Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Security Protocol Accelerators

Security Protocol Accelerators Semiconductor IP

Security Protocol Accelerators are crucial components within the realm of semiconductor IP, designed to boost the performance of security protocols in various applications. These accelerators play a pivotal role in enhancing the speed, efficiency, and reliability of data encryption and decryption processes, which are fundamental for secure communications and transactions across networks. By implementing specialized hardware for protocol acceleration, these semiconductor IPs offer significant improvements in processing speed compared to software-only solutions.

One of the primary uses of Security Protocol Accelerators is in network security devices, including routers, firewalls, and VPNs, where they ensure secure communication by accelerating tasks such as data encryption and IPsec processing. As data breaches and cyber threats continue to evolve, the demand for robust and efficient security solutions has never been higher. These accelerators enable the optimization of cryptographic operations, providing enterprises and individuals with the confidence that their sensitive data is well-protected during transmission.

In consumer electronics like smartphones, tablets, and smart home devices, security protocol accelerators are key to maintaining user privacy without compromising on performance. They ensure that devices can handle complex security tasks quickly, extending battery life and maintaining seamless user experiences. Whether it’s ensuring the security of cloud-based services or protecting communications over Wi-Fi and cellular networks, these semiconductor IPs are increasingly vital in an interconnected world.

Moreover, the rise of IoT devices and edge computing has expanded the need for security protocol accelerators. With the massive data exchange happening at the edge of networks, having efficient security IPs ensures not just the safety of the data but also compliance with regulatory standards. As companies continue to push for innovations in AI and machine learning, the integration of security protocol accelerators in their systems helps to safeguard intellectual property and sensitive algorithms, thereby maintaining a secure operational environment. Through leveraging these semiconductor IPs, creators can focus on innovation while relying on proven security foundations.

All semiconductor IP
42
IPs available

SphinX

SphinX provides industry-standard encryption and decryption using high-performance, low-latency AES-XTS technology. Its design features independent, non-blocking encryption and decryption channels, ensuring data security is maintained without impeding processing speed or system throughput. SphinX is tailored for environments where data protection is paramount, delivering robust security capabilities while preserving system efficiency and performance.

ZeroPoint Technologies
74 Views
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

PUFrt

PUFrt is a foundational security solution that equips semiconductors with hardware root key generation and storage, essential for establishing a Hardware Root of Trust. It introduces a 1024-bit PUF-based identification code and a true random number generator (TRNG) that comply with stringent cryptographic standards, enhancing data protection against diverse threats. The design includes secure OTP storage and an anti-tamper shell, providing a robust defense against physical attacks. Assured compatibility with varied architectures allows PUFrt to integrate seamlessly, offering key provisioning and securing critical data across system platforms.

PUFsecurity
71 Views
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

PUFcc

PUFcc is a crypto coprocessor that combines a Hardware Root of Trust with a comprehensive suite of cryptographic capabilities. It integrates seamlessly into various system architectures, providing a complete security protocol solution required for IoT and AI technologies. The PUFcc leverages its foundational PUFrt's secure design while enhancing cryptographic functionality with certified algorithms. This drop-in IP module features direct memory access, enabling faster data interaction necessary for real-time applications. Particularly with its latest iteration, the PUFcc7, improvements in algorithm performance and TLS1.3 compliance demonstrate its adaptability to evolving standards.

PUFsecurity
64 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

AES Encrypt/Decrypt 128/192/256

The AES Encrypt/Decrypt module offers robust security features, accommodating 128/192/256-bit keys for both encryption and decryption tasks. This module is engineered for low latency and minimal power consumption, making it suitable for high-demand environments where security and performance are critical. The design implements Galois Field calculations using an 8-bit primitive polynomial, enabling parallel processing of key calculation and data encryption to minimize clock cycle use. The flexibility of the module is evident in its runtime programmability, ensuring that each operation can be tailored to meet specific security and performance criteria. Applications span across secure communications and any data exchange requiring high encryption standards, with the system delivering verified RTL against a broad suite of scenarios to guarantee functional integrity.

Secantec, Inc.
63 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

xT CDx

xT CDx is an advanced genomic profiling solution used for comprehensive tumor and normal matched testing in oncology. With a focus on solid tumors, xT CDx leverages extensive gene coverage to aid in clinical decision-making. The system utilizes high-depth sequencing to provide actionable insights, aligning genomic findings with targeted therapy options. The platform is renowned for its substantial coverage of exons and is accredited for detecting a wide array of variants that contribute significantly to personalized medicine. As an in vitro diagnostic system, xT CDx is designed to serve as a companion diagnostic tool for oncologists, particularly in tailoring treatments that align with existing therapeutic guidelines. Its sophisticated analytical capabilities ensure that oncologists have the support they need to match patient profiles with clinical trials and approved treatments promptly. This facilitates a genomic-centric approach, integrating DNA sequencing insights into the broader clinical workflow. Incorporating both tumor and normal tissue comparisons, xT CDx is able to discern hereditary traits that might influence cancer treatment. This dual-approach testing enhances the diagnosis accuracy and optimizes treatment pathways, setting a new standard in oncology precision testing.

