Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Embedded Security Modules

Embedded Security Modules Semiconductor IP

In today's interconnected technological landscape, the security of embedded systems has emerged as a crucial challenge. This is where Embedded Security Modules (ESMs) in semiconductor IPs play a pivotal role. These modules are specialized components integrated into chips, offering enhanced protection against a variety of threats including unauthorized access, data breaches, and malicious attacks. By embedding security at the silicon level, these IPs provide a hardware root of trust, ensuring that the integrity, confidentiality, and authenticity of data and communications are uncompromised.

Embedded Security Modules are used across a spectrum of applications, catering to industries such as IoT, automotive, telecommunications, and consumer electronics. In the IoT realm, these modules protect smart devices from vulnerabilities and ensure secure data transmission between interconnected gadgets. In the automotive sector, ESMs safeguard vehicular communication systems and onboard diagnostics from hacking attempts. Similarly, telecommunications networks utilize these modules to establish secure channels and prevent espionage, maintaining the privacy of sensitive communications.

The products found within this category include a range of security-enhancing solutions such as secure boot processors, cryptographic accelerators, hardware random number generators, and secure element IPs. These products are designed to address specific security needs, offering flexibility and scalability to developers and manufacturers. For instance, secure boot processors ensure that only authenticated software runs on a device, while cryptographic accelerators speed up data encryption and decryption processes, vital for real-time secure communications.

Moreover, as digital threats evolve, Embedded Security Modules semiconductor IPs continue to advance, incorporating cutting-edge technologies like quantum encryption readiness and machine learning-led anomaly detection. This ongoing innovation not only fortifies existing systems but also prepares them for future challenges, making Embedded Security Modules a cornerstone of secure electronic design for years to come. Whether you are developing chips for personal gadgets or intricate industrial systems, integrating these security IPs ensures robust protection and compliance with stringent security standards, enhancing consumer trust and product reliability.

All semiconductor IP
50
IPs available

Integrated Diagnostics & Aftersales Transformation (iDART)

KPIT's iDART platform addresses the challenges posed by software-defined vehicles, focusing on optimizing diagnostics, maintenance, and aftersales services. By deploying advanced AI-driven diagnostics and self-learning systems, the platform enhances the reliability of vehicle servicing and improves the overall customer experience. This transformation embraces legacy system integration while advancing toward fully automated, predictive, and customer-centered service models that support the evolving demands of the automotive market.

KPIT Technologies
68 Views
Embedded Security Modules, Flash Controller, MIL-STD-1553, Mobile SDR Controller, Processor Core Independent
View Details Datasheet

PUFrt

PUFrt is a hardware-based root of trust solution that integrates seamlessly into a variety of semiconductor environments. It features a comprehensive security foundation with a 1024-bit Physical Unclonable Function (PUF) and a true random number generator compliant with NIST SP800-90B/SP-800-22 standards. This solution provides a robust platform for key generation and storage, ensuring sensitive data never leaves the chip. With built-in anti-tamper design and an 8k-bit secure storage space, PUFrt is capable of safeguarding vital data against physical attacks. Designed for flexibility, it supports multiple cryptographic operations and integrates easily into various architectures, providing a fortified base for semiconductor security, vital for applications such as secure boot and trusted execution environments.

PUFsecurity
59 Views
TSMC
28nm
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

Miscellaneous FEC and DSP IP Cores

Creonic offers a diverse array of miscellaneous FEC (Forward Error Correction) and DSP (Digital Signal Processing) IP cores, catering to various telecommunications and broadcast standards. This collection of IP cores includes highly specialized solutions like ultrafast BCH decoders and FFT/IFFT processors, which are critical for managing high-throughput data streams and maintaining signal fidelity. These IP cores embody the latest in processing technology, delivering precise error correction and signal transformation functions that are essential in complex communication networks. Their integration capabilities are made easy with detailed hardware specifications and software models, designed for flexibility across different platforms and applications. The rigorous development process guarantees that each core adheres to market standards, optimizing performance and ensuring operational reliability. Creonic's portfolio of miscellaneous FEC and DSP cores stands out for its innovative contributions to digital communications, providing unique solutions that meet the sophisticated requirements of modern connectivity.

Creonic GmbH
52 Views
All Foundries
All Process Nodes
Bluetooth, Cryptography Cores, DSP Core, Embedded Security Modules, Error Correction/Detection, Standard cell
View Details Datasheet

PUFcc

PUFcc stands as a state-of-the-art crypto coprocessor, embedding a robust hardware root of trust with a complete suite of cryptographic algorithms essential for securing modern devices. It unites essential elements such as key generation, storage, and a comprehensive crypto engine into one cohesive package. Noteworthy for its adaptability, PUFcc is designed to effortlessly integrate into numerous system architectures, supporting applications across IoT, automotive, and FinTech industries. It provides crucial security features including secure boot, over-the-air updates, and advanced key management capabilities. The suite of NIST CAVP and OSCCA certified algorithms within ensures a high degree of trust and compliance, crucial for maintaining secure communications and data integrity throughout the product lifecycle.

PUFsecurity
49 Views
TSMC
28nm
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

Secure OTP

Secure OTP is an advanced storage solution utilizing anti-fuse one-time programmable (OTP) memory to protect sensitive data in integrated circuits. With enhanced capabilities over standard OTP systems, Secure OTP offers a unique physical macro and digital RTL design that ensures maximum security for stored data, be it in use, transit, or rest. It features a 1024-bit PUF for improved encryption and supports multiple interfaces for seamless integration across a broad range of applications. The solution mitigates security vulnerabilities in modern chip designs, providing robust protection against data theft and unauthorized access to critical information such as encryption keys and boot codes. This technology is aimed at applications requiring secure data storage, including IoT devices and smart electronics.

