum cryptography challenges. This core is designed to withstand potential vulnerabilities that arise with quantum computing technology. It leverages advanced quantum-driven technology to create secure cryptographic keys that are resistant to traditional and quantum-based attacks. It is aimed at providing a future-proof security framework for next-generation electronic devices. The product ensures data integrity and confidentiality, crucial for applications where data breaches could have severe consequences. With a strong emphasis on secure key storage and management, the Quantum Resistant Encryption Core is ideal for industries needing enhanced security measures, such as finance, healthcare, and government sectors. Additionally, this encryption core supports scalable and efficient deployment across various IoT devices. Its compatibility with existing cryptographic systems ensures that companies can integrate it into their current infrastructure without significant overhauls, enabling seamless transitions to quantum-secure communications.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Calibrator for AI-on-Chips

The ONNC Calibrator is engineered to ensure high precision in AI System-on-Chips using post-training quantization (PTQ) techniques. This tool enables architecture-aware quantization, which helps maintain 99.99% precision even with fixed-point architecture, such as INT8. Designed for diverse heterogeneous multicore setups, it supports multiple engines within a single chip architecture and employs rich entropy calculation techniques. A major advantage of the ONNC Calibrator is its efficiency; it significantly reduces the time required for quantization, taking only seconds to process standard computer vision models. Unlike re-training methods, PTQ is non-intrusive, maintains network topology, and adapts based on input distribution to provide quick and precise quantization suitable for modern neural network frameworks such as ONNX and TensorFlow. Furthermore, the Calibrator's internal precision simulator uses hardware control registers to maintain precision, demonstrating less than 1% precision drop in most computer vision models. It adapts flexibly to various hardware through its architecture-aware algorithms, making it a powerful tool for maintaining the high performance of AI systems.

Skymizer
All Foundries
All Process Nodes
AI Processor, Coprocessor, Cryptography Cores, DDR, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

L5-Direct GNSS Receiver

The L5-Direct GNSS Receiver from oneNav is a groundbreaking solution that leverages the power of the modern L5-band satellite signals. Unlike traditional systems that rely on the older L1 band, this receiver directly captures L5 signals, providing robust and accurate positioning, even in challenging environments where interference and multipath distortion are common. This direct acquisition capability ensures superior location accuracy, making it ideal for applications in smartphones, smartwatches, IoT devices, and the automotive sector where precision is critical. oneNav's L5-Direct GNSS Receiver is built on a unique IP core that minimizes the footprint and power consumption required for high-performance GNSS solutions. By reducing reliance on the L1 band, which dates back to 1977, the receiver mitigates the typical vulnerabilities of older GPS technologies. Its advanced architecture supports a single RF chain design that is both space- and cost-efficient, allowing for easier integration into existing hardware. The receiver utilizes state-of-the-art artificial intelligence and machine learning techniques to enhance signal acquisition and mitigate errors due to multipath effects. This ensures that signals are processed with high precision, offering significant advantages in urban environments with heavy signal obstruction. Additionally, oneNav's IP core is highly adaptable, capable of operating across various foundries and process nodes, providing a flexible solution for a wide range of device manufacturers.

oneNav, Inc.
GLOBALFOUNDARIES, TSMC
12nm, 22nm
ADPCM, AI Processor, Bluetooth, GPS, Security Protocol Accelerators, Wireless Processor
View Details

NeuroSense AI Chip for Wearables

The NeuroSense AI Chip is a remarkable innovation for wearable technology, designed to address the key pain points of power consumption and data privacy in mass-market devices. It significantly enhances the accuracy of heart rate measurements and human activity recognition, operating independently of the cloud. The chip processes data at the sensor level, which not only increases precision but also extends battery life, a crucial factor for fitness trackers, smartwatches, and health monitoring devices. With unparalleled power efficiency, the NeuroSense chip maintains high accuracy by implementing analog computation and neural network strategies, translating to more effective biometrics extraction. NeuroSense excels in reducing the typical power burdens of AI-capable wearables. The diminutive size allows for easy integration into small devices without compromising functionality. By bypassing the need for cloud data processing, it ensures faster response times and greater privacy for users. Its capacity to learn from and accurately classify human activity transcends simple monitoring, offering potential expansions into fields like exercise coaching and senior care. Additionally, the NeuroSense chip allows for extended device operation times, which conventional sensor units struggle to deliver. It supports a broader range of applications by making wearables more intelligent and adaptive to various user needs. This positions the NeuroSense as a leading choice for developers seeking to enhance product features while minimizing cost and energy demands.