Tempus Inc.
63 Views
Embedded Memories, Flash Controller, GPU, I/O Library, Mobile SDR Controller, SDRAM Controller, Security Protocol Accelerators, Standard cell
View Details Datasheet

FortiCrypt

FortiCrypt is designed to provide AES protection against side-channel attacks (SCA) and fault injection attacks (FIA) without compromising on performance or latency. It utilizes sophisticated masking methods and has been rigorously tested using the Test Vector Leakage Assessment (TVLA) methodology. FortiCrypt supports various high-performance configurations, including ultra-high performance, ultra-low power, and a balanced approach that meets diverse security needs. These configurations allow for encryption of high-definition video streams on less powerful CPUs, making it ideal for a range of applications that require advanced security.

FortifyIQ
60 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

AES-XTS for Encryption of Storage Devices

The AES-XTS solution by Helion is tailored for disk encryption, leveraging the Tweakable block cipher algorithm to provide enhanced data security at the sector level on storage devices. The AES-XTS mode is designed to prevent threats like copy-and-paste or dictionary attacks and can independently encrypt and decrypt data in sector-sized blocks. This encryption core is crucial for safeguarding sensitive data on storage arrays, ensuring that identical plaintext blocks placed at different sectors result in distinct ciphertext. Helion offers a variety of AES-XTS cores to address differing data throughput needs, with capabilities ranging from less than 1Gbps to over 64Gbps, making it suitable for singular hard disks to large server arrays. Helion's AES-XTS solutions can be deployed on both ASIC and FPGA platforms, ensuring maximum performance and resource efficiency across varied technological landscapes. They support key sizes of 128-bit and 256-bit, with options for Ciphertext Stealing, adapting to diverse encryption protocols and operational environments.

Helion Technology Limited
55 Views
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

ChipJuice

ChipJuice is an innovative tool for reverse engineering integrated circuits, uniquely designed for comprehensive IC analysis and security evaluation. This versatile software tool supports digital forensics, backdoor research, and IP infringement investigations, making it indispensable for labs, government entities, and semiconductor companies. ChipJuice operates efficiently across various IC architectures, allowing users to extract internal architecture details and generate detailed reports, including netlists and hardware description language files. The tool's intuitive user interface and high-performance processing algorithms make it accessible to users of different expertise levels, from beginners to advanced professionals. It is capable of handling a wide range of chips, regardless of their size, technology node, or complexity, providing a scalable solution for diverse reverse engineering tasks. ChipJuice's automated standard cell research feature further enhances its analytic capabilities, enabling efficient identification and cataloging of IC components. Moreover, ChipJuice facilitates a seamless analysis process by simply using electronic images of a chip's digital core. This allows for precise signal tracing and thorough IC evaluation, supporting its users' strategic objectives in security audits and architectural exploration. ChipJuice is an essential tool for those seeking to delve deep into ICs for security validation and developmental insights.

Texplained
54 Views
CPU, DMA Controller, DSP Core, Microcontroller, Processor Core Independent, Security Processor, Security Protocol Accelerators
View Details Datasheet

eSi-Crypto

The eSi-Crypto suite from EnSilica offers an extensive range of cryptographic IPs designed to provide high-quality encryption and authentication functionalities. A standout feature of this suite is its True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and ensures robust random number generation essential for secure communication. These cryptographic cores are versatile and can be easily integrated through various bus interfaces like AMBA APB/AHB and AXI.\n\nSupporting numerous algorithms such as CRYSTALS Kyber and Dilithium, ECDSA/ECC, and AES, the eSi-Crypto suite advances quantum-resilient cryptography. This feature is crucial as it prepares secure digital communications against future quantum threats. Moreover, the suite includes high-throughput solutions suitable for applications that demand both efficiency and resource optimization, like V2X communications.\n\nEnSilica's cryptographic IPs exhibit compatibility with ASIC and FPGA targets, offering low resource usage while maintaining exceptionally high throughput. The suite also encloses IPs for various SHA algorithms, ChaCha20, Poly1305, and traditional standards like RSA and TDES. This comprehensive range meeting both modern cryptographic demands ensures that data protection remains robust and flexible in diverse application scenarios.

EnSilica
54 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details Datasheet

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP encompasses advanced solutions designed to counter the potential threats posed by quantum computing. This IP includes hardware accelerators and software libraries implementing lattice-based and hash-based algorithms, offering extensive protection against various side-channel attacks. With capabilities for key generation, encapsulation, and decapsulation, this solution integrates seamlessly into AMBA interfaces, ensuring secure and efficient cryptographic processes in future-proof environments.

