Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Processor > Security Processor

Security Processor Semiconductor IP Solutions

Security processors are a pivotal segment of semiconductor IPs, designed to provide robust protection for data and secure transactions within electronic systems. These processors are tailored specifically to handle encryption, decryption, digital signature generation and verification, and other cryptographic functions, ensuring the integrity and confidentiality of data across a variety of platforms. In an age where cybersecurity threats are ever-evolving, the importance of reliable security processors in modern electronic devices cannot be overstated.

This category of semiconductor IP is integral to any device that requires secure communication or data protection. Whether it's in consumer electronics such as smartphones, tablets, and laptops, or in enterprise settings with servers and data centers, security processors are essential for safeguarding sensitive information. Additionally, with the proliferation of the Internet of Things (IoT), security processors are increasingly found in everyday devices, from home automation systems to industrial IoT gadgets, ensuring that they remain robust against unauthorized access and cyberattacks.

In this category, you will find a range of products designed to meet diverse security needs, from standard encryption and secure boot capabilities to more advanced features like trusted execution environments and secure key management. These semiconductor IPs are meticulously engineered to integrate seamlessly within broader processing architectures, offering flexibility and efficiency without compromising on security. Developers and manufacturers can select from a variety of configurations and performance specifications, ensuring that the security processor IPs can be optimally aligned with their specific application requirements.

As the digital landscape continues to expand, incorporating security processors becomes a crucial aspect of electronics design. They offer not only protection but also contribute to building trust among users and stakeholders by ensuring that devices and systems can function securely and efficiently. Selecting the right security processor semiconductor IP is essential for ensuring that modern electronics can withstand the challenges of the digital age, safeguarding everything from personal data to critical enterprise resources.

All semiconductor IP
24
IPs available

AUTOSAR & Adaptive AUTOSAR Solutions

KPIT's AUTOSAR and Adaptive AUTOSAR Solutions provide robust frameworks for automotive software development. Catering to the evolving needs of smart vehicles, these solutions ensure high reliability, safety, and compliance with industry standards. KPIT's middleware development enhances the adaptability and integration of various software modules, supporting clients in managing the complexities of modern vehicle platforms and accelerating the release of innovative automotive technologies.

KPIT Technologies
Building Blocks, Security Processor
View Details

AndesCore Processors

AndesCore Processors offer a robust lineup of high-performance CPUs tailored for diverse market segments. Employing the AndeStar V5 instruction set architecture, these cores uniformly support the RISC-V technology. The processor family is classified into different series, including the Compact, 25-Series, 27-Series, 40-Series, and 60-Series, each featuring unique architectural advances. For instance, the Compact Series specializes in delivering compact, power-efficient processing, while the 60-Series is optimized for high-performance out-of-order execution. Additionally, AndesCore processors extend customization through Andes Custom Extension, which allows users to define specific instructions to accelerate application-specific tasks, offering a significant edge in design flexibility and processing efficiency.

Andes Technology
CPU, FlexRay, Processor Core Dependent, Processor Core Independent, Processor Cores, Security Processor
View Details

NaviSoC

The NaviSoC is a cutting-edge system-on-chip (SoC) that integrates a GNSS receiver and an application processor on one silicon die. Known for its high precision and reliability, it provides users with a compact and energy-efficient solution for various applications. Capable of supporting all GNSS bands and constellations, it offers fast time-to-first-fix, centimeter-level accuracy, and maintains high sensitivity even in challenging environments. The NaviSoC's flexible design allows it to be customized to meet specific user requirements, making it suitable for a wide range of applications, from location-based services to asset tracking and smart agriculture. The incorporation of a RISC-V application microcontroller, along with an array of peripherals and interfaces, introduces expanded functionality, optimizing it for advanced IoT and industrial applications. Engineered for power efficiency, the NaviSoC supports a range of supply voltages, ensuring low power consumption across its operations. The chip's design provides for efficient integration into existing systems with the support of a comprehensive SDK and IDE, allowing developers to tailor solutions to their precise needs in embedded systems and navigation infrastructures.