PUFsecurity
49 Views
TSMC
28nm
Cryptography Cores, Embedded Memories, Embedded Security Modules, Security Subsystems, SRAM Controller
View Details Datasheet

Polar Encoders/Decoders

Polar encoders and decoders by Creonic serve as vital components in enhancing data integrity for next-generation communication frameworks such as 5G. These IP cores are designed to deliver superior coding efficiency and robust performance in varied network conditions, supporting high-speed data transmissions while maintaining low latency. The technology stands out for its innovative use of polar codes, noted for their capacity to achieve channel capacities effectively. Creonic's Polar solutions include hardware and software models tailored for straightforward integration into diverse computational environments. They provide excellent adaptability and scalability across multiple hardware systems, making them ideal for cutting-edge digital communication networks. Backing their robust technological framework, Creonic ensures that each product adheres to strict industry standards through comprehensive testing and quality assurance. The result is a set of highly reliable Polar encoders and decoders designed to enhance the performance and efficiency of advanced communication systems.

Creonic GmbH
48 Views
All Foundries
All Process Nodes
3GPP-5G, Cryptography Cores, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

Secure Protocol Engines

Secure Protocol Engines are high-performance IP solutions tailored to manage intensive network and security operations. These IP blocks are designed to handle offloading of network processing tasks, enhancing system efficiency and performance. With integration ease and high compatibility across systems, they offer robust security by accelerating cryptographic protocols immensely necessary in today’s fast-paced digital environments.

Secure-IC
48 Views
All Foundries
All Process Nodes
AMBA AHB / APB/ AXI, CXL, Embedded Security Modules, Ethernet, I2C, IEEE1588, USB
View Details Datasheet

Turbo Encoders/Decoders

Creonic's Turbo encoders and decoders provide powerful forward error correction techniques applicable in wireless communication systems, including 4G LTE and DVB-RCS2. Known for the efficiency in managing bandwidth and minimizing data loss, these IP cores are designed to boost communication integrity and performance. Leveraging sophisticated iterative algorithms, Turbo encoders and decoders execute precise error detection and correction with high data throughput. They are crafted to integrate seamlessly into various hardware platforms, with detailed hardware models and software reference models available for easy incorporation into any system. This versatility ensures that Creonic's Turbo solutions are suitable for both new and existing infrastructures. Quality assurance remains a cornerstone for these products, with each IP core undergoing extensive validation to meet demanding specifications. By addressing critical needs in modern communication systems, Creonic’s Turbo offerings continue to be a preferred choice for engineers and developers striving for reliability and efficiency.

Creonic GmbH
48 Views
All Foundries
All Process Nodes
3GPP-5G, Cryptography Cores, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

PSA Compliant Crypto API

The PSA Compliant Crypto API by Tiempo Secure offers a streamlined interface for implementing cryptographic functions, ensuring robust digital security. It is a comprehensive package that simplifies cryptographic operations while adhering strictly to the Platform Security Architecture (PSA) benchmarks. Engineered for efficiency, the API provides a software library supporting both Physical Unclonable Functions (PUFs) and a True Random Number Generator with Deterministic Random Bit Generator (TRNG+DRBG). Its design ensures minimal on-chip SRAM usage, occupying only a few kilobytes, ideal for space-constrained environments. Platforms integrating this API can achieve the prestigious 'PSA Certified Storage' status, proving compliance with stringent standards. Its extensive logging options, highly optimized SHA-256, and adherence to MISRA C standards make it a robust choice for enhancing system security. This API enables secure storage of arbitrary keys using SRAM PUFs and supports the generation of 256-bit true random seeds, vital for secure operating environments. It simplifies complex security functions, making it an ideal choice for enhancing system protection across various platforms.

Tiempo Secure
46 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details Datasheet

PLIC

The Platform-Level Interrupt Controller (PLIC) from Roa Logic is a fully compliant, configurable module designed specifically for RISC-V applications. It provides a versatile solution for managing interrupts in complex systems, offering the necessary infrastructure to handle numerous interrupt sources efficiently. The PLIC is particularly adept at prioritizing and routing interrupts to ensure effective processor management and operational efficiency. This module is fully parameterized, allowing developers to configure it according to the unique needs of their applications. Whether for simple embedded designs or more sophisticated systems, the PLIC offers customizable parameters that provide flexibility in setting interrupt priorities and handlers. By integrating the PLIC into a design, developers can leverage its interrupt management capabilities to streamline operations, enhance system responsiveness, and improve overall performance. This makes it a critical component for anyone looking to build stable and efficient RISC-V based systems.

Roa Logic BV
42 Views
Arbiter, Embedded Security Modules, IEEE1588, Interrupt Controller
View Details Datasheet

FortiCrypt

FortiCrypt offers a comprehensive lineup of AES solutions, explicitly engineered for robust defense against side-channel attacks (SCA) and fault injection attacks (FIA), including variants like SIFA. Highlighting exceptional performance, these solutions employ masking techniques based on finite field arithmetic. These mechanisms ensure encryption and decryption processes are secure, while maintaining impressive speeds without additional latency. Balancing high security, low gate count, and power consumption, FortiCrypt products are available in configurations focusing on performance, power efficiency, or compact design options. With TVLA methodology verification and Common Criteria accreditations, FortiCrypt products are designed to thrive in even the most vulnerable situations. The suite supports ultra-high performance, ultra-low power efficiency, significant gate count reduction, and satisfies diverse industrial needs, making it applicable for both high-end and existing field devices vulnerable due to insufficient original protections. Moreover, FortiCrypt can be utilized with AMBA, AXI, or APB buses, offering a hardware-software solution integrated into diverse circuit architectures, thus ensuring comprehensive compatibility and security across systems.