Secure-IC
54 Views
Cryptography Cores, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module, or PHSM, by CrossBar, is designed to address the growing need for enhanced security measures in electronic devices. By leveraging CrossBar's ReRAM technology, the PHSM offers a robust solution for secure key storage and encryption, protecting devices from unauthorized access and cyber threats. It acts as a vital component in maintaining the integrity and confidentiality of data across various applications. The module incorporates cryptographic mechanisms to create a secure environment against physical and digital attacks, ensuring that sensitive information remains protected from sophisticated hacking attempts. The intrinsic characteristics of ReRAM technology, such as its high randomness and low bit error rates, form the core of the PHSM's ability to deter potential attacks. Engineered with a focus on root of trust applications, the PHSM reinforces secure authentication processes, which are crucial in industries like automotive, medical, and IoT-based systems. The compact design aids in seamless integration within semiconductor hardware, thereby supporting diverse applications that demand rigorous security protocols.

CrossBar Inc.
53 Views
All Foundries
28nm, 90nm, 500nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

FortiMac

FortiMac delivers robust security for HMAC SHA2 implementations by offering powerful protection against both side-channel (SC) and fault injection (FI) attacks. It employs the Threshold Implementation paradigm to ensure high-level security with a minimal gate footprint. FortiMac's core technology has undergone extensive analytical and physical validation to guarantee its effectiveness against modern threats. It is an ideal choice for applications requiring strong and reliable cryptographic protection.

FortifyIQ
52 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

Securyzr iSSP

The Securyzr iSSP, or Integrated Security Services Platform, is a robust lifecycle management solution tailored for secure deployment, supply, and management of embedded devices. This platform facilitates zero-touch security lifecycle services such as provisioning, firmware updates, and security monitoring, thus ensuring consistent and reliable security from chip manufacture to device decommissioning. It integrates both a secure element (iSE) and a server component, creating a comprehensive chip-to-cloud security solution capable of functioning on public and private cloud environments.

Secure-IC
52 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

Dukosi Cell Monitoring System (DKCMS)

The Dukosi Cell Monitoring System (DKCMS) is an advanced solution designed to enhance the performance, safety, and sustainability of batteries, particularly for high-power applications. This innovative system employs a Dukosi DK8102 Cell Monitor per cell, offering precise voltage and temperature data collection. By using the proprietary C-SynQ communication protocol, cell data is transmitted synchronously via a single bus antenna to a DK8202 System Hub, maintaining communication even amid dynamic conditions. This architecture facilitates real-time monitoring, ensuring cells operate within safe parameters while optimizing the battery's overall performance. DKCMS's contactless connectivity stands out, eliminating the complexity of traditional wire harnesses and simplifying integration. This design reduces the number of components needed, which underscores reliability and reduces cost. Additionally, the contactless communication provides robust data transmission with predictable latency, catering to complex, safety-critical environments where precision and reliability are paramount. Scalability is another essential feature of the DKCMS, enabling seamless adaptation to a range of applications from electric vehicles to energy storage systems. The system supports up to 216 cells, allowing flexibility in design without extensive reengineering. This allows for efficient upscaling or downscaling according to specific project requirements, ensuring that the solution can evolve alongside changing technological or market landscapes.

Dukosi
51 Views
8 Categories
View Details Datasheet

FortiPKA-RISC-V

The FortiPKA-RISC-V serves as a highly efficient public key accelerator that offloads intense computational tasks from the main CPU. It features a unique technology that enhances performance by eliminating unnecessary data transformations, thus providing a small footprint but robust performance. This makes it suitable for applications such as networks, communications, and embedded systems where efficiency and speed are essential. The accelerator supports multiple cryptographic algorithms and interfaces, ensuring broad compatibility with various systems and technologies.

FortifyIQ
51 Views
AMBA AHB / APB/ AXI, Coprocessor, Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

AES Encryption for RFID applications

The AES Encryption for RFID applications is engineered to provide robust security for data in RFID communications. Utilizing Advanced Encryption Standard (AES) techniques, it offers a secure and efficient mechanism for protecting sensitive information transmitted in RFID systems. This encryption solution is ideal for applications where data integrity and confidentiality are paramount, protecting against unauthorized access and ensuring secure wireless transactions.