Polyn Technology Ltd.
CPU, Input/Output Controller, Microcontroller, Security Protocol Accelerators, Vision Processor
View Details

Securyzr Key Management System

The Securyzr Key Management System provides a robust framework for managing cryptographic keys within embedded systems. By ensuring secure storage, key generation, and access protocols, it strengthens the cryptographic foundation of devices. This system supports multiple security applications and meets stringent certification requirements, ensuring that key information remains protected throughout the device lifecycle. It enhances security by preventing unauthorized access and preserving data integrity through effective key management strategies.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

AES (standard modes) for Secure Encryption

Helion Technology offers industry-standard AES solutions effective for high data security applications across various industries. Their AES cores, used globally in commercial developments, can perform encryption and decryption using 128-bit, 192-bit, or 256-bit keys, depending on the intended security level. These cores cater to needs ranging from ultra-low area usage and data rates to top-tier multi-gigabit applications. Helion’s AES cores are distinguished by their ability to deliver performance close to that of ASICs when programmed into FPGAs like those from Xilinx, Altera, Microsemi, and Lattice. Clients have access to a series of AES engine families that cover an array of requirements from ultra-low size to very high-speed executions. The cores are designed to seamlessly integrate into any design, emphasizing user-friendliness and flexibility. They cater to multiple modes, such as CBC, CFB, CTR, and others, with validated solutions for applications needing hardware acceleration of the basic AES algorithm. This portfolio further extends to specialized configurations for advanced applications like AES-CCM, AES-GCM, and those needing key wrapping or supporting communication protocols like IPsec and SSL.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Other, Security Protocol Accelerators
View Details

DSHA2-256 Cryptography Co-Processor

The DSHA2-256 co-processor is adept at boosting the SHA2-256 hash function's execution, following the FIPS PUB 180-4 compliance. Designed to handle rigorous data integrity and authentication tasks, it supports HMAC natively and accommodates SHA2 hashing in both 224 and 256-bit modes. This cryptographic part seamlessly interfaces with APB, AHB, and AXI buses, ensuring versatility across platforms. By enhancing data security protocols such as digital signatures, this co-processor plays a critical role in safeguarding modern digital communications.

DCD-SEMI
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

PUFcc

PUFcc is an advanced crypto coprocessor that combines a Hardware Root of Trust with a comprehensive set of cryptographic algorithms, creating a versatile security module suitable for a wide range of system architectures. This turnkey solution enables seamless integration of security protocols into existing systems, making it a critical component in industries such as IoT, AI, automotive, and fintech. It establishes a secure foundation for device security, complementing existing software solutions by providing deep hardware-level protection from design to deployment. The PUFcc integrates a NIST CAVP-certified crypto accelerator, along with OSCCA-compliant ciphers and key derivation algorithms. It features advanced components like the APB and AXI interfaces, facilitating rapid memory access, and a sequencer to eliminate the need for additional processors or boot ROMs. The coprocessor also offers capabilities for extending protection to external flash memory, ensuring secure handling of sensitive data across its lifecycle. With over-the-air secure boot, TLS support, and robust key management possibilities, PUFcc simplifies and strengthens SoC design while providing a secure boundary to protect against threats like cloning and unauthorized access. Its scalable and customizable nature, exemplified by the addition of the PUFcc7 model, allows it to adapt to evolving security requirements, making it an indispensable tool for developers and manufacturers focused on robust cybersecurity infrastructures.