FortifyIQ
41 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Flash Protection Series

The Flash Protection Series extends PUFsecurity's hardware root of trust capabilities to safeguard flash memory and its embedded systems. This set of solutions enables protection for both embedded and external flash by incorporating PUF-based authentication and encryption across various storage types including NAND and NOR flash. It utilizes PUF technology to enhance the memory's security boundary, preventing unauthorized access and ensuring real-time data integrity. With specialized components like PUFef for embedded flash and PUFenc for external, the series allows seamless integration into larger system-on-chip designs while providing enhanced defenses against common security threats faced by flash-based storage.

PUFsecurity
40 Views
TSMC
28nm
Embedded Memories, Embedded Security Modules, Flash Controller, NAND Flash
View Details Datasheet

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) represents Crossbar's commitment to enhancing security at the hardware level, leveraging its highly efficient ReRAM technology. This module serves as a secure enclave within devices, protecting sensitive information from unauthorized access and potential attacks. By employing Crossbar's ReRAM-based PUF (Physical Unclonable Function) cryptographic keys, the PHSM ensures that each device has a unique digital fingerprint, preventing cloning and adding a robust layer of security. The PHSM is designed to address the growing security concerns in modern electronic devices, especially in sectors like automotive, industrial, and medical industries where data integrity is paramount. With its ability to handle extensive security protocols and encryption methods, the PHSM is crucial for safeguarding data in connected devices, providing secure authentication, and ensuring data confidentiality and integrity. Crossbar's technology allows for the seamless integration of the PHSM into existing semiconductor processes, enhancing security without compromising on device performance or energy efficiency. Moreover, the PHSM offers a highly reliable and tamper-resistant solution that can withstand a variety of environmental conditions. Whether it's for securing IoT endpoints, mobile computing platforms, or large-scale data centers, the PHSM is equipped to handle the demands of modern security requirements efficiently and effectively. Its deployment within a device's architecture ensures that sensitive operations remain isolated and protected, providing peace of mind in an increasingly connected world.

Crossbar
39 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

LDPC Encoders/Decoders

LDPC (Low-Density Parity-Check) encoders and decoders from Creonic are designed to enhance data transmission reliability in complex communication systems. These IP cores support various standards, including DVB-S2X, 5G-NR, and IEEE 802.11, offering exceptional error correction capabilities essential for high-speed data transfer. Utilizing advanced algorithms, Creonic's LDPC solutions deliver robust performance while minimizing complexity and power consumption. The LDPC encoders and decoders embody state-of-the-art hardware models and bit-accurate software reference models for seamless integration into existing systems. The hardware models are compatible with FPGA platforms from leading manufacturers, ensuring adaptability across different technological environments. Comprehensive test environments accompany the IP cores, facilitating smooth deployment and validation. Creonic’s commitment to quality is evident in the rigorous testing processes each IP core undergoes, guaranteeing compliance with stringent industry standards. The LDPC solutions are available for download from secured servers, reflecting Creonic's focus on security and accessibility for their global clientele.

Creonic GmbH
37 Views
All Foundries
All Process Nodes
3GPP-5G, ATM / Utopia, Bluetooth, Cryptography Cores, Embedded Security Modules, Error Correction/Detection
View Details Datasheet

Securyzr iSSP

The Securyzr iSSP is a holistic security lifecycle management solution that integrates secure services across all phases of a device's existence. It allows for seamless provisioning, firmware updates, security monitoring, and device identity management in a zero-touch manner. This platform facilitates efficient management and extensive security oversight, empowering enterprises to handle security change implementation smoothly.

Secure-IC
37 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

AES Encryption for RFID applications

The AES Encryption for RFID applications is engineered to provide robust security for data in RFID communications. Utilizing Advanced Encryption Standard (AES) techniques, it offers a secure and efficient mechanism for protecting sensitive information transmitted in RFID systems. This encryption solution is ideal for applications where data integrity and confidentiality are paramount, protecting against unauthorized access and ensuring secure wireless transactions.

RADLogic Pty Ltd
36 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details Datasheet

Securyzr Key Management System

The Securyzr Key Management System provides robust, secure key management services across embedded systems. It ensures secure boot, efficient key isolation, and anti-tampering measures, enhancing the trustworthiness of critical systems. Its design ensures data integrity and confidentiality, making it a core component for any secure system architecture. This comprehensive IP solution integrates with existing frameworks to support seamless security management.

Secure-IC
36 Views
All Foundries
All Process Nodes
Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators
View Details Datasheet

PQCryptoLib Embedded

Designed for memory-constrained applications, PQCryptoLib Embedded extends the capabilities of PQCryptoLib to environments like microcontrollers and IoT devices. This specialized library emphasizes configurability to optimize for minimal binary size and memory usage, essential in constrained computing environments. It offers secure post-quantum cryptographic algorithms suited for devices where resource allocation is a challenge.

PQShield
35 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

PQPerform Lattice

PQPerform Lattice is developed for applications demanding high-speed cryptographic performance, providing an all-in-one solution engineered for high-throughput requirements. It seamlessly fits into network hardware and HSMs (Hardware Security Modules) settings that necessitate rapid digital signature and key exchange processing. This post-quantum processor is optimized for maximum compatibility with Linux systems.