RADLogic Pty Ltd
48 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details Datasheet

AES (standard modes) for Secure Encryption

The AES (standard modes) product from Helion offers a robust encryption solution featuring the Advanced Encryption Standard (AES) algorithm, a 128-bit block cipher known for its efficiency and security. With key sizes of 128, 192, and 256 bits, the AES algorithm complies with NIST standards and is recognized globally for securing sensitive information. This product caters to applications necessitating rapid data processing and heightened security, such as in IPsec, wireless communication, and storage encryption. Helion's AES cores are crafted to deliver optimal performance across a vast array of settings, including both ASIC and FPGA implementations. The cores are designed with scalability in mind, accommodating applications from minimal data rates up to multi-gigabit transmission speeds. Thanks to their architecture, these cores maintain high usability, enabling easy adoption and integration into user systems without excessive resource allocation. Helion's AES suite includes numerous versions tailored to meet varying data transmission needs, ensuring adaptability in resource-constrained environments. Users benefit from the choice of low-power, space-efficient, and high-speed solutions, supporting a wide range of encryption requirements. These cores are also compatible with an array of programmable technologies, reaffirming their utility across diverse platforms, from commercial applications to government-level data protection setups.

Helion Technology Limited
47 Views
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

DAES Cryptographic Processor

The DAES processor serves as a robust cryptographic co-processor designed to support the Rijndael algorithm, which is crucial for advanced encryption standards. Capable of handling 128-bit and 256-bit key lengths, this unit provides robust security measures for various cipher block modes such as ECB, CBC, CFB, OFB, and CTR. Integrated with internal key expansion modules, the DAES ensures efficient cryptographic operations while maintaining secure key management. Its architecture supports integration with APB, AHB, and AXI buses, which simplifies its deployment across diverse silicon environments and enhances its applicability in systems necessitating high levels of security. This cryptographic unit is ideal for applications in secure communications, defense, and areas requiring data confidentiality and integrity. The DAES's tailored encryption capabilities make it a formidable choice for developers seeking to bolster system security and manage complex data encryption processes.

DCD-SEMI
44 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

MACSec IP

CoMira Solutions' MACSec IP is designed to provide robust security and integrity to networking applications, adhering to the IEEE 802.1AE-2006 MACSec standard. This IP enables secure and reliable transmission of data over LAN, safeguarding against disruption and unauthorized interception. Built with a time-division multiplexed cut-through architecture, the IP offers high throughput for multiple channels while maintaining synchronization-independent operation, thereby providing efficiency without compromising on security. Features include support for FIPS-compliant encryption algorithms, flexible multi-port operation, and customizable security associations, making it an ideal solution for secure networking environments.

CoMira Solutions
44 Views
Cryptography Cores, Cryptography Software Library, Security Protocol Accelerators
View Details Datasheet

Calibrator for AI-on-Chips

The Calibrator for AI-on-Chips epitomizes precision in maintaining high accuracy for AI System-on-Chips through advanced post-training quantization (PTQ) techniques. It offers architecture-aware quantization that sustains accuracy levels up to 99.99% even in fixed-point architectures like INT8. This ensures that AI chips deliver maximum performance while staying within defined precision margins. Central to its operation, Calibrator uses a unique precision simulator to emulate various precision-change points in a data path, incorporating control information that synchronizes with ONNC's compiler for enhanced performance. The integration with ONNC's calibration protocols allows for the seamless refinement of precision, thereby reducing precision drop significantly. Highly adaptable, the Calibrator supports multiple hardware architectures and bit-width configurations, ensuring robust interoperability with various deep learning frameworks. Its proprietary entropy calculation policies and architecture-aware algorithms ensure optimal scaling factors, culminating in a deep learning model that is both compact and precise.

Skymizer
43 Views
AI Processor, DDR, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators
View Details Datasheet

ReRAM Secure Keys

ReRAM Secure Keys by CrossBar provide a cutting-edge solution for applications requiring a robust security framework. This technology leverages the unique characteristics of ReRAM technology to generate cryptographic keys that serve as the foundation for secure device operations. These keys function as Digital Fingerprints, crucial in preventing unauthorized access and copying. ReRAM Secure Keys technology surpasses traditional SRAM-based security solutions, offering high randomness, low error rates, and strong resistance to tampering. It is particularly well-suited for devices in IoT, computing, and infrastructure where security threats are prevalent and systems require stringent protective measures. This solution enhances device root of trust, a vital component for authentication and encryption processes. Its ability to securely maintain cryptographic keys even in foundry nodes smaller than 28nm underscores its versatility and strength in the industry's pursuit of high-security standards across various electronic applications.

CrossBar Inc.
42 Views
All Foundries
28nm, 90nm, 250nm
Cryptography Cores, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details Datasheet

ECC Verification Core

The ECC Verification Core delivers high-performance verification of elliptic curve cryptographic operations, ensuring superior data protection. Central to modern public key infrastructures, this core supports advanced elliptic curves and is equipped for efficient elliptic curve digital signature operations. Incorporating this core into security systems grants stakeholders the advantage of reliable data verification processes across sectors like telecommunications, military, and internet services. This core facilitates resilient signature verification, essential for applications that handle sensitive and private communications. Through detailed point multiplication processes and swift data throughput, the ECC Verification Core maintains operational efficiency while upholding rigorous security protocols. It is a strategic asset for organizations looking to elevate their security postures, providing robust, scalable solutions to authenticate data and digital identities.

Digital Core Design
39 Views
Audio Processor, Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

AES-GCM for Authenticated Encryption

Helion's AES-GCM core provides a high-performance implementation of the AES in Galois Counter Mode (GCM), which is renowned for offering both encryption and authentication functionalities. This mode is specifically engineered to achieve high throughput rates while maintaining robust security, suitable for applications such as secure networking and high-speed data transfers. The GCM mode allows pipelining and parallelism, making it ideal for environments where latency and throughput are critical. Helion's AES-GCM implementations support a wide range of processing requirements, with throughput options from less than 50Mbps up to over 40Gbps, thus accommodating both lightweight applications and those demanding extensive data handling capabilities. Available for various technologies like ASICs and FPGAs, including platforms from Xilinx and Altera, Helion's AES-GCM cores are designed to deliver fast, efficient encryption and authentication. Its adaptability and performance efficiency make the Helion AES-GCM solution a strong candidate for any system requiring secure data encryption combined with swift response times.

Helion Technology Limited
38 Views
All Foundries
All Process Nodes
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

DSHA2-256 Cryptography Co-Processor

The DSHA2-256 is a highly efficient cryptographic co-processor, serving as a pivotal solution for hash operations in secure communications. It is designed to accelerate the SHA2-256 hash functions, adhering to the FIPS PUB 180-4 standards. This processing unit supports both SHA2 224 and 256 bit modes, providing significant flexibility for developers working with varying levels of security requirements. This co-processor also supports HMAC in its native mode as per RFC 2104 recommendations, thus broadening its applicability in secure message authentication. The DSHA2-256 stands as a versatile tool for enhancing data integrity and verification in multiple domains such as fintech, defense, and wireless communications. With seamless integration capabilities, the DSHA2-256 fits well with APB, AHB, and AXI bus systems. This ensures it can be easily incorporated into existing processing environments without significant overhead, thereby streamlining the development process while safeguarding data against potential threats.

DCD-SEMI
38 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details Datasheet

ONNC Compiler

The ONNC Compiler is designed to meet the growing demands of AI-on-chip development, serving as a cornerstone for transforming neural networks into machine instructions suitable for diverse processing elements. Its robust architecture supports key deep learning frameworks such as PyTorch and TensorFlow, seamlessly converting various file formats into intermediate representations using MLIR frameworks. ONNC facilitates the compilation process with advanced pre-processing capabilities powered by machine learning algorithms to convert input files optimally. The compiler is highly versatile, supporting both single-backend and multi-backend modes to cater to different IC designs. In the single-backend mode, it generates machine instructions for general-purpose CPUs like RISC-V or domain-specific accelerators like NVDLA. For complex AI SoCs, the multi-backend mode manages resources across different processing elements, ensuring robust machine instruction streams. ONNC's enhanced performance is achieved through hardware/software co-optimization, particularly in handling memory and bus allocations within heterogeneous multicore systems. By employing advanced techniques such as software pipelining and DMA allocation, ONNC maximizes resource utilization and curtails energy consumption without compromising on computational accuracy.

Skymizer
38 Views
AI Processor, AMBA AHB / APB/ AXI, CPU, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators
View Details Datasheet

AES Core

The AES Core is a high-performance encryption and decryption engine designed to provide robust security for digital communication and data storage. With a focus on minimizing energy consumption, the AES Core is optimized for a range of applications, including financial transactions and secure communications. This encryption engine offers seamless integration into various systems with its compact design and allows for scalable security levels to meet diverse operational requirements. Its implementation ensures data protection through advanced cryptography methods, safeguarding sensitive information against potential threats.

Green IP Core
36 Views
GLOBALFOUNDARIES, TSMC
55nm, 65nm
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

DKCMS Core

The DKCMS Core integrates seamlessly into high-performance battery packs, offering a robust and innovative cell monitoring solution. This core functionality supports precise, per-cell measurements and robust data processing, which are transmitted to the main BMS via the System Hub using Dukosi's unique C-SynQ protocol. The core is designed to maintain synchronization and accurateness even in rapidly changing environments, bolstering the security and reliability of the battery management system. This core system is tailored specifically for high-capacity battery applications, providing solutions that augment the overall safety, efficiency, and life span of battery packs. With its adaptive channel hopping and automatic or manual channel masking features, the DKCMS Core ensures uninterrupted and secure data communication. Additionally, its wake-on-fault feature is essential for systems that need to maintain vigilance even during low power conditions. Notably, the core's scalability feature allows it to manage substantial battery capacities, making it suitable for everything from vehicles to stationary storage solutions. The design also incorporates elements like passive cell balancing and fault reporting which contribute toward improved operational efficacy and longevity, resulting in lower operational costs and increased robustness of the battery systems in which it is implemented.

Dukosi
35 Views
Cryptography Software Library, Embedded Security Modules, Input/Output Controller, Interrupt Controller, Peripheral Controller, Security Protocol Accelerators, Timer/Watchdog
View Details Datasheet

xF+ Liquid Biopsy Panel

The xF+ Liquid Biopsy Panel by Tempus is specifically designed for the analysis of circulating tumor DNA (ctDNA) in solid tumor applications. By employing next-generation sequencing techniques, this panel offers an extensive coverage of regions that are pivotal in monitoring disease progression and treatment response. This non-invasive test is crucial for patients where traditional tissue biopsies may be impractical. The panel includes robust analytical capabilities that provide oncologists with valuable data on genetic mutations critical to treatment planning. With deep sequencing coverages and sophisticated genomic insights, xF+ is instrumental in navigating complex oncology cases, especially for its precision in pinpointing clinically relevant alterations that influence treatment choices. Featuring a unique methodology that emphasizes sensitivity and specificity, the xF+ Liquid Biopsy Panel plays an essential role in ongoing patient management. Its capability to analyze ctDNA provides critical insights into tumor dynamics over time, assisting healthcare professionals in evaluating therapy effectiveness and potential genomic mutations that could predict disease recurrence or progression.

Tempus Inc.
35 Views
Flash Controller, GPU, Mobile SDR Controller, SDRAM Controller, Security Protocol Accelerators, USB, VME Controller
View Details Datasheet

AES Crypto

The AES Crypto core by Dillon Engineering offers comprehensive encryption and decryption solutions meeting FIPS 197 standards. Equipped to handle a wide range of data processing needs, this core supports multiple encryption modes including ECB, CBC, OFB, and others, allowing for dynamic changes in encryption keys without affecting throughput. It features a scalable architecture from HDL or targeted EDIF, adaptable to FPGA and ASIC environments, designed with efficiency in mind, offering high throughput and area performance trade-offs. This adaptability renders it suitable for various applications requiring robust security measures seamlessly integrated within existing workflows, leveraging the speedy encryption processes tailored to any application requirements.

Dillon Engineering, Inc.
34 Views
Intel Foundry
40nm
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

DCRP1A

DCRP1A, branded as CryptOne, is a highly secure cryptographic system rooted in over 20 years of expertise from Digital Core Design. This cryptographic solution is engineered for 100% security, optimized for minimal silicon footprint while delivering exceptional processing speeds to safeguard information. With an inherent resistance to power and timing attacks, CryptOne stands as a robust choice for secure digital environments. The DCRP1A smoothly integrates into various systems, leveraging dynamic elliptic curve cryptography for safeguarding communication. This cryptographic core is crucial in environments where advanced security measures are non-negotiable, such as in telecommunications, fintech, and governmental applications. DCRP1A's architecture fully aligns with the stringent requirements set by both the European Commission and the US National Security Agency, making it a future-proof choice amidst the growing anticipation of quantum computing challenges. Designed to operate within any electronic infrastructure, DCRP1A provides versatile security solutions that adapt to evolving threats. Its architecture, combining proprietary processors and cryptographic innovations designed by Polish cryptographers, offers users unprecedented levels of security. Whether for e-governance or military applications, this core delivers performance while maintaining uncompromised security standards.

Digital Core Design
34 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

Security Protocol Accelerators

Synopsys's Security Protocol Accelerators are designed to enhance the security capabilities of digital systems by providing efficient hardware-based encryption and security functions. These accelerators are essential in safeguarding sensitive data and ensuring secure communication in applications ranging from IoT devices to high-performance computing systems. The security protocol accelerators support a wide range of cryptographic functions, including symmetric and asymmetric key encryption, authentication, and hash functions, tailored to address stringent security requirements. By offloading complex security operations from the main processor, these accelerators significantly enhance system performance and efficiency. Integrating these accelerators into embedded systems facilitates compliance with security standards and regulations, offering a reliable solution for secure data transmission and storage. Accompanied by comprehensive support and extensive documentation, Synopsys's security protocol accelerators are a preferred choice for developers committed to implementing robust security measures in their SoCs.

Synopsys, Inc.
33 Views
Content Protection Software, Security Protocol Accelerators
View Details Datasheet

DAES Cryptographic Co-Processor

The DAES Co-Processor is a high-performance cryptographic module designed to execute advanced encryption using the Rijndael algorithm, conforming to standard block cipher modes. Offering bridges to APB, AHB, and AXI buses, the DAES Co-Processor supports 128 and 256-bit key lengths. It's comprehensive in its encryption capabilities, incorporating block modes such as ECB, CBC, CFB, OFB, and CTR. Aimed at delivering robust security for digital communication systems, the DAES Co-Processor is ideal for applications requiring high levels of data confidentiality and integrity. It incorporates an internal key expansion module that enhances the flexibility and scalability of security applications across various industries, including finance, telecommunications, and enterprise data security. The DAES Co-Processor not only ensures data protection through its compliance with rigorous encryption protocols but does so with superior processing efficiency, which makes it suitable for embedded systems where computational resources are limited but secure processing is critical. Organizations can rely on this co-processor to bolster their encryption capabilities without impacting system performance.

Digital Core Design
31 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DSHA2-256 Hash Accelerator

The DSHA2-256 is a specialized cryptographic bridge designed to significantly enhance the performance of the SHA2-256 hash function. By facilitating a rapid connection through standard interfaces like APB, AHB, and AXI bus, it ensures efficient data processing and security for digital applications. This accelerator supports SHA2 in both 224 and 256-bit modes, and is compliant with the FIPS PUB 180-4 and RFC 2104 HMAC standards. Engineered for versatility, the DSHA2-256 is a universal solution that fits seamlessly into diverse electronic environments, catering to applications demanding heightened security. It's specifically beneficial for sectors requiring robust data authenticity, including aerospace, financial services, and cybersecurity. Its native mode support for HMAC enhances its utility for message integrity and authentication in both embedded and external systems. With optimal speed and minimal latency, the DSHA2-256 ensures that security does not come at the cost of performance. Organizations implementing this cryptographic accelerator can maintain high throughput while ensuring their data remains protected against unauthorized access and modifications. The DSHA2-256, with its advanced hashing capabilities, is a key enabler in building secure and efficient data transmission ecosystems.

Digital Core Design
31 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

Video Anonymization

The Video Anonymization technology developed by Gyrus AI is an innovative solution dedicated to enhancing privacy in video data analytics. This solution efficiently anonymizes individuals within video footage without compromising on the video's overall quality or informative content. The technology distinguishes itself by employing advanced AI algorithms that detect and mask sensitive data, ensuring compliance with privacy regulations across different regions. Gyrus AI's Video Anonymization is adaptable to a wide range of applications, from corporate security to public safety and surveillance. It integrates seamlessly with existing video systems, providing an essential layer of security without necessitating major infrastructural changes. The anonymization process is conducted in real-time, allowing for immediate analysis and response, a crucial factor in dynamic environments like retail and public spaces. What further sets this solution apart is its ability to maintain operational efficiency without high computational demands. By leveraging edge computing capabilities, the Video Anonymization tool minimizes latency and enhances processing speed, ensuring that high-quality anonymized videos are produced swiftly and efficiently.

Gyrus AI
31 Views
Samsung, UMC
28nm, 55nm
Cryptography Software Library, Graphics & Video Modules, Interrupt Controller, Security Protocol Accelerators
View Details Datasheet

DSHA2-512 Hash Accelerator

The DSHA2-512 is a sophisticated hash accelerator constructed to optimize the performance of SHA2-512 hashing functions. It incorporates robust connectivity features, linking seamlessly to major bus interfaces including APB, AHB, and AXI. This facilitates enhanced security operations across numerous applications, supporting SHA2 bit modes of 256, 384, and 512, while adhering to industry standards such as FIPS PUB 180-4 and RFC 2104 for HMAC. Specifically designed for environments with demanding security requirements, the DSHA2-512 finds its application in sectors ranging from secure telecommunications to advanced governmental departments. Its comprehensive mode support and high-throughput capabilities make it a reliable choice for ensuring data integrity and authenticity in simultaneous processes. The integration of native mode HMAC support expands its utility in authentication processes, providing an additional layer of security for sensitive transactional data. With its optimized design, the DSHA2-512 ensures smooth operational flow without compromising the system's processing efficiency. As organizations deal with increasingly complex security landscapes, this hash accelerator provides a pivotal component in maintaining a secure and highly functional data processing environment.

Digital Core Design
30 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DSHA2-384 Hash Accelerator

The DSHA2-384 Hash Accelerator is designed to supercharge the performance of the SHA2-384 hash functions within digital systems. By providing seamless bridging to key interfaces, such as APB, AHB, and AXI buses, this accelerator is highly effective at maintaining data security across various digital applications. It supports a range of bit modes from SHA2 224 up to 384, ensuring compliance with FIPS PUB 180-4 and RFC 2104 HMAC standards. This cryptographic accelerator is built to address the security needs of diverse industry sectors, ensuring message integrity and data authenticity. Whether in high-demand financial systems or sensitive governmental operations, its broad compatibility and speed make it indispensable for maintaining secure channels of communication. Its native HMAC support further broadens its applicability, offering robust message authentication within embedded systems as well as in external applications. The DSHA2-384 operates efficiently to guarantee that increased data security does not result in bottlenecks or reduced throughput. It empowers organizations to secure their data assets effectively, making this accelerator a vital tool in enhancing the cryptographic strength of digital networks and infrastructure.

Digital Core Design
29 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

ECDSA Verify

ECDSA Verify IP Core is engineered to provide robust verification of digital signatures, utilizing elliptic curve cryptography. Famed for its unmatched size-performance ratio, it accommodates key elliptic curves like NIST and Brainpool, ensuring the highest levels of data integrity and security. Targeting sectors that require stringent verification measures, such as secure transactions and public-key infrastructures, the ECDSA Verify core offers unparalleled performance without compromising on security. It provides organizations with the capability to implement advanced verification processes seamlessly, enhancing both protection and reliability of their digital interactions. By deploying this core, businesses ensure that their signature verification processes are fortified against emerging and evolving threats. Thanks to its efficient design, the ECDSA Verify IP enhances not only protection but also the overall efficiency of data processing and signature validation efforts across diverse applications.

Digital Core Design
29 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

PhantomBlu - Tactical Communications

PhantomBlu is a versatile mmWave technology solution crafted for high-performance communication needs in military and defense operations. This technology provides resilient, high-bandwidth connections between mobile platforms in demanding and diverse environments, ensuring secure data transport with a minimized risk of interception or detection. The platform is equipped with advanced mesh networking capabilities, supporting communication across various domains including land, sea, and air. It provides robust connectivity solutions that facilitate effective information exchange, critical for real-time tactical operations. The PhantomBlu system's modular design allows it to adapt quickly to different operational scenarios, supporting infrastructure security and unmanned systems. PhantomBlu not only supports a high data rate significantly exceeding conventional networks like Wi-Fi and 5G but also enables seamless integration of disparate legacy systems and cutting-edge technology. Its efficient design prioritizes reduced size, weight, and power (SWaP) requirements, making it an ideal solution for deployment in constrained and resource-limited environments.

Blu Wireless Technology Limited
29 Views
Samsung
22nm, 28nm
3GPP-5G, Bluetooth, Cryptography Cores, MIL-STD-1553, RF Modules, Security Protocol Accelerators, UWB, Wireless Processor, Wireless USB
View Details Datasheet

DAES XTS Co-Processor

The DAES XTS Co-Processor is engineered to provide specialized cryptographic processing with a focus on the AES-XTS mode. Conforming to IEEE Std 1619-2007, it maintains compliance with modern standards for disk encryption, supporting key sizes of 128 and 256 bits for optimal security. Ideal for applications requiring robust encryption techniques, this co-processor facilitates secure data access within financial systems and governmental databases. Its ability to randomly access memory blocks makes it a highly adaptable solution for dynamic data protection needs, ensuring data integrity and confidentiality across various digital platforms. With the DAES XTS Co-Processor, organizations can enhance their encryption methodologies, providing users with seamless integration and high-level security without compromising on performance. This processor is instrumental in safeguarding digital operations against unauthorized access and data breaches.

Digital Core Design
28 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

ECDSA Sign

The ECDSA Sign core focuses on providing a secure and efficient means for generating elliptic curve digital signatures. Renowned for its optimal size and performance balance, this core supports a variety of elliptic curves including NIST, Koblitz, and Brainpool, and operates within a spectrum of 30k to 110k NAND gates. This IP core is crucial for applications demanding high assurance levels for digital signatures in sectors such as finance, cybersecurity, and encrypted communications. The ECDSA Sign core ensures that data integrity and authentication can be achieved without sacrificing speed or system resources, making it a trusted solution for modern cryptographic needs. By employing cutting-edge elliptic curve techniques, this IP ensures that digital transactions remain secure against advanced threats. Organizations leveraging the ECDSA Sign core benefit from a tried and tested solution to safeguard their digital operations, ensuring their systems function smoothly and securely under varying conditions.

Digital Core Design
28 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

Fault Resistant AES Core

The Fault Resistant AES Core is engineered to deliver secure data encryption with an additional layer of fault tolerance. This core not only performs the standard AES encryption and decryption but is also designed to continue functioning reliably in environments prone to transient faults. By incorporating error detection and correction mechanisms, it maintains data integrity even under adverse conditions. This dual focus on security and fault resistance makes it an ideal candidate for use in high-risk environments, such as mission-critical aerospace applications where data integrity is paramount.

Green IP Core
28 Views
TSMC, UMC
55nm, 180nm
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

OpenCryptoHW

OpenCryptoHW is a reconfigurable, hardware-accelerated cryptographic core, catering to the growing demands of secure and efficient data handling. This product incorporates advanced techniques to provide robust encryption and decryption solutions, making it fundamental for security-centric applications. Its open-source nature allows for extensive customization, giving developers the flexibility to tailor its features to match specific security needs. As the demand for security escalates, the role of OpenCryptoHW becomes increasingly vital, offering state-of-the-art protection in both consumer and industrial electronics.

IObundle, Lda.
22 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet
Chat to Volt about this page

Chatting with Volt