ChipCraft
TSMC
800nm
20 Categories
View Details

Hanguang 800 AI Accelerator

Hanguang 800 AI Accelerator is a revolutionary AI processing powerhouse designed by T-Head to maximize computational efficiency for artificial intelligence applications. By leveraging state-of-the-art chip design, it achieves unparalleled processing speeds, significantly reducing inference times for machine learning tasks. Its architecture supports intricate AI algorithms adeptly, allowing for swift model training and execution across billions of parameters. Optimized for neural network operations, the accelerator adeptly caters to dense mathematical computations with minimal power consumption. Incorporating adaptive learning mechanisms, it autonomously refines its processing strategies in real-time, catalyzing efficiency gains. This is complemented by an advanced cooling system that manages thermal output without compromising computational power. Hanguang 800's application spectrum is broad, encompassing cloud-based AI services, edge computing, and embedded AI solutions in devices, positioning it as an ideal solution for industries demanding high-speed and scalable AI processing capabilities. Its integration into T-Head's ecosystem underscores the company’s commitment to delivering top-tier performance hardware for next-gen intelligent systems.

T-Head
AI Processor, CPU, Processor Core Dependent, Security Processor, Vision Processor
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is a cutting-edge security solution designed to enhance the protection and management of digital assets within the crypto industry. Combining microcontroller technology with secure elements, Cramium PHSM delivers a robust security framework that outperforms traditional measures. The module is engineered to offer top-tier tamper-resistance, ensuring that sensitive keys and cryptographic data remain secure against physical and logical threats. Cramium PHSM is pivotal in redefining industry standards by integrating advanced protection mechanisms that cater specifically to the fast-evolving demands of cryptocurrency and blockchain applications. Its architecture is designed for adaptability and high performance, ensuring seamless integration into various systems and promoting secure, decentralized operations. Moreover, CrossBar is committed to providing open-source solutions that foster transparency and reliability in the digital asset space. The PHSM not only bolsters security but also enhances trust, thereby supporting open collaboration and innovation within the industry. By focusing on delivering secure and flexible solutions, the Cramium PHSM is set to play a crucial role in safeguarding digital assets and ensuring the integrity of next-generation secure computing systems. Overall, Cramium PHSM exemplifies CrossBar's forward-thinking approach in addressing the cybersecurity needs of modern technologies, reaffirming their position as leaders in secure memory component design. It supports global security standards, making it indispensable for developers and companies aiming to fortify their digital infrastructure against emerging cyber threats.

CrossBar
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

SiFive Intelligence X280

Tailored specifically for AI and machine learning requirements at the edge, the SiFive Intelligence X280 brings powerful capabilities to data-intensive applications. This processor line is part of the high-performance AI data flow processors from SiFive, designed to offer scalable vector computation capabilities. Key features include handling demanding AI workloads, efficient data flow management, and enhanced object detection and speech recognition processing. The X280 is equipped with vector processing capabilities that include a 512-bit vector length, single vector ALU VCIX (1024-bit), plus a host of new instructions optimized for machine learning operations. These features provide a robust platform for addressing energy-efficient inference tasks, driven by the need for high-performance yet low-power computing solutions. Key to the X280's appeal is its ability to interface seamlessly with popular machine learning frameworks, enabling developers to deploy models with ease and flexibility. Additionally, its compatibility with SiFive Intelligence Extensions and TensorFlow Lite enhances its utility in delivering consistent, high-quality AI processing in various applications, from automotive to consumer devices.

SiFive, Inc.
AI Processor, Cryptography Cores, IoT Processor, Multiprocessor / DSP, Processor Core Dependent, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

Securyzr Key Management System

The Securyzr Key Management System provides a robust framework for managing cryptographic keys within embedded systems. By ensuring secure storage, key generation, and access protocols, it strengthens the cryptographic foundation of devices. This system supports multiple security applications and meets stringent certification requirements, ensuring that key information remains protected throughout the device lifecycle. It enhances security by preventing unauthorized access and preserving data integrity through effective key management strategies.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM Memory