PQShield
35 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

ATEK367P4 (Phase Shifter)

The ATEK367P4 is an analog phase shifter known for its precision in controlling phase angles across frequencies between 2 and 4 GHz. Featuring a loss of 3 dB, it supports phase adjustments from 0 to 375 degrees, making it incredibly useful for applications where precise phase alignment is critical. This device incorporates innovative control voltage mechanisms, facilitating smooth and accurate phase transitions. Encased in a 4x4mm QFN package, it offers flexibility and efficiency in RF path management. Ideal for phased arrays and radar systems, the ATEK367P4 caters to complex RF designs that demand high accuracy in signal phase control. It plays a crucial role in enhancing the functional scalability of RF systems, lending itself to advanced modulation techniques and beamforming applications. This phase shifter addresses the need for dynamic and reliable signal manipulation in environments where timely signal processing and adaptive algorithms are central to system performance. The ATEK367P4 provides engineers with the tools to achieve meticulous control over RF signals, promoting improved performance in sophisticated communication platforms.

Atek Midas
34 Views
AMBA AHB / APB/ AXI, Analog Front Ends, Embedded Security Modules, GPU
View Details Datasheet

OmniTRUST™ PVT Monitor IP

The OmniTRUST™ PVT Monitor IP is a robust solution designed to manage and monitor process, voltage, and temperature variations in semiconductor devices. This IP is essential for improving the reliability and efficiency of electronic systems by offering precise and real-time feedback on operational parameters. It acts as a critical enabler for dynamic thermal management and voltage regulation, ensuring that electronic systems operate under optimal conditions. Capable of monitoring over a wide temperature range, the OmniTRUST™ PVT Monitor IP provides high accuracy in temperature readings and versatile voltage monitoring capabilities. Its design facilitates low standby power modes, enhancing the overall energy efficiency of the IP. This makes it indispensable for applications where device reliability and consistent performance are key concerns, such as in automotive electronics and portable devices. The PVT Monitor is customizable and can be adapted for use across various process nodes. It seamlessly fits into Omni Design’s broader portfolio of power management and monitoring solutions, supporting functions critical for modern electronic systems, such as predictive maintenance and adaptive performance adjustments.

Omni Design Technologies, Inc.
33 Views
All Foundries
All Process Nodes
Embedded Security Modules, Sensor, Temperature Sensor
View Details Datasheet

PQPlatform Lattice

With PQPlatform Lattice, PQShield extends lattice-based cryptography capabilities for hardware implementations requiring post-quantum security. This engine provides minimal-area solutions with side-channel protection, suitable for embedded devices. Integrated with SHA-3, this platform is aligned with NIST standards and is optimal for systems demanding small area deployment with robust security.

PQShield
33 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

DAES Cryptographic Processor

The DAES is a sophisticated cryptographic processor core, expertly crafted to implement the Rijndael encryption algorithm, commonly known as Advanced Encryption Standard (AES). This processor strengthens system security through its ability to handle varying levels of encryption with support for 128-bit and 256-bit key lengths. This versatility enables it to secure a wide range of applications, from consumer electronics to complex data centers where robust encryption is paramount. This cryptographic processor seamlessly bridges to widely used bus architectures, including APB, AHB, and AXI, ensuring broad compatibility with contemporary SoC designs. The DAES core also supports several block cipher modes such as ECB, CBC, CFB, OFB, and CTR, providing a flexible framework for encryption operations across different domains. Its internal key expansion module enhances encryption operations by allowing swift transitions and minimal resource utilization, crucial for systems requiring frequent key changes. Besides its encryption capabilities, the DAES processor excels in performance and efficiency, enabling rapid processing of cryptographic tasks without compromising security. Its architecture and design facilitate easy integration, allowing engineers to deploy secure solutions quickly in diverse electronic ecosystems. By addressing the ever-growing demand for effective data protection mechanisms, the DAES core plays a vital role in safeguarding sensitive information across myriad applications.

DCD-SEMI
32 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

iShield Key

The iShield Key by Swissbit stands out as a robust hardware security solution designed to protect digital identities. It supports features like Personal Identity Verification (PIV), and enables one-time password (OTP) generation with HOTP and TOTP protocols. This flexibility makes it suitable for a wide range of authentication applications, significantly reducing the risk of account breaches through multifactor authentication techniques that combat threats such as phishing and social engineering. Designed to plug directly into USB ports, this device offers a simple yet secure way to add hardware security layers to existing systems.

Swissbit AG
32 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

aiData

aiData is aiMotive's sophisticated data pipeline system for automated driving applications. This comprehensive toolchain encompasses the entire data management lifecycle, from collection and annotation to synthetic data generation and evaluation. One of its key components, the aiData Recorder, is tailored to capture critical reference data in a synchronized manner, addressing edge cases that are vital for developing robust automated driving solutions. The platform also features an Auto Annotator, leveraging AI to perform automated annotation with precision, while minimizing storage and computational demands. The addition of aiFab to the workflow allows for high-fidelity sensor simulations that replicate varied real-world conditions through domain randomization, effectively refining the quality and efficacy of synthetic training data. Integrated metrics evaluation is another highlight, offering real-time insights into the performance and development progress of neural network algorithms against predefined benchmarks. Aiding the continuous improvement of AD systems, aiData's versioning system precisely measures the impact of newly added data, ensuring ongoing relevance and optimization across the entire pipeline.

aiMotive
31 Views
AI Processor, Embedded Security Modules, Vision Processor
View Details Datasheet

PQPlatform SubSys

This platform provides a full-stack cryptographic subsystem, independent of the main processor, for secure execution of cryptographic tasks. PQPlatform SubSys handles key establishment and signature processes using post-quantum algorithms. It features integral memory and an independent CPU to offload cryptographic loads from the host system, establishing a secure boundary for critical operations.