PUFsecurity
Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

AES-GCM for Authenticated Encryption

AES-GCM is an innovative authenticated encryption technique, employing universal hashing in a binary Galois field to secure data with concurrent privacy and authentication. Known for enabling very high data rates thanks to pipeline and parallel processing efficiencies, AES-GCM is used in a variety of networking and storage applications. This method is recognized by several standards, including MACsec and ANSI Fibre Channel protocols, offering unmatched data protection across high-speed environments. Helion's AES-GCM offerings span throughput requirements from modest 50Mbps to beyond 40Gbps, accommodating diverse performance and area constraints without sacrificing efficiency. These cores are meticulously optimized for major target technologies like Altera, Microsemi, and Xilinx FPGAs, as well as ASIC implementations, ensuring compatibility and high performance across platforms. Each AES-GCM version is tweaked for particular throughput needs while maintaining a compact logic footprint, reflecting Helion's engineering precision and quality. Whether for low or ultra-high bandwidth demands, Helion's solutions present robust encryption capabilities, underscored by ease of integration and operation benefits.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator from ResQuant is specifically designed to cater to unique client needs, with a variety of configurable options ensuring peak quantum-safe security. It is designed for seamless integration and supports all NIST PQC standards, including algorithms such as Dilithium, Kyber, XMSS, and Sphinx+. The accelerator is adaptable, allowing extensions by other algorithms and customer-specific requirements. This flexibility, combined with resilience against various side-channel attacks like Differential Power Analysis (DPA) and Timing, makes it a robust choice for secure implementations. The accelerator is further enhanced by its readiness for AXI 4 integration, positioning it well for incorporation into modern system designs. This makes it an efficient and future-proof solution for entities looking to adopt quantum-resistant security measures. Cost-effectiveness, coupled with superior security features, positions ResQuant's solution as a prime candidate for industries looking to shield their operations against future quantum threats. Their workshop offerings empower organizations, providing insights into quantum computing threats and strategies for transitioning to post-quantum cryptography. Participants gain an understanding of how to reinforce their infrastructure to withstand emerging quantum challenges, setting a foundation for proactive, quantum-safe security strategies moving forward.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

ONNC Compiler

The ONNC Compiler is a sophisticated tool designed for AI-on-chip implementations, facilitating the transformation of neural networks into machine-specific instructions. Its architecture is particularly advantageous for heterogeneous multicore SoCs, accommodating configurations like big.LITTLE ARM and various DSPs. The compiler supports a modular parser that leverages MLIR frameworks, facilitating support for popular deep learning frameworks like PyTorch and TensorFlow. It includes both single and multiple backend modes, ensuring adaptability across broad AI system-on-chip architectures, including support for PCIe accelerators and application processors in smartphones. One of the standout features of ONNC is its capability to manage fragmented memory spaces, allowing efficient data flow and optimization across complex systems. Its design addresses intricate memory configurations with non-linear, often fragmented memory spaces, and it offers a high-dimensional memory allocation system that minimizes RAM usage. ONNC enhances performance by optimizing data movement with techniques such as software pipelining and DMA allocation, ultimately aiming to maximize processing element utilization and reduce memory overhead. The ONNC Compiler has been engineered to be modular and retargetable, allowing it to cater to diverse hardware architectures and optimize both performance and resource use. Key optimizations such as software pipelining, DMA scheduling, and memory management support are built into its backend, making ONNC an attractive choice for those looking to maximize efficiency in AI system design.

Skymizer
All Foundries
All Process Nodes
AI Processor, AMBA AHB / APB/ AXI, CPU, Multiprocessor / DSP, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators
View Details

i.MX RT700 Crossover MCU

Designed to meet the growing demand for speed and efficiency in embedded systems, the i.MX RT700 Crossover Microcontroller Unit (MCU) combines high-performance processing with real-time operation capabilities. The RT700 MCU, currently in preproduction, is powered by five computing cores, ensuring unmatched performance in AI-driven and IoT applications. The i.MX RT700 excels with its ability to facilitate complex computations and seamless real-time data processing—a necessity for modern devices requiring quick response and accuracy. This makes it particularly beneficial for edge processing in smart tech solutions, offering a reliable backbone for AI systems and IoT infrastructures. Its comprehensive structure supports advanced multimedia applications, paving the way for innovations across various sectors by enhancing user interactions and overall device capabilities. This aligns it as a prime facilitator of cutting-edge technological growth, offering possibilities for developers to create more intuitive and powerful solutions.

NXP Semiconductors
All Foundries
All Process Nodes
2D / 3D, CPU, IoT Processor, Microcontroller, Processor Core Independent, Security Protocol Accelerators
View Details

PhantomBlu - Tactical Communications

PhantomBlu serves as Blu Wireless's sophisticated mmWave solution for defense and military operations. It offers advanced tactical connectivity between vehicles and platforms whether on land, air, or sea. The system is designed to support high-performance applications and provides secure, mobile IP networking via a tactical, anti-jam resistant mesh network. PhantomBlu delivers superior data handover capabilities, ensuring low probability of interception and detection, essential for critical military communications. This system is crafted to be highly scalable and customizable, making it suitable for diverse defense needs, from securing critical infrastructure to enhancing vehicular and airborne communication capabilities. Its design supports a range of operational environments and provides robust communications over expansive areas, utilizing innovative integration with electronic warfare systems and cyberspace operations. PhantomBlu elevates defense communications by eliminating dependency on fixed infrastructure such as fiber optics, ensuring rapid setup and high resilience. PhantomBlu integrates advanced networking capabilities that rival and surpass conventional fiber optics, offering a flexible, high-bandwidth system perfectly aligned with modern C4ISR needs. The platform supports long-range connections and boasts rigorous encryption to safeguard tactical data. Its mesh network is tailor-made for interoperability, facilitating cross-domain data sharing efficiently. PhantomBlu embodies the future of military communications, offering dynamic scalability and thrilling operational advantages for defense forces worldwide.

Blu Wireless Technology Ltd
3GPP-5G, 802.11, Bluetooth, CAN, CPRI, Cryptography Cores, Ethernet, MIL-STD-1553, OBSAI, RF Modules, Security Protocol Accelerators, UWB, W-CDMA, Wireless Processor, Wireless USB
View Details

Side-channel Attack Resistance

FortifyIQ's Side-channel Attack Resistance offers advanced security solutions designed to protect devices against SCA vulnerabilities during the early design stages. By enabling integrated simulations of side-channel scenarios, it supports identifying and mitigating potential weaknesses before hardware manufacturing. This capacity ensures cost-effective and timely preventative measures that preempt costly post-production fixes. Integrating advanced testing methodologies such as the rigorous Test Vector Leakage Assessment (TVLA), FortifyIQ’s SCA solution allows comprehensive assessment and validation of security under extreme scenarios. The technology successfully detects fault injection risks, ensuring the highest standards of security compliance are met. This system is particularly vital for sectors where data integrity and security are paramount, including automotive, defense, and Internet of Things (IoT). Its extensive simulation and analysis capabilities allow users to optimize systems efficiently, ensuring safe deployment and continuous protection of sensitive data against evolving security challenges.

FortifyIQ
UMC
28nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

NeoPUF

NeoPUF stands out as a revolutionary hardware security technology leveraging the concept of Physically Unclonable Functions (PUF). NeoPUF is predicated on the intrinsic variances found in silicon during the manufacturing process, providing a unique and immutable identifier akin to a fingerprint for semiconductor devices. As a foundation for hardware security, NeoPUF excels in delivering unmatched protection by generating random, unique numbers for each device. These numbers can be utilized as identifiers, root keys, or cryptographic nonces, ensuring secure key management, authentication, and data encryption. Its tamperproof nature makes it an ideal component for applications where security is paramount. The introduction of NeoPUF allows companies to integrate a hardware root of trust directly into their silicon designs, offering a straightforward, cost-effective solution to modern security challenges. Whether for IoT devices, mobile computing, or enterprise-level systems, its deployment offers heightened security while simplifying the key management infrastructure.

eMemory Technology Inc
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AES Crypto

The AES Crypto solution from Dillon Engineering offers a robust platform for secure data encryption and decryption operations compliant with the Federal Information Processing Standard (FIPS) 197. Utilizing Dillon's advanced ParaCore Architect™ technology, this IP Core can be easily tailored to fit varying application requirements, rendering it versatile for multiple industry uses. This AES core supports different operational modes as per NIST specifications, such as ECB, CBC, CFB, OFB, and CTR, providing a comprehensive suite of encryption capabilities. Its adaptability makes it suitable for both FPGA and ASIC implementations, allowing developers to meet specific security and performance needs seamlessly. Designed for maximum throughput, Dillon's AES Crypto solution ensures that data processing speeds up to 12.8 Gb/s are achievable, without compromising on security. The architecture allows for dynamic key changes without affecting data throughput, offering a flexible solution for complex data environments that prioritize security and efficiency.

Dillon Engineering, Inc.
Cryptography Cores, Security Protocol Accelerators
View Details

Fault Resistant AES Core

The Fault Resistant AES Core offers enhanced encryption capabilities with built-in protection against faults. This IP integrates traditional AES encryption with advanced fault detection and correction features, making it particularly suitable for applications requiring both high security and reliability. The core is designed to detect and rectify faults in real-time, preventing data corruption during transmission or storage. By embedding fault-tolerance mechanisms directly within the encryption process, the Fault Resistant AES Core minimizes vulnerabilities associated with soft errors or environmental interference. This makes it ideal for use in critical systems such as automotive electronics, where data integrity is crucial. Incorporating patented technologies, this IP stands out for its robustness in maintaining security even under power fluctuations or transient errors. The Fault Resistant AES Core is compatible with various FPGA and ASIC platforms, offering a reliable, adaptable, and secure solution for modern electronic systems.

Green IP Core
All Foundries
All Process Nodes
Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Individual IP Core Modules

ResQuant's Individual IP Core Modules offer a plethora of options, each embedded with comprehensive NIST post-quantum cryptography standards. The selection includes powerful algorithms such as Dilithium, Kyber, XMSS, and SPHINCS+, alongside AES modes like ECB, CBC, and GCM, and secure hash functions like SHA2 and SHA3 families. These modules are crafted to fortify various systems with cutting-edge security mechanisms, ensuring data integrity and confidentiality. The flexibility of these IP Core Modules makes them incredibly beneficial for environments that require enhanced encryption and protection against quantum-level threats. Their design supports versatile applications, catering to tailored needs across different industry verticals, ensuring robust security solutions that align with future-proofing strategies. ResQuant's expertise shines through in these modules, highlighted by their inclusion of cryptographic protocols well-suited to counteract quantum computing challenges. Emphasizing scalability and adaptability, these IP Core Modules serve as key components for industries like IoT, automotive, military, and communications, which demand higher security affordances to safeguard critical operations and data from evolving threats.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators
View Details

CANsec Controller Core

Designed for secure in-vehicle networking, the CANsec Controller Core is a cutting-edge solution for enhancing the security aspects of Controller Area Network (CAN) communications. This core integrates cryptographic protocols to safeguard automotive data transmissions from potential cyber threats, ensuring privacy and data integrity. Apart from boosting security, it also maintains the legacy CAN protocol’s simplicity and robustness, making it suitable for a wide range of automotive applications. This flexibility allows automotive manufacturers to upgrade existing systems with state-of-the-art security without necessitating a complete redesign. The CANsec Controller Core exemplifies Fraunhofer IPMS’s innovative approach to intertwining security with traditional automotive frameworks, ultimately leading to more secure and trustworthy in-vehicle communication systems.

Fraunhofer IPMS
CAN, CAN XL, CAN-FD, Cryptography Cores, Security Protocol Accelerators, Temperature Sensor
View Details

Digital Systems and Security Solutions

VeriSyno's Digital Systems and Security Solutions focus on ensuring high-performance operations within digital frameworks while emphasizing secure data management. These solutions cover a vast array of applications, from memory controller interfaces and network solutions to advanced security protocols. The goal is to provide digital systems that are not only efficient but also robust against modern security challenges. These digital IP components, including network IP solutions like vMAC, attend to contemporary issues by integrating AI and authentication technologies. Such innovations are designed to meet the security demands of today’s digital landscape, empowering enterprises with reliable solutions that safeguard data while optimizing performance. By offering these advanced digital components, VeriSyno empowers industries such as finance, healthcare, and IT with crucial IP that enhances data processing capabilities and secures operational integrity. Their security solutions are instrumental in facilitating secure and efficient operations in a variety of digital environments.

VeriSyno Microelectronics Co., Ltd.
Arbiter, Cryptography Cores, DDR, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Physically Unclonable Function (PUF)

This innovation in silicon-based security provides a robust method for generating unique identifiers based on the intrinsic physical variations within semiconductor devices. Such variability creates a unique 'fingerprint' for each device, which can be employed for secure identification and attestation purposes. Ideal for applications requiring stringent security measures, the PUF is a versatile solution for hardware security, enabling secure key generation, anti-counterfeiting, and device authentication with unparalleled reliability.

IC Alps
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Security Protocol Accelerator

The Security Protocol Accelerator is engineered to enhance cryptographic processes within digital systems by offloading computationally intensive operations. By integrating this solution, systems benefit from accelerated security protocols while maintaining a low power footprint and efficient resource usage. Designed specifically for secure data transactions, this accelerator manages both symmetric and asymmetric cryptography. It enables seamless encryption processes for secure communications channels, ensuring data privacy and integrity across various platforms. As systems evolve to address ever-growing security challenges, the Security Protocol Accelerator provides the necessary infrastructure for enhancing real-time data protection protocols. This product not only ensures compliance with contemporary security standards but also prepares systems for future technology advancements, laying a foundation for post-quantum cryptographic frameworks.

PQ Secure Technologies, LLC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

QDID PUF

The QDID PUF, a core offering from Crypto Quantique, leverages quantum tunneling current variations to generate unique, unforgeable device identities. This patented Physical Unclonable Function (PUF) technology generates identities based on oxide thickness variations within standard CMOS processes, creating an unpredictable and secure hardware root-of-trust. Instead of relying on stored identities that are vulnerable to tampering and side-channel attacks, QDID PUF creates identities dynamically on demand. This approach minimizes security risks associated with permanent identity storage and makes the system robust against attacks such as counterfeiting and cloning. The IP is optimized for various cryptographic applications, including key generation and device authentication, making it suitable for high-security environments in medical, industrial, and IoT applications. Its design ensures compliance with rigorous security standards and its adaptability extends to integration in diverse hardware platforms, providing a versatile and secure solution. Moreover, QDID PUF is validated across multiple manufacturing nodes and process technologies, ensuring its reliability and performance in different environmental conditions, further underscoring its suitability for long-term deployment in a range of applications. Its robustness across voltage and temperature variations reinforces its capability as a secure element in electronic devices.

Crypto Quantique
GLOBALFOUNDARIES, TSMC, UMC
55nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

The PUFhsm is PUFsecurity's sophisticated Hardware Security Module, tailored for automotive industries and advanced applications that demand high-level security. Designed as an Embedded Security Enclave, it compartmentalizes sensitive information, isolating it from the main system to bolster security. Incorporating a dedicated CPU, cryptographic engines, and advanced software modules, PUFhsm addresses a plethora of automotive and industrial security applications. It is particularly compatible with EVITA-Full compliance, setting a benchmark for in-vehicle and chip-level security against modern cybersecurity threats. PUFhsm not only supports robust applications like secure boot, secure updating, and lifecycle management but also facilitates key management and secure debugging. Its architecture is designed to be interchangeable with PUFrt, enhancing anti-tampering capabilities and optimizing system resource use. The cohesive design provides a scalable security solution adaptable to various system requirements, ensuring the integrity and authenticity of all software and hardware components.

