Find IP Sell IP AI Assistant Chip Talk About Us
Log In

Digital Core Design

Digital Core Design (DCD) stands as an eminent semiconductor IP provider, renowned for its prowess in System-on-Chip (SoC) design. With over two decades of market experience, the company has established itself as a leader in developing state-of-the-art processor cores, cryptographic systems, and other essential IP building blocks for modern electronic devices. Their innovative solutions cater to a diverse array of industries, including telecommunications, automotive, military, and fintech, ensuring that DCD remains at the forefront of technological advancements. The company is particularly celebrated for its secure cryptographic systems, which are designed to be resistant to the challenges posed by emerging quantum computing technologies. By leveraging a combination of proprietary processing power and advanced cryptographic solutions, DCD's offerings meet stringent industry standards such as those set by the European Commission and the US National Security Agency. This focus on robust security measures makes DCD a trusted partner for enterprises seeking to enhance their digital infrastructure. Beyond its cryptographic expertise, Digital Core Design continues to innovate with its extensive lineup of processor cores, including both 8-bit and 32-bit architectures. These cores are optimized for high performance and are fully compatible with established industry standards, providing seamless integration into existing systems. As the electronic landscape continues to evolve, DCD's commitment to research and development ensures that they are consistently delivering cutting-edge solutions to meet the growing needs of their clients. DCD's dedication to quality and innovation extends beyond product development, as they offer comprehensive technical support and warranties for their IP cores. This commitment to customer satisfaction has earned them a strong reputation in the semiconductor industry, as they continue to push the boundaries of what is possible in electronic design and security. Read more

Is this your business? Claim it to manage your IP and profile

13
IPs available

D68000 16/32-bit Processor

The D68000 is a modern 16/32-bit processor core, binary-compatible with the historical M68000 series, ensuring a seamless integration into a wide array of legacy designs and new applications. It maintains a 16-bit data bus architecture, featuring the DoCD-BDM on-chip debugger, which facilitates extensive debug capabilities essential for complex system development. With compatibility extending to the 68020's efficient CPU32 version, the D68000 caters to industries needing sophisticated processing solutions merged with the reliability of well-known standards. Its seamless functionality in systems handling sophisticated digital computation, such as industrial controls and automated instrumentation, makes it a prime candidate for modern systems requiring both compatibility and innovation. As industries seek robust, tested solutions, the D68000 shines with its robust design and the ability to maintain precise functionalities while transitioning modern architecture demands. It is particularly suited for businesses striving for reliability in fields like robotics, telecommunications, and precision machinery.

Digital Core Design
49 Views
CPU, Processor Core Independent, Processor Cores
View Details Datasheet

ECC Verification Core

The ECC Verification Core delivers high-performance verification of elliptic curve cryptographic operations, ensuring superior data protection. Central to modern public key infrastructures, this core supports advanced elliptic curves and is equipped for efficient elliptic curve digital signature operations. Incorporating this core into security systems grants stakeholders the advantage of reliable data verification processes across sectors like telecommunications, military, and internet services. This core facilitates resilient signature verification, essential for applications that handle sensitive and private communications. Through detailed point multiplication processes and swift data throughput, the ECC Verification Core maintains operational efficiency while upholding rigorous security protocols. It is a strategic asset for organizations looking to elevate their security postures, providing robust, scalable solutions to authenticate data and digital identities.

Digital Core Design
39 Views
Audio Processor, Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DCAN XL

The DCAN XL IP offers a transformative breakthrough in bridging traditional CAN FD with high-speed Ethernet, achieving data rates up to 20 Mbit/s. Designed as an advanced solution for automotive and industrial communication systems, it integrates a CAN SIC XL transceiver to handle bitrates exceeding 10Mbps efficiently. A pivotal feature of DCAN XL is its dual compatibility, allowing seamless transitions across varied networking environments. This makes it suitable for applications demanding flexible and rapid data exchange, such as in automated systems and connected vehicle platforms, providing reliable communication links that maintain system integrity and performance. Employers of DCAN XL benefit from enhanced communication capacity without the need for extensive architectural adjustments. This core not only ensures consistent data flow but also supports future-proofing of existing systems as the industry demand for advanced communication solutions continues to grow.