PQShield
31 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

ReRAM Secure Keys

Crossbar’s ReRAM Secure Keys technology harnesses the potential of ReRAM to create highly secure cryptographic keys essential for safeguarding electronic devices and systems. By employing Physical Unclonable Function (PUF) technology, these keys provide unique digital identifiers that significantly enhance security measures, preventing unauthorized cloning and access to sensitive data. ReRAM PUF keys are uniquely advantageous due to their high randomness, low error rates, and resilience against environmental variability. This makes them far superior to traditional SRAM-based PUF technologies, which often suffer from greater susceptibility to various attack vectors. ReRAM’s integration into semiconductor hardware ensures that security measures such as encryption keys remain robust and isolated, thereby protecting critical operations. These cryptographic keys are ideal for a plethora of security-sensitive applications, including automotive, data centers, and IoT. By embedding ReRAM PUF keys into device security architectures, manufacturers can bolster the resilience of their products against both physical and digital threats. This technology is particularly potent for implementations within nodes smaller than 28nm, where traditional embedded non-volatile memory is less feasible. Crossbar’s Secure Keys solution represents an essential advance in maintaining data confidentiality and authenticity across a wide range of modern electronic systems.

Crossbar
31 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed to enhance the performance of cryptographic hashing functions. It efficiently balances area and throughput, complying with NIST's FIPS 202 standard. Supporting various SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, it offers extendable output functions like SHAKE-128 and SHAKE-256. Emphasizing security, it provides robust protection against time-based side channel attacks and includes automatic byte padding for streamlined operation. Crafted with simplicity in mind, this IP core integrates seamlessly into a single clock domain environment, showcasing rigorous verification to ensure reliability. Its applications are extensive, catering to needs for data integrity checks and authentication across multiple sectors. With a focus on adaptability, it serves roles in Message Authentication Codes, IPsec and TLS/SSL protocols, secure boot engines, encrypted data storage, and more. Its adaptability extends into e-commerce, financial transaction systems, blockchain technology, and pseudo-random bit generation, making it a versatile choice for projects requiring robust security features. The SHA-3 Crypto Engine positions itself as a critical component in secure data management solutions for modern technology landscapes.

KiviCore
31 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

Keccak Hash Engine

The Keccak Hash Engine stands out for its versatility and function beyond traditional hashing. Renowned primarily for cryptography, it encompasses authentication, encryption, and pseudo-random number generation. At its core lies the Keccak-f cryptographic permutation, employing sponge construction for adaptability and configurability. Keccak's flexibility allows customization for varied hash outputs and security levels, adhering to standards like 3GPP TS 35.231 and NIST's FIPS 202. Thoroughly analyzed and publicly scrutinized, this engine is an epitome of secure and reliable cryptographic functions. Designed with ease of integration and extensive verification, it fits seamlessly into restrictive environments. It can be tailored for unique outputs, ensuring it meets the specific demands of diverse applications, from blockchain to secure communications.

KiviCore
29 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

MACsec IP Core

Comcores' MACsec Core is engineered to fortify Ethernet networks with robust encryption and security measures, ensuring data remains protected across various network segments. This IP core features a streamlined and compact design, reducing resource consumption by up to five times, without sacrificing efficiency. Ideal for integration into both high-performance and resource-constrained environments, the core seamlessly encrypts data packets, safeguarding them from unauthorized access and tampering. Its adaptability ensures it can meet varied security demands in progressively digital landscapes.

Comcores
29 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

OmniTRUST™ PVT Monitor ODT-PVT-ULP-001C-16FFCT

The OmniTRUST™ PVT Monitor ODT-PVT-ULP-001C-16FFCT is a dedicated monitoring IP designed for comprehensive management of process, voltage, and temperature variables in electronic designs. Crafted using a 16nm CMOS process, it offers a compact and efficient solution ideal for integration into next-generation SoCs needing accurate environmental condition monitoring. This PVT monitor operates reliably across an extensive temperature range, providing high accuracy readings crucial for device optimization and reliability. Its low power consumption features make it apt for portable devices and applications where energy efficiency is paramount. Flexibly integrating into a variety of process nodes, the ODT-PVT-ULP-001C-16FFCT sets the standard for operational assurance by offering features that promote continuous condition assessment, contributing significantly to the device’s adaptive management strategies. It's an invaluable component for industries requiring meticulous monitoring systems, such as automotive and consumer electronics sectors.

Omni Design Technologies, Inc.
29 Views
TSMC
90nm
Embedded Security Modules, Sensor, Temperature Sensor
View Details Datasheet

DSHA2-256 Cryptography Co-Processor

The DSHA2-256 is an advanced cryptographic co-processor core, meticulously engineered to optimize the SHA2-256 hash function. It implements a universal solution with bus bridge capabilities to APB, AHB, and AXI buses, promoting flexibility in integration. Its compliance with the FIPS PUB 180-4 standard and RFC 2104 enhances its reliability, ensuring robust cryptographic performance across various applications. The processor supports both SHA2 224-bit and 256-bit modes, making it adaptable to numerous security requirements. Underlying the DSHA2-256 is a focus on efficient cryptographic processing, where high-speed computation of hash values is crucial for secure data handling and protection. Its architecture is designed to accelerate hash operations significantly, which makes it ideal for systems where large data streams require rapid and secure processing. The core's integration capabilities further allow seamless incorporation into system designs, supporting comprehensive application scenarios in security-focused sectors. The core also features native HMAC (Hash-based Message Authentication Code) support, enhancing secure message verification processes. This capability ensures that data authenticity and integrity are maintained, adding another layer of security to systems deploying the DSHA2-256. With the increasing demand for secure computing environments, this cryptographic co-processor stands as a vital component for products requiring enhanced data security and encryption capabilities.

DCD-SEMI
28 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

Dukosi Cell Monitoring System (DKCMS)

The Dukosi Cell Monitoring System (DKCMS) revolutionizes battery system operations by incorporating real-time, cell-specific data monitoring for enhanced safety and efficiency. With the capacity to improve battery management in electric vehicles and stationary energy storage systems, this system utilizes innovative technology to log events and data continuously. By eliminating complex wiring, DKCMS simplifies battery architecture while maintaining superior performance. The system offers a sustainable solution by enabling circular economy practices through detailed data insights collected over the battery lifecycle.

Dukosi
28 Views
Cryptography Software Library, Embedded Security Modules, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators
View Details Datasheet

NVM Defender

NVM Defender is a groundbreaking technology designed to shield Integrated Circuits from common invasive attacks, particularly those aimed at extracting non-volatile memory (NVM) codes. It represents a significant advancement in hardware security, ensuring that critical design elements such as embedded software, cryptographic keys, and personal data are safeguarded. By integrating NVM Defender, chips are fortified against copying, emulation, and other forms of counterfeiting. This solution operates autonomously, detecting potential threats in real-time, rendering bypass attempts ineffective. This robust defense mechanism is proficient in maintaining security by design, a feature that is crucial in deterring unauthorized access across electronic devices. NVM Defender's structure inherently challenges any bypass techniques, ensuring that intrusions remain impractical. Its cost-effectiveness and ease of integration make it an attractive option for chip manufacturers and integrators looking to protect assets from intellectual property theft and replication. Furthermore, NVM Defender is not just a software solution but an embedded module, requiring minimal intervention from external platforms. This feature makes it reliable even when software vulnerabilities are exploited during attacks. It is the world's first digital solution specifically developed to combat embedded code extraction vulnerabilities, amplifying the security layers of semiconductor devices against emerging threats.

Texplained
28 Views
Embedded Security Modules, Platform Security, Security Subsystems
View Details Datasheet

iShield HSM

The Swissbit iShield HSM acts as a critical security anchor in IoT environments, offering robust hardware protection for sensitive keys used in device authentication and registration. This plug-and-play USB security module is vital for enhancing IoT designs that rely on hardware security to prevent key duplication or exposure in software-based environments. Its design facilitates seamless upgrades of existing IoT infrastructure with advanced security modules without the need for redesigning hardware. Capable of securely storing private key and certificate information, the iShield HSM ensures that sensitive cryptographic elements remain shielded from potential cyber threats. It's especially valuable for updating AWS IoT Greengrass devices, where hardware security can significantly bolster system resilience. Its high compatibility across platforms encourages wide adoption by offering seamless integration into diverse IoT setups.

Swissbit AG
27 Views
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details Datasheet

PQPlatform CoPro

PQPlatform CoPro consolidates high-performance hash and lattice-based cryptography in one entity, specifically designed for minimal system integration effort while maximizing cryptographic capability. It's aimed at enhancing existing security infrastructures with post-quantum capabilities, maintaining operational efficiency while providing solid side-channel countermeasures.

PQShield
27 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

Thermal Noise-based Random Bit Generator

Vivid Engineering's Thermal Noise-based Random Bit Generator is a specialized component generating random bits at frequencies between 0.2 to 2 MHz. It operates with a typical quiescent current of just 50 µA, ensuring minimal power consumption. This component is designed to leverage inherent thermal noise to produce reliable random sequences, serving crucial roles in security applications and systems requiring stochastic bit streams.

Vivid Engineering Inc.
27 Views
TSMC
65nm, 130nm, 150nm
Cryptography Cores, Embedded Security Modules
View Details Datasheet

MAC Privacy Protection IP

The MAC Privacy Protection core by Comcores offers an advanced layer of security for Ethernet systems. It addresses privacy concerns by introducing innovative measures for protecting MAC addresses and other sensitive information during data transmission. With a focus on cybersecurity needs, this core enhances data integrity and ensures confidentiality, allowing systems to operate without the risk of data breaches. It positions itself as an essential component in networks that require stringent privacy controls while maintaining operational efficiency.

Comcores
26 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

Substation Automation Systems Cryptographic COEsec

The Substation Automation Systems Cryptographic COEsec offers advanced cryptographic solutions tailored for substation automation systems. Ensuring secure and reliable data transmission, this core addresses the crucial need for cybersecurity in industrial automation. It provides robust encryption and decryption mechanisms designed to protect sensitive information from unauthorized access and cyber threats.<br><br>This IP is integral to safeguarding communication channels within power substations, ensuring that operations remain secure and resilient to potential attacks. It supports a wide variety of encryption standards, allowing it to be seamlessly integrated into different systems for enhanced cybersecurity.</br><br>Designed for power utility companies and sectors requiring fortified security measures, the COEsec core provides a secure environment to manage operations without compromising on efficiency or reliability. By offering high-level encryption and security features, it stands as a critical component in designing safe and resilient industrial networks.

Concurrent EDA, LLC
26 Views
TSMC
28nm
Embedded Security Modules, Ethernet, Platform Security
View Details Datasheet

Wireless energy transfer with interference enhancement

This technology utilizes enhancements to manage interference, ensuring efficient energy transfer even in environments with potential electromagnetic disturbances. By refining the way energy is transferred, this solution maximizes efficiency while maintaining high levels of safety and performance. It is particularly beneficial in complex settings where multiple devices or systems could potentially interfere with each other.

WiTricity
26 Views
All Foundries
All Process Nodes
A/D Converter, Embedded Security Modules, Photonics
View Details Datasheet

Side-channel Attack Resistance

The Side-channel Attack Resistance module provides specialized defense against potential leaks that occur when cryptographic keys are extracted using side-channel methods such as power consumption or electromagnetic emissions analysis. FortifyIQ’s approach integrates resistance directly into the design process, rather than relying on post-manufacturing testing, saving developers both time and financial resources. With tools like SideChannel Studio, developers can simulate side-channel vulnerabilities at the pre-silicon phase, thus identifying and mitigating leaks long before they become ingrained in physical hardware. By pinpointing weaknesses accurately, FortifyIQ's products ensure that robust countermeasures are built into the hardware, significantly enhancing security. This anticipatory strategy not only secures the hardware from anticipated side-channel threats but also aligns with NIST requirements, thereby fostering confidence in compliance and future-proofing the design against evolving security landscapes.

FortifyIQ
25 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

WiseEye2 AI Solution

The WiseEye2 AI solution from Himax represents a significant leap in ultralow power AI processing, particularly suited for IoT devices. It combines an advanced AI microcontroller with proprietary CMOS image sensors, facilitating continuous operation and data processing at remarkably low power levels. This solution is perfect for applications requiring persistent AI-driven insights, such as smart home devices, consumer electronics, and industrial sensing applications where battery conservation is critical. Built with Arm's Cortex-M55 CPU and the Ethos-U55 NPU, WiseEye2 supports complex neural network computations while maintaining a high standard of energy efficiency. These characteristics allow it to handle more sophisticated algorithms, yielding precise real-time processing and actionable insights. The cutting-edge architecture ensures that devices can operate autonomously for extended periods on minimal power supply. Security features are robust, employing industry-standard cryptography to safeguard sensitive data, making it ideal for applications where privacy and data integrity are paramount. Himax’s WiseEye2 solution continues the company's tradition of pioneering technology that transcends conventional limitations, enabling smarter, more efficient endpoint AI functionalities.

Himax Technologies, Inc.
25 Views
AI Processor, Embedded Security Modules, Processor Cores, Security Subsystems, Vision Processor
View Details Datasheet

CXL Controller

The CXL Controller developed by Panmnesia embodies innovation in minimizing latency and maximizing the efficiency of memory expansions. This controller is the backbone of their next-generation CXL systems, providing rapid data exchange capabilities with sub-two-digit nanosecond latency—an unparalleled achievement in the field. By ensuring cache coherence and efficient memory management, the CXL Controller facilitates the effective integration and synchronization of vast memory resources across computing environments.\n\nServing as a key component in realizing cost-efficient memory disaggregation, this controller automates critical memory operations across connected devices such as CPUs and accelerators. Its low-latency design ensures that expanded memory resources contribute to seamless computational performance, especially crucial for applications demanding high-speed data processing, like AI and machine learning operations.\n\nPanmnesia's CXL Controller enhances system flexibility, allowing for expandable computing and memory resources that can be tailored to specific application demands. This fosters resource scalability without compromising on performance and allows enterprises to cater to evolving operational requirements seamlessly.\n\nAs a testament to its advanced capabilities, the CXL Controller stands at the forefront of pushing industry performance standards, facilitating the integration of cutting-edge AI solutions into mainstream applications through efficient memory resource management and data handling capabilities.

Panmnesia
23 Views
Embedded Security Modules, RapidIO, SAS, SATA, SDRAM Controller, USB
View Details Datasheet

DKCMS Core

The DKCMS Core provides a robust, contactless solution for monitoring high-voltage battery packs across various applications. With features supporting high accuracy per-cell voltage metrics and temperature measurements, the core facilitates seamless data processing to enhance the battery management system (BMS) operations. Utilizing the proprietary C-SynQ communication protocol, the DKCMS Core enables efficient, low-latency communication between cell monitors and a system hub, reducing component needs by eliminating complex wiring harnesses. Its design fosters scalability, allowing for significant flexibility in battery pack development and deployment across different market segments.

Dukosi
22 Views
Cryptography Software Library, Embedded Security Modules, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators
View Details Datasheet

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures are crafted to preemptively address the vulnerabilities that arise from fault injection threats, which exploit design flaws by intentionally introducing malfunctions. Traditionally, the resilience of a design to these threats is evaluated only post-manufacture using expensive equipment. FortifyIQ’s pre-silicon solution allows for early-stage identification through robust simulation tools like FaultInjection Studio. FaultInjection Studio facilitates preemptive assessment of fault injection vulnerabilities, thereby eliminating costly post-production modifications and reducing the risk of operational disruptions. It employs an integrated simulation engine to scrutinize design robustness under simulated fault conditions, offering insights on potential flaws that could be exploited using techniques such as clock glitching or laser attacks. This methodology not only conserves resources but also enhances the accuracy and thoroughness of security assessments by providing a controlled, noise-free testing environment. FortifyIQ's fault injection defenses ensure that designs are fortified against attacks that would otherwise require costly patches or redesigns after production.

FortifyIQ
21 Views
Embedded Security Modules
View Details Datasheet

AI in Business Intelligence

Gyrus AI's AI in Business Intelligence product is designed to transform business operations by harnessing the power of machine learning and artificial intelligence insights. This offering provides companies with tools to analyze data more efficiently, enabling improved decision-making processes across various functions such as sales, research, and customer service. By integrating AI-driven models, businesses can extract valuable insights from complex datasets, empowering them to predict trends and optimize operations effectively. The system incorporates advanced analytics that are tailored to specific use cases, ensuring accuracy, precision, and recall in the results it generates. It is adept at interpreting data from disparate sources, facilitating a comprehensive view of the operational landscape through custom datasets. This AI-driven approach is instrumental in detecting anomalies, forecasting outcomes, and boosting overall business efficiency through data-driven processes. Moreover, this solution supports inventory management, anomaly detection, and natural language processing tasks, creating a versatile platform that caters to the evolving needs of modern enterprises. This adaptability makes AI in Business Intelligence a valuable asset for companies seeking to leverage AI technology to enhance their core functions.

Gyrus AI
17 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Processor Core Independent
View Details Datasheet

PVT Monitors

Omni Design offers a sophisticated range of OmniTRUST™ Process, Voltage, and Temperature (PVT) monitors that are integral in ensuring the operational integrity and reliability of electronic systems. Designed for comprehensive monitoring, these PVT monitors fulfill the critical need for real-time insights into the temperature, voltage, and process variations within semiconductor devices. They play a vital role in dynamic power management, helping to prevent performance loss and maintain device reliability under different environmental conditions. Engineered to deliver accurate readings across a broad temperature span, OmniTRUST™ PVT monitors excel in providing detailed information about the state of PMOS, NMOS, and I/O devices, among other components. This precision aids in the verification of device functionality and efficacy, contributing significantly to the system's overall stability. Moreover, these monitors incorporate advanced features such as low power modes to enhance their efficiency further, making them a favored choice in high-performance sectors that demand reliability and adaptability. With support for various process nodes and the ability to customize to specific needs, these monitors are a flexible solution for the engineering challenges faced by modern electronics today.

Omni Design Technologies, Inc.
14 Views
TSMC
7nm LPP, 800nm
Embedded Security Modules, Sensor, Temperature Sensor
View Details Datasheet

NeoPUF

NeoPUF stands out as a critical Hardware Security IP by eMemory, leveraging PUF (Physical Unclonable Function) technology to provide an unprecedented level of security. This technology plays a fundamental role in protecting sensitive information from potential security threats throughout the lifecycle of a semiconductor. It offers a trusted path for secure key generation and storage, making its mark in industries from automotive to IoT.\n\nNeoPUF's design draws from unique micro-architectures inherent to each chip, ensuring a secure root of trust that is both robust and unclonable. The technology is exceptionally efficient in combating cloning and counterfeiting attempts, providing peace of mind in high-security environments where data integrity is paramount.\n\nWith its state-of-the-art technology, NeoPUF enables manufacturers to achieve secure encryption and authentication, laying down a secure foundation for hardware security. This IP upholds eMemory's commitment to advancing secure technology solutions, providing significant support to companies prioritizing security in their semiconductor products.

eMemory Technology Inc
13 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details Datasheet

HDCP 1.x/2.x

The HDCP 1.x/2.x solutions by Bitec offer a reliable encryption method, essential for the protection and secure transfer of digital content across HDMI and DisplayPort interfaces. The core is engineered to provide robust defense against unauthorized access, maintaining the integrity and confidentiality of transmitted media. This is crucial for applications ranging from broadcast media to gaming consoles, where content protection is paramount.\n\nBitec's HDCP solution plays a vital role in preventing the illegal copying and distribution of media, supporting both HDCP 1.x and 2.x protocols. This dual-compliance ensures compatibility with a wide range of devices, creating seamless interconnectivity between older and newer hardware systems. By safeguarding digital signal transmission, companies can ensure they meet compliance regulations while delivering quality content.\n\nThis technology not only meets existing standards but is designed to adapt to future security advancements. It integrates easily into high-definition video solutions, addressing the evolving requirements of the media industry for versatile and effective content protection mechanisms.

Bitec
12 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet

CCSDS LDPC (8160, 7136)

IPrium's CCSDS LDPC (8160, 7136) implements a Low-Density Parity-Check (LDPC) encoding and decoding scheme as per the Consulting Committee for Space Data Systems (CCSDS) standards. This IP core is crafted to optimize data transmission in satellite and space communication systems where signal integrity and error correction are vital. This LDPC solution is tailored for highly efficient data correction processes, minimizing the adverse effects of noise and distortion in signal propagation. Its architecture supports extensive fault tolerance, a crucial requirement for maintaining long-duration communication links in space missions, thereby ensuring data remains uncorrupted over vast distances. Widely adopted in the aerospace industry, this LDPC standard adheres to stringent performance parameters, making it a trusted choice for state-of-the-art communications technology. By incorporating IPrium's CCSDS LDPC into your systems, you achieve superior error rate performance, vital for reliable and secure communications in challenging environments.

IPrium LLC
7 Views
Cryptography Cores, Embedded Security Modules
View Details Datasheet
Chat to Volt about this page

Chatting with Volt