CrossBar's ReRAM Memory is a pioneering memory solution that significantly enhances data storage capabilities for modern applications. Employing a minimalist three-layer structure, ReRAM Memory utilizes a silicon-based switching medium between two electrodes to facilitate resistive switching. This setup results in a highly stable memory cell that operates across varied temperatures and conditions. ReRAM Memory's ability to scale vertically in 3D allows it to deliver extensive terabyte-level storage on a single chip, alongside providing incredible endurance and rapid read/write capabilities. The technology's compatibility with standard CMOS processes facilitates easy integration into existing manufacturing setups, making it highly versatile for a wide range of applications, from IoT devices to data centers, and more. Notably, ReRAM Memory's unique design addresses some critical challenges facing conventional memory technologies. By reducing energy consumption to a mere 1/20th of traditional memory solutions, it delivers unmatched performance, sustaining up to 1000 times more write cycles and operating reliably with significant endurance and retention capabilities. Furthermore, its potential to be combined directly with logic circuits in a foundry augments the memory performance significantly while optimizing space and power requirements. Applications of ReRAM Memory spread across various domains such as artificial intelligence, mobile computing, and secure computing. Its benefits are clearly outlined in its secure features, where the memory is deployed for developing advanced applications involving secure cryptographic keys and tamper-resistant solutions. This makes ReRAM Memory an ideal choice for scenarios demanding high security and reliability, paving the way for future innovations in the semiconductor industry. CrossBar's ReRAM Memory showcases a perfect blend of cutting-edge design and practical implementation potential, enabling the semiconductor field to explore new possibilities in data processing and storage technologies. As digital landscapes continue to evolve, CrossBar's ReRAM offers lifecycle improvements and operational efficiencies that align with the industry's growing needs for high-density, reliable, and energy-efficient memory technologies.

CrossBar
CPU, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile SDR Controller, SDRAM Controller, Security Processor, SRAM Controller, Standard cell
View Details

PUFcc

PUFcc is an advanced crypto coprocessor that combines a Hardware Root of Trust with a comprehensive set of cryptographic algorithms, creating a versatile security module suitable for a wide range of system architectures. This turnkey solution enables seamless integration of security protocols into existing systems, making it a critical component in industries such as IoT, AI, automotive, and fintech. It establishes a secure foundation for device security, complementing existing software solutions by providing deep hardware-level protection from design to deployment. The PUFcc integrates a NIST CAVP-certified crypto accelerator, along with OSCCA-compliant ciphers and key derivation algorithms. It features advanced components like the APB and AXI interfaces, facilitating rapid memory access, and a sequencer to eliminate the need for additional processors or boot ROMs. The coprocessor also offers capabilities for extending protection to external flash memory, ensuring secure handling of sensitive data across its lifecycle. With over-the-air secure boot, TLS support, and robust key management possibilities, PUFcc simplifies and strengthens SoC design while providing a secure boundary to protect against threats like cloning and unauthorized access. Its scalable and customizable nature, exemplified by the addition of the PUFcc7 model, allows it to adapt to evolving security requirements, making it an indispensable tool for developers and manufacturers focused on robust cybersecurity infrastructures.

PUFsecurity
Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Catalyst-GPU

The Catalyst-GPU series by RADX Technologies brings advanced graphics and computational acceleration to PXIe/CPCIe platforms, leveraging NVIDIA’s robust technology to extend capabilities within modular Test & Measurement and Electronic Warfare applications. These GPUs sport significant computational power, delivering up to 2.5 FP32 TFLOPs with NVIDIA Quadro T600 and T1000 models. Distinguished by their ease of use, Catalyst-GPUs support MATLAB, Python, and C/C++ programming, alongside a plethora of computing frameworks, enabling efficient signal processing, machine learning, and deep learning applications. This makes them an excellent fit for signal classification and geolocation, as well as semiconductor and PCB testing. Catalyst-GPUs’ unique capabilities lie in their ability to process large FFTs in real-time, elevating signal processing precision significantly. Their integration into PXIe systems allows users to conduct faster, more accurate data analyses right where data is acquired. With support for both Windows and Linux environments, Catalyst-GPUs are crafted for versatility and effectiveness across a wide range of technical requirements.

RADX Technologies, Inc.
AI Processor, DSP Core, GPU, Multiprocessor / DSP, Processor Core Dependent, Security Processor, Vision Processor
View Details

Prodigy Universal Processor

The Prodigy Universal Processor by Tachyum is a groundbreaking innovation in the field of computer processors, widely recognized as the world's first universal processor. It is adept at handling a broad spectrum of applications including high-performance computing, AI development, and deep machine learning. Prodigy stands out by integrating the capabilities of CPUs, GPGPUs, and TPUs into a cohesive architecture. This integration allows for extraordinary computational power at reduced energy consumption and enhanced server utilization. One of the key features of the Prodigy series is its ability to outperform conventional industry processors with up to 18 times better performance and 6 times greater efficiency per watt. The processor architecture manages to combine general-purpose computing with high-performance workloads seamlessly, simplifying the programming and deployment process for a myriad of applications. The Prodigy range is designed to handle the complexities of today's technological demands. With 256 high-performance cores supported by DDR5 memory controllers and PCIe 5.0 lanes, it positions itself as an exemplary solution for scenarios requiring extensive data handling like cloud computing, data analytics, and large-scale databases. Its emulation systems allow for smooth transitions from existing architectures, making it a versatile choice for engineers and developers.

Tachyum Inc.
AI Processor, Building Blocks, CPU, DSP Core, Multiprocessor / DSP, Processor Core Dependent, Processor Core Independent, Processor Cores, Security Processor
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator from ResQuant is specifically designed to cater to unique client needs, with a variety of configurable options ensuring peak quantum-safe security. It is designed for seamless integration and supports all NIST PQC standards, including algorithms such as Dilithium, Kyber, XMSS, and Sphinx+. The accelerator is adaptable, allowing extensions by other algorithms and customer-specific requirements. This flexibility, combined with resilience against various side-channel attacks like Differential Power Analysis (DPA) and Timing, makes it a robust choice for secure implementations. The accelerator is further enhanced by its readiness for AXI 4 integration, positioning it well for incorporation into modern system designs. This makes it an efficient and future-proof solution for entities looking to adopt quantum-resistant security measures. Cost-effectiveness, coupled with superior security features, positions ResQuant's solution as a prime candidate for industries looking to shield their operations against future quantum threats. Their workshop offerings empower organizations, providing insights into quantum computing threats and strategies for transitioning to post-quantum cryptography. Participants gain an understanding of how to reinforce their infrastructure to withstand emerging quantum challenges, setting a foundation for proactive, quantum-safe security strategies moving forward.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Individual IP Core Modules

ResQuant's Individual IP Core Modules offer a plethora of options, each embedded with comprehensive NIST post-quantum cryptography standards. The selection includes powerful algorithms such as Dilithium, Kyber, XMSS, and SPHINCS+, alongside AES modes like ECB, CBC, and GCM, and secure hash functions like SHA2 and SHA3 families. These modules are crafted to fortify various systems with cutting-edge security mechanisms, ensuring data integrity and confidentiality. The flexibility of these IP Core Modules makes them incredibly beneficial for environments that require enhanced encryption and protection against quantum-level threats. Their design supports versatile applications, catering to tailored needs across different industry verticals, ensuring robust security solutions that align with future-proofing strategies. ResQuant's expertise shines through in these modules, highlighted by their inclusion of cryptographic protocols well-suited to counteract quantum computing challenges. Emphasizing scalability and adaptability, these IP Core Modules serve as key components for industries like IoT, automotive, military, and communications, which demand higher security affordances to safeguard critical operations and data from evolving threats.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators
View Details

RISC-V CPU IP NS Class

Focusing on security applications, the RISC-V CPU IP NS Class is crafted to meet the demands of fintech payment processes and IoT security needs. It combines a high level of security features with an efficient processing architecture that is essential for sensitive applications. The NS Class provides enhanced security measures, including support for critical safety functions and secure boot processes, thus ensuring data protection and integrity in financial and IoT ecosystems. Its configurable nature allows adaptation across varying usage scenarios, making it highly versatile. Incorporating advanced security solutions into its design, the NS Class also offers comprehensive support to developers through its toolchain and SDK, catering to a wide range of security-oriented applications. This adaptability ensures the NS Class can be a cornerstone in developing and enhancing secure systems.

Nuclei System Technology
CPU, Cryptography Cores, Microcontroller, Platform Security, Processor Cores, Security Processor, Vision Processor
View Details

EMSA5-FS

The EMSA5-FS is a RISC-V based processor core designed with functional safety in mind, making it ideal for applications needing ISO 26262 ASIL-D certification. Equipped with an optional L0 instruction cache, this processor features a five-stage pipeline which offers high reliability through a design that supports fail-safe operations, such as Dual Modular Redundancy (DMR) and Error Correcting Code (ECC). Its robust architecture allows it to exceed frequencies of 1GHz, making it capable in high-performance environments.

CAST
AI Processor, Building Blocks, CPU, Multiprocessor / DSP, Processor Cores, Security Processor
View Details

RISC-V CPU IP NA Class

The RISC-V CPU IP NA Class is tailored for automotive applications, particularly focusing on the ISO26262 Functional Safety Automotive standards. Built for performance and compliance, the NA Class aims to address the increasingly stringent safety requirements in automotive electronics. This processor class is adept at integrating functional safety features standardized for automotive applications, ensuring compliance with ASIL (Automotive Safety Integrity Level) standards. Through these features, the NA Class supports the robust and reliable operation of automotive systems, essential for modern vehicular technologies. The NA Class is fortified with a suite of safety and security elements, making it an ideal candidate for powering automotive systems that require rigorous reliability testing. Its tailored development tools, including SDKs and simulation environments, facilitate efficient development cycles and integration into automotive platforms.