Digital Core Design
34 Views
CAN, CAN-FD, Ethernet, LIN
View Details Datasheet

DCRP1A

DCRP1A, branded as CryptOne, is a highly secure cryptographic system rooted in over 20 years of expertise from Digital Core Design. This cryptographic solution is engineered for 100% security, optimized for minimal silicon footprint while delivering exceptional processing speeds to safeguard information. With an inherent resistance to power and timing attacks, CryptOne stands as a robust choice for secure digital environments. The DCRP1A smoothly integrates into various systems, leveraging dynamic elliptic curve cryptography for safeguarding communication. This cryptographic core is crucial in environments where advanced security measures are non-negotiable, such as in telecommunications, fintech, and governmental applications. DCRP1A's architecture fully aligns with the stringent requirements set by both the European Commission and the US National Security Agency, making it a future-proof choice amidst the growing anticipation of quantum computing challenges. Designed to operate within any electronic infrastructure, DCRP1A provides versatile security solutions that adapt to evolving threats. Its architecture, combining proprietary processors and cryptographic innovations designed by Polish cryptographers, offers users unprecedented levels of security. Whether for e-governance or military applications, this core delivers performance while maintaining uncompromised security standards.

Digital Core Design
34 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DP80390XP Embedded Controller

The DP80390XP is a powerful, speed-focused embedded controller, designed to excel in demanding environments with both on-chip and off-chip memory operations. It outperforms traditional 80C51 microcontrollers by 15.55 times, delivering speeds of up to 14.632 VAX MIPS at 100 MHz. This 8-bit controller stands out due to its exceptionally fast execution of multiplication operations, making it ideal for performance-centric applications that require rapid data processing capabilities. The DP80390XP is particularly effective in areas such as consumer electronics, automotive systems, and industrial automation, where timing and processing speed are crucial. Developers leverage this embedded controller to enhance system performance without compromising resource efficiency. Its superior speed and optimization allow for the creation of sophisticated applications that benefit from fast data handling and computation in real-time environments.

Digital Core Design
32 Views
CPU, Microcontroller, Processor Cores
View Details Datasheet

DAES Cryptographic Co-Processor

The DAES Co-Processor is a high-performance cryptographic module designed to execute advanced encryption using the Rijndael algorithm, conforming to standard block cipher modes. Offering bridges to APB, AHB, and AXI buses, the DAES Co-Processor supports 128 and 256-bit key lengths. It's comprehensive in its encryption capabilities, incorporating block modes such as ECB, CBC, CFB, OFB, and CTR. Aimed at delivering robust security for digital communication systems, the DAES Co-Processor is ideal for applications requiring high levels of data confidentiality and integrity. It incorporates an internal key expansion module that enhances the flexibility and scalability of security applications across various industries, including finance, telecommunications, and enterprise data security. The DAES Co-Processor not only ensures data protection through its compliance with rigorous encryption protocols but does so with superior processing efficiency, which makes it suitable for embedded systems where computational resources are limited but secure processing is critical. Organizations can rely on this co-processor to bolster their encryption capabilities without impacting system performance.

Digital Core Design
31 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DSHA2-256 Hash Accelerator

The DSHA2-256 is a specialized cryptographic bridge designed to significantly enhance the performance of the SHA2-256 hash function. By facilitating a rapid connection through standard interfaces like APB, AHB, and AXI bus, it ensures efficient data processing and security for digital applications. This accelerator supports SHA2 in both 224 and 256-bit modes, and is compliant with the FIPS PUB 180-4 and RFC 2104 HMAC standards. Engineered for versatility, the DSHA2-256 is a universal solution that fits seamlessly into diverse electronic environments, catering to applications demanding heightened security. It's specifically beneficial for sectors requiring robust data authenticity, including aerospace, financial services, and cybersecurity. Its native mode support for HMAC enhances its utility for message integrity and authentication in both embedded and external systems. With optimal speed and minimal latency, the DSHA2-256 ensures that security does not come at the cost of performance. Organizations implementing this cryptographic accelerator can maintain high throughput while ensuring their data remains protected against unauthorized access and modifications. The DSHA2-256, with its advanced hashing capabilities, is a key enabler in building secure and efficient data transmission ecosystems.

Digital Core Design
31 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

D32PRO 32-bit Processor

The D32PRO 32-bit Processor Core by Digital Core Design brings a perfect balance between heightened performance and compact design, meeting the stringent demands of today's connected devices. By enhancing code density, this core ensures energy-efficient operations, ideal for embedded systems that mandate both power conservation and high processing capabilities. Built around a royalty-free model, the D32PRO offers scalability with silicon-proven performance metrics reaching up to 1.52/2.67 DMIPS/MHz. This makes it an attractive choice for a wide variety of applications ranging from consumer electronics to IoT devices, sustaining superior performance across diverse sectors. Companies deploying the D32PRO benefit from reduced time-to-market through its fully integrated system, facilitated by comprehensive design tools for rapid development. This processor core is indispensable for enterprises focused on progressing innovative, energy-conscious solutions without incurring prohibitive costs.

Digital Core Design
30 Views
CPU, Processor Core Independent, Processor Cores
View Details Datasheet

DSHA2-512 Hash Accelerator

The DSHA2-512 is a sophisticated hash accelerator constructed to optimize the performance of SHA2-512 hashing functions. It incorporates robust connectivity features, linking seamlessly to major bus interfaces including APB, AHB, and AXI. This facilitates enhanced security operations across numerous applications, supporting SHA2 bit modes of 256, 384, and 512, while adhering to industry standards such as FIPS PUB 180-4 and RFC 2104 for HMAC. Specifically designed for environments with demanding security requirements, the DSHA2-512 finds its application in sectors ranging from secure telecommunications to advanced governmental departments. Its comprehensive mode support and high-throughput capabilities make it a reliable choice for ensuring data integrity and authenticity in simultaneous processes. The integration of native mode HMAC support expands its utility in authentication processes, providing an additional layer of security for sensitive transactional data. With its optimized design, the DSHA2-512 ensures smooth operational flow without compromising the system's processing efficiency. As organizations deal with increasingly complex security landscapes, this hash accelerator provides a pivotal component in maintaining a secure and highly functional data processing environment.

Digital Core Design
30 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details Datasheet

DSHA2-384 Hash Accelerator

The DSHA2-384 Hash Accelerator is designed to supercharge the performance of the SHA2-384 hash functions within digital systems. By providing seamless bridging to key interfaces, such as APB, AHB, and AXI buses, this accelerator is highly effective at maintaining data security across various digital applications. It supports a range of bit modes from SHA2 224 up to 384, ensuring compliance with FIPS PUB 180-4 and RFC 2104 HMAC standards. This cryptographic accelerator is built to address the security needs of diverse industry sectors, ensuring message integrity and data authenticity. Whether in high-demand financial systems or sensitive governmental operations, its broad compatibility and speed make it indispensable for maintaining secure channels of communication. Its native HMAC support further broadens its applicability, offering robust message authentication within embedded systems as well as in external applications. The DSHA2-384 operates efficiently to guarantee that increased data security does not result in bottlenecks or reduced throughput. It empowers organizations to secure their data assets effectively, making this accelerator a vital tool in enhancing the cryptographic strength of digital networks and infrastructure.

Digital Core Design
29 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

ECDSA Verify

ECDSA Verify IP Core is engineered to provide robust verification of digital signatures, utilizing elliptic curve cryptography. Famed for its unmatched size-performance ratio, it accommodates key elliptic curves like NIST and Brainpool, ensuring the highest levels of data integrity and security. Targeting sectors that require stringent verification measures, such as secure transactions and public-key infrastructures, the ECDSA Verify core offers unparalleled performance without compromising on security. It provides organizations with the capability to implement advanced verification processes seamlessly, enhancing both protection and reliability of their digital interactions. By deploying this core, businesses ensure that their signature verification processes are fortified against emerging and evolving threats. Thanks to its efficient design, the ECDSA Verify IP enhances not only protection but also the overall efficiency of data processing and signature validation efforts across diverse applications.

Digital Core Design
29 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

DAES XTS Co-Processor

The DAES XTS Co-Processor is engineered to provide specialized cryptographic processing with a focus on the AES-XTS mode. Conforming to IEEE Std 1619-2007, it maintains compliance with modern standards for disk encryption, supporting key sizes of 128 and 256 bits for optimal security. Ideal for applications requiring robust encryption techniques, this co-processor facilitates secure data access within financial systems and governmental databases. Its ability to randomly access memory blocks makes it a highly adaptable solution for dynamic data protection needs, ensuring data integrity and confidentiality across various digital platforms. With the DAES XTS Co-Processor, organizations can enhance their encryption methodologies, providing users with seamless integration and high-level security without compromising on performance. This processor is instrumental in safeguarding digital operations against unauthorized access and data breaches.

Digital Core Design
28 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet

ECDSA Sign

The ECDSA Sign core focuses on providing a secure and efficient means for generating elliptic curve digital signatures. Renowned for its optimal size and performance balance, this core supports a variety of elliptic curves including NIST, Koblitz, and Brainpool, and operates within a spectrum of 30k to 110k NAND gates. This IP core is crucial for applications demanding high assurance levels for digital signatures in sectors such as finance, cybersecurity, and encrypted communications. The ECDSA Sign core ensures that data integrity and authentication can be achieved without sacrificing speed or system resources, making it a trusted solution for modern cryptographic needs. By employing cutting-edge elliptic curve techniques, this IP ensures that digital transactions remain secure against advanced threats. Organizations leveraging the ECDSA Sign core benefit from a tried and tested solution to safeguard their digital operations, ensuring their systems function smoothly and securely under varying conditions.

Digital Core Design
28 Views
Cryptography Cores, Security Protocol Accelerators
View Details Datasheet
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chat to Volt about this page

Chatting with Volt