PUFsecurity
Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

MACSec

CoMira Solutions offers a Media Access Control Security (MACSec) solution adhering to IEEE standards aimed at safeguarding communication within 802.1 LAN environments. MACSec ensures data confidentiality and integrity, preventing unauthorized access and disruptions. It employs advanced encryption standards and supports flexible traffic management through various port configurations. The MACSec IP's time-division multiplexed architecture aligns seamlessly with CoMira's UMAC, ensuring synchronous operation despite differing link speeds. This implementation includes FIPS-compliant encryption methods such as GCM-AES-128 and GCM-AES-256, supporting robust security needs. Furthermore, CoMira's MACSec supports multiple secure channels and security associations per port, adding layers of protection to client systems. The configurability of Secure Channels and the ability to strip security tags enhances its adaptability in varied networking scenarios, reflecting CoMira's commitment to delivering tailor-fit security solutions.

CoMira Solutions
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Stellar Packet Classification Platform

The Stellar Packet Classification Platform for FPGAs provides a sophisticated packet processing solution capable of handling ultra-high-speed search operations. Its architecture supports advanced functions through extensive lookup rules based on complex Access Control Lists (ACL) and Longest Prefix Match (LPM), making it essential for advanced networking tasks requiring scalability and high performance.\n\nDesigned to manage numerous and varied network rules, Stellar supports performance requirements ranging from 25 Gbps to over 1 Tbps. It features the ability to execute hundreds of millions of lookups per second, catering to the demands for high-speed data forwarding and network security operations. Its design allows for seamless integration into existing network infrastructure, optimizing processes like IPv4/6 routing, firewall management, and anti-DDoS systems.\n\nIts scalable architecture enables real-time updates and modifications, supporting high-reliability systems that require minimal downtime and maximal efficiency. Stellar's capabilities are integral to maintaining robust network infrastructures, preventing intrusions, and ensuring secure data flow across complex networks. The platform's adaptability makes it a versatile component in telecommunications, data centers, and enterprise networking environments.

Peraso
AMBA AHB / APB/ AXI, Error Correction/Detection, Ethernet, Receiver/Transmitter, Security Protocol Accelerators, Security Subsystems, VESA
View Details

Suite-Q HW

Suite-Q HW represents a sophisticated system-on-chip (SoC) design that integrates essential cryptographic operations crucial for modern data security protocols. Targeting both high-end servers and low-end embedded systems, Suite-Q HW employs a unified hardware architecture to ensure efficient execution of cryptographic tasks. This hardware solution supports a diverse range of cryptographic algorithms, including both classical and post-quantum options. It incorporates advanced public key cryptographic operations such as ECDSA and various isogeny, lattice, and code-based strategies awaiting broader standardization. The suite’s flexibility allows it to adapt to different operational demands and integrate with existing infrastructure seamlessly. Suite-Q HW's cornerstone is its high degree of configurability, offering customizable performance based on targeted applications. This versatility ensures optimal resource allocation, making it a preferred choice for systems requiring stringent security measures without compromising on computational efficiency. With optional features for defending against differential power analysis (DPA) attacks, the SoC further enhances its defense mechanisms, ensuring robust protection against sophisticated threats.

PQ Secure Technologies, LLC
AI Processor, AMBA AHB / APB/ AXI, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

ReRAM Secure Keys

ReRAM Secure Keys by CrossBar redefine memory integration for secure cryptographic applications through innovative use of ReRAM technology. These secure keys utilize the physical unclonable function (PUF) capabilities of ReRAM, offering a superior security measure against unauthorized access and data breaches. ReRAM Secure Keys facilitate a high level of data protection critical for cryptographic operations across various systems. By implementing PUF technology, ReRAM Secure Keys prevent duplication and hacking attempts, making them an integral component for systems requiring high-level security, such as secure computing and financial transactions. This built-in security mechanism ensures ReRAM Secure Keys remain unique and resistant against cloning, thereby enhancing the security infrastructure of the systems they are deployed in. The ReRAM Secure Keys are designed to be easily integrated with existing memory architectures, reducing complexity and ensuring seamless adaptation to a wide variety of applications. The low power requirements and stable performance across diverse environments further their suitability for robust security applications. As digital security threats evolve, CrossBar's ReRAM Secure Keys stand as a vital solution for advancing secure encryption key storage, ensuring data integrity, and offering peace of mind for industries facing increasing cybersecurity challenges. This pioneering approach marks a significant milestone in embedded secure memory design, ready to address future technology needs.

CrossBar
Cryptography Cores, Embedded Memories, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details

True Random Number Generator (TRNG)

The True Random Number Generator (TRNG) core by IP Cores, Inc. is designed for generating true random numbers suitable for high-security applications. Passing stringent tests like the NIST SP800-22 and Diehard Suites, this core provides reliable randomness that is crucial in cryptographic systems. Compact and efficient, the TRNG core leverages an on-chip entropy source and a pseudo-random generator to produce high-entropy outputs. This makes it ideal for applications that require random number generation meeting exacting cryptographic standards, such as secure communication protocols and digital rights management systems. Available for both ASIC and FPGA implementations, the core provides flexibility in its deployment, ensuring it can be tailored to fit various system requirements. Deliverables include source code and comprehensive test plans, ensuring straightforward integration and deployment.

IP Cores, Inc.
TSMC
65nm
Cryptography Cores, Security Protocol Accelerators
View Details

True Random Number Generator (TRNG)

A highly secure true random number generator (TRNG) engineered to deliver genuine randomness essential for cryptographic applications. This TRNG leverages noise from electronic components to produce unpredictable numbers, providing an essential layer of security for embedded systems, particularly in IoT and data protection contexts. Its design ensures reliable performance across varied operating environments, safeguarding sensitive data through flawless integration into security-sensitive applications.

IC Alps
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

MACsec

Comcores' MACsec solution addresses the needs for secure communication on Ethernet links by implementing the IEEE 802.1AE standard for MAC Security. It provides comprehensive protection against eavesdropping and manipulation, making it suitable for applications demanding high security over public and private networks. Built to support various data rates, the MACsec IP core integrates robust cryptographic suites like AES-GCM to encrypt and authenticate network traffic. Its deployment ensures data confidentiality and integrity, fostering a secure environment for transmitting sensitive information such as in military communication systems and data centers.

Comcores
Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Quantum Safe Cryptography

The Quantum Safe Cryptography solutions from Rambus are engineered to withstand future threats posed by quantum computing. Employing NIST and CNSA-approved algorithms, these products secure both data and hardware. Rambus offers a versatile selection, including standalone Quantum Safe Engines to integrated solutions within its Root of Trust offerings, thus ensuring comprehensive protection against potential breakthroughs in quantum computing capabilities.

Rambus
Cryptography Cores, Security Protocol Accelerators
View Details

iShield Key MIFARE FIDO Security Token

The iShield Key is a groundbreaking security solution for secure online access, combining FIDO authentication with MIFARE DESFire technology. This device enhances digital identity protection by safeguarding online accounts against phishing and unauthorized access. It supports multifactor authentication, relying on hardware-based security to deliver superior protection against identity theft. The iShield Key is versatile, compatible with USB and NFC interfaces, and is designed to offer a seamless user experience in securing online interactions. Its integration of MIFARE technology also allows it to be used as a smart access control device, making it a multipurpose security token for both physical and digital security applications.

Swissbit AG
Cryptography Cores, Security Protocol Accelerators
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt