Is this your business? Claim it to manage your IP and profile
xQlave is designed to withstand the future capabilities of quantum computing by offering secure implementations of post-quantum cryptographic algorithms. It features the ML-KEM (Kyber) for key encapsulation and ML-DSA (Dilithium) for digital signatures. These cryptographic solutions are based on NIST-standardized algorithms which are created to thwart quantum computer attacks. With a focus on small resource footprint, maximal performance, or optimal balance, this product ensures secure key exchanges and digital signatures in post-quantum environments. The xQlave family not only offers quantum-resilient security but also embraces hybrid models, combining classical cryptography with quantum-resistant algorithms to enhance current security protocols gradually. xQlave is particularly suited to systems needing future-proof security solutions as quantum threats become more tangible, providing a safeguard for today’s encryption methodologies by integrating seamlessly with existing infrastructure.
The nQrux family provides robust, hardware-level security services that isolate cryptographic operations directly within hardware. Designed for critical applications, nQrux encompasses customisable solutions adaptable to various FPGA and ASIC architectures. This optimised configuration covers essential cryptographic services crucial for data integrity, confidentiality, and authenticity. Its Crypto Module acts as an integral security platform for microcontroller and SoC implementations, while the Confidential Computing Engine (CCE) safeguards data, code execution, and AI models across cloud and edge environments. By performing all cryptographic operations entirely in hardware, nQrux removes dependencies on CPU or software layers, consequently bolstering security and performance. The nQrux portfolio exemplifies Xiphera's commitment to delivering tailored security solutions compliant with trusted standards, ensuring seamless integration and robust protection of sensitive information in critical operational settings.
Xiphera's Security Protocols portfolio integrates secure communication technologies such as MACsec, IPsec, and TLS 1.3, designed to protect data transmission over various communication links. With a hardware-optimized approach, these protocols provide a highly secure environment by significantly reducing potential vulnerabilities compared to software-based solutions. MACsec ensures point-to-point encryption and authentication at the data link layer, employing AES-GCM for secure communication. IPsec offers encryption for IP-based data transfers, crucial for secure Internet connections, including VPNs. TLS 1.3 supports session security, facilitating encrypted web transactions and robust machine-to-machine communications. These protocols, engineered entirely in hardware, enable high performance and scalability in protecting sensitive data across diverse sectors, from financial transactions to secure data centers, leveraging the compact and robust design of Xiphera's IP cores.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.