Nuclei System Technology
CAN-FD, CPU, Cryptography Cores, FlexRay, Microcontroller, Platform Security, Processor Cores, Security Processor, Vision Processor
View Details

RISC-V CPU IP NI Class

The RISC-V CPU IP NI Class targets AI and ADAS communication, as well as video applications, offering a high-performance architecture designed to meet the rigorous demands of these sectors. With a focus on intelligent processing, the NI Class integrates advanced features to support complex computational tasks. Specifically engineered to facilitate artificial intelligence applications and advanced communication protocols, the NI Class processors boast superior capabilities in processing deep learning algorithms and managing high-bandwidth video data streams. This makes them an excellent choice for automotive and communication industries pursuing cutting-edge advancements. The NI Class provides comprehensive support for AI processes and secure communication technologies, incorporating essential safety and security features. These processors are supported by an extensive development ecosystem that includes an array of tools and resources, ensuring efficient deployment and management of sophisticated AI systems.

Nuclei System Technology
3GPP-LTE, AI Processor, CPU, Cryptography Cores, Microcontroller, Processor Cores, Security Processor, Vision Processor
View Details

Evo Gen 5 PCIe Card for AI Inferencing

The Evo Gen 5 PCIe Card is meticulously designed for high-performance AI inferencing tasks, providing an ideal solution for enterprise-grade applications. This PCIe card leverages advanced technology to deliver outstanding efficiency in large-scale AI computations, particularly focusing on supporting LLMs (Large Language Models). By optimizing the distribution of processing loads, it significantly enhances the performance of resource-intensive AI models, ensuring seamless and rapid computations required in modern-day AI workloads. An integral feature of the Evo Gen 5 is its capability to offload the majority of processing demands from CPUs, enabling systems to achieve maximal output without overburdening core computing resources. This card not only improves throughput but also maintains energy efficiency, making it an attractive choice for data centers seeking to upgrade their infrastructure for AI tasks. Moreover, its seamless integration with existing systems ensures that businesses can easily adopt this cutting-edge technology without extensive modifications. The Evo Gen 5 PCIe Card stands out with its robust reliability and scalable AI solutions tailored to meet diverse industrial needs, driving innovation in AI deployment across a myriad of sectors.

Neuchips Corporation
TSMC
16nm, 28nm
AI Processor, AMBA AHB / APB/ AXI, CPU, D2D, Embedded Security Modules, Ethernet, RapidIO, Security Processor, Vision Processor
View Details

Suite-Q SW

Suite-Q SW consists of a versatile cryptographic software library designed for optimizing code size, stack usage, and performance across various embedded processors and microcontrollers. Available in portable C code and high-speed assembly, Suite-Q SW can be tailored to fit the specific needs of diverse development environments. This library provides extensive support for symmetric and asymmetric cryptographic functions, catering to systems ranging from high-end processors to memory-constrained embedded devices. By facilitating efficient cryptographic computations, Suite-Q SW ensures minimal impact on system performance while maximizing data security. Its adaptability is marked by simple integration modules that work seamlessly with hardware accelerators, enabling enhanced cryptography for both standard and custom specifications. This reliability makes Suite-Q SW an indispensable tool for ensuring secure communication channels while maintaining an optimal balance between speed and resource utilization.

PQ Secure Technologies, LLC
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

QDID PUF

The QDID PUF, a core offering from Crypto Quantique, leverages quantum tunneling current variations to generate unique, unforgeable device identities. This patented Physical Unclonable Function (PUF) technology generates identities based on oxide thickness variations within standard CMOS processes, creating an unpredictable and secure hardware root-of-trust. Instead of relying on stored identities that are vulnerable to tampering and side-channel attacks, QDID PUF creates identities dynamically on demand. This approach minimizes security risks associated with permanent identity storage and makes the system robust against attacks such as counterfeiting and cloning. The IP is optimized for various cryptographic applications, including key generation and device authentication, making it suitable for high-security environments in medical, industrial, and IoT applications. Its design ensures compliance with rigorous security standards and its adaptability extends to integration in diverse hardware platforms, providing a versatile and secure solution. Moreover, QDID PUF is validated across multiple manufacturing nodes and process technologies, ensuring its reliability and performance in different environmental conditions, further underscoring its suitability for long-term deployment in a range of applications. Its robustness across voltage and temperature variations reinforces its capability as a secure element in electronic devices.

Crypto Quantique
GLOBALFOUNDARIES, TSMC, UMC
55nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

The PUFhsm is PUFsecurity's sophisticated Hardware Security Module, tailored for automotive industries and advanced applications that demand high-level security. Designed as an Embedded Security Enclave, it compartmentalizes sensitive information, isolating it from the main system to bolster security. Incorporating a dedicated CPU, cryptographic engines, and advanced software modules, PUFhsm addresses a plethora of automotive and industrial security applications. It is particularly compatible with EVITA-Full compliance, setting a benchmark for in-vehicle and chip-level security against modern cybersecurity threats. PUFhsm not only supports robust applications like secure boot, secure updating, and lifecycle management but also facilitates key management and secure debugging. Its architecture is designed to be interchangeable with PUFrt, enhancing anti-tampering capabilities and optimizing system resource use. The cohesive design provides a scalable security solution adaptable to various system requirements, ensuring the integrity and authenticity of all software and hardware components.

PUFsecurity
Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

Geon Secure Execution Processor

The Geon Secure Execution Processor is a highly secure processing unit designed to isolate and protect sensitive information in digital systems. Built on the robust BA22 architecture, it offers a secure foundation for executing critical tasks while safeguarding against external threats. Operating at 1.79 DMIPS per megahertz and capable of reaching frequencies over 450 MHz in a 65 nm technology, this processor is optimized for security-centric applications across various industries.\n\nWhat sets the Geon processor apart is its capacity to perform cryptographic operations, providing an extra layer of protection for data handled during processing. This makes it an ideal choice for applications requiring stringent security measures, such as secure boot processes, encryption, and secure JTAG. The processor is verified at the system level, ensuring comprehensive security across all operational facets.\n\nWhether deployed in consumer electronics, automotive systems, or industrial applications, the Geon Secure Execution Processor excels in environments that prioritize both performance and protection. It is engineered for adaptability, allowing for integration into a wide range of systems requiring robust security protocols.

Beyond Semiconductor
TSMC
22nm, 130nm
Security Processor
View Details

Suite-Q HW

Suite-Q HW represents a sophisticated system-on-chip (SoC) design that integrates essential cryptographic operations crucial for modern data security protocols. Targeting both high-end servers and low-end embedded systems, Suite-Q HW employs a unified hardware architecture to ensure efficient execution of cryptographic tasks. This hardware solution supports a diverse range of cryptographic algorithms, including both classical and post-quantum options. It incorporates advanced public key cryptographic operations such as ECDSA and various isogeny, lattice, and code-based strategies awaiting broader standardization. The suite’s flexibility allows it to adapt to different operational demands and integrate with existing infrastructure seamlessly. Suite-Q HW's cornerstone is its high degree of configurability, offering customizable performance based on targeted applications. This versatility ensures optimal resource allocation, making it a preferred choice for systems requiring stringent security measures without compromising on computational efficiency. With optional features for defending against differential power analysis (DPA) attacks, the SoC further enhances its defense mechanisms, ensuring robust protection against sophisticated threats.

PQ Secure Technologies, LLC
AI Processor, AMBA AHB / APB/ AXI, Cryptography Cores, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

Cryptographic Core

The Cryptographic Core offers a comprehensive suite of classical cryptographic solutions. This product leverages well-established algorithms like AES for symmetric encryption and ECC for asymmetric encryption. Its design caters to both high and low-end applications, ensuring compatibility across various devices. This core is crucial for maintaining confidentiality and integrity in systems where traditional cryptography still reigns supreme. With the increasing vulnerability posed by advancing technology, including potential quantum threats, this Cryptographic Core provides secure encryption and decryption processes. Utilizing advanced algorithms such as RSA and variants of elliptic curve cryptography (ECC), it supports the secure exchange of information. Despite looming quantum computing challenges, many elements of classical cryptography remain effective and secure. The Cryptographic Core stands as a reliable option while industries transition towards more robust quantum-safe systems. It offers flexibility and adaptability, accommodating specific security needs through customization and configuration for various performance levels.

PQ Secure Technologies, LLC
AI Processor, Cryptography Cores, Cryptography Software Library, Security Processor, Standard cell
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt