Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Videos
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Videos
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller & PHY
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Design Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Browse Security
AES Encryption Core (96)
Cryptography (190)
Data Integrity - Error Correction (18)
Embedded Security Modules (18)
Hardware Accelerator (42)
MACsec, IPsec (33)
Post-Quantum Solutions (34)
PUF Based (20)
Random Number Generator (RNG) (17)
Root of Trust (21)
Security Platform (38)
Sensors & Monitors (9)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
190 IP
51
5.0
FortifyIQ AES-XP-GCM Ultra-High-Performance Secure Core: Ultra-High-Performance AES-GCM Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-GCM IP core delivers ultra-high-throughput authenticated encryption and decryption using a fully pipelined architecture, optimized for...
52
5.0
FortifyIQ AES-XP-XTS Ultra-High-Performance Secure Core: High-Performance AES-XTS Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-XTS IP core delivers high-throughput AES-128/256 encryption and decryption in XTS mode, optimized for data-at-rest protection in secur...
53
5.0
FortifyIQ Compact RSA Signature Verification Accelerator for Constrained Devices (SCA, FIA resistant)
RSA signature verification is widely used in secure boot and code authentication, yet it can strain the limited computational resources of low-power e...
54
5.0
FortifyIQ ECC-ECDH-ECDSA Accelerator: Compact and Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
Resource-constrained devices often lack the area and power budget for secure elliptic curve operations, yet face serious risk from physical attacks li...
55
5.0
FortifyIQ ECC-ECDH-ECDSA RSA Accelerator: Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
In performance-sensitive systems where speed and responsiveness are critical, but area and power constraints are less extreme, FortifyIQ’s FIQ-PKA02B ...
56
5.0
FortifyIQ High-Security SHA-2/HMAC Core with Zero Side-Channel Leakage (SHA-224/256 Only) SCA/DPA/FIA resistant
FortifyIQ’s High-Security SHA-2/HMAC IP core delivers formally proven zero side-channel leakage for SHA-2-224 and SHA-2-256 hashing and HMAC, making i...
57
5.0
FortifyIQ HMAC-SHA256 Secure Core: Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection
FortifyIQ’s High-Security SHA-2/HMAC IP core is engineered for applications where security is paramount, delivering mathematically proven zero side-ch...
58
5.0
FortifyIQ SCA/FI-Protected RSA Accelerator
FortifyIQ’s RSA Accelerator delivers high-performance modular exponentiation for RSA-based public key cryptography, while incorporating advanced prote...
59
5.0
FortifyIQ's Compact Crypto Box IP Core for Resource-Constrained Devices (AES, ECC/RSA etc.) SCA/FIA/DPA - resistant
FortifyIQ’s Crypto Box IP core is a compact, power-efficient cryptographic engine that combines essential asymmetric algorithms (RSA, ECC) with high-s...
60
5.0
FortifyIQ's Versatile Crypto Box IP Core with Robust SCA/FI Protections for Balanced Embedded Systems
FortifyIQ’s Crypto Box IP core is a high-efficiency cryptographic solution that combines RSA, ECC, AES, and a SHA-2/HMAC engine, all with advanced pro...
61
5.0
Cryptographic Cores IP
Crypto Quantique’s Cryptographic Cores IP portfolio delivers secure, high-performance implementations of symmetric, asymmetric, and post-quantum algor...
62
5.0
Attack resistant ECC hardware acceleration core
eSi-ECC is a hardware acceleration core for Elliptic Curve (EC) modular arithmetic operations, which are commonly performed within EC cryptographic pr...
63
5.0
ZUC Crypto Engine
The ZUC IP core is 3GPP confidentiality and integrity algorithms (EEA3/EIA3) stream cipher for telecommunication applications, requiring high performa...
64
4.0
ECC with BCH Algorithm
The IntelliProp IPC-BL119A-ZM is a highly configurable IP core that provides a method of extending an information block with extra bits to guard again...
65
4.0
ECDSA IP
The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve. This cutting-edge ECDSA I...
66
4.0
AES-CTR Encryption Core
The IntelliProp IPC-BL204A-ZM is an AES-CTR (Counter Mode) Encryption Core supporting 128 or 256 bit encryption. The IPC-BL204A-ZM provides encryption...
67
4.0
AES-GCM Encryption Core
The IntelliProp IPC-BL193A-ZM is an AES-GCM (Galois Counter Mode) Encryption Core supporting 128 or 256 bit encryption. The IPC-BL193A-ZM provides enc...
68
4.0
SHA3 core for accelerating NIST FIPS 202 Secure Hash Algorithm
eSi-SHA3 is area-efficient hardware accelerator core for the SHA3 and SHAKE cryptographic hashing algorithms compliant with the NIST FIPS 202 standar...
69
4.0
PKCS IP
The PKCS IP is specifically designed for RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 v2.0. Also used for E...
70
3.0
802.11i CCMP/TKIP IP Core
Implementation of the WLAN security standard (802.11i) requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encryption and mess...
71
3.0
Kasumi Encryption Core
The KSM1 core implements Kasumi encryption in compliance with the ETSI SAGE specification. It processes 64-bit blocks using 128-bit key. Basic core is...
72
3.0
RC4 Keystream Generator
The RC4 core implements the RC4 stream cipher in compliance with the ARC4 specification. It produces the keystream that consists of 8-bit words using ...
73
3.0
HDCP 2.0 Encryption Suite
HDCP Suite consists of hardware and software components implementing the HDCP 2.0 protocol. The hardware components are fully synchronous and availab...
74
3.0
3DES Crypto Engine
The DES/3DES crypto engine offers a hardware implementation of the Data Encryption Standard (DES) according to Federal Information Processing Standard...
75
3.0
IEEE 802.11 WAPI Encryption Core
Implementation of the new Chinese security standard (WAPI) requires running the SMS4 cipher in the WPI mode for encryption and message authentication....
76
3.0
SHA1 core
The eSi-SHA1 core is an easy to use SHA1 hash accelerator peripheral. SHA1 is a cryptographic hash function designed by the United States National Sec...
77
3.0
SHA1, SHA2 Cryptographic Hash Cores
The SHA cores provide implementation of cryptographic hashes SHA-1 (core SHA1), SHA-2 (cores SHA2-256 and SHA2-512). The cores utilize “flow-through”...
78
3.0
ChaCha20 stream cipher core
The eSi-CHACHA20 core is an easy to use CHACHA20 stream cipher hardware accelerator that is compliant with the IETF RFC7539 standard. ChaCha20, alo...
79
3.0
High-Performance Lossless Compression/Encryption Combo Core
Lossless data compression is a class of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. ...
80
3.0
Elliptic Curve Point Multiply and Verify Core
Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curves” and it is a part o...
81
3.0
Ultra-Compact 3GPP Cipher Core
The ZUC1 core implements ZUC stream cipher in compliance with the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3 version 1.6. It pr...
82
3.0
Ultra-Compact Data Encryption Standard (DES/3DES) Core
The DES1 ASIC/FPGA core is an implementation of the DES and triple DES encryption and decryption in compliance with the NIST Data Encryption Standard....
83
3.0
SNOW 3G Encryption Core
The SNOW3G1 core implements SNOW 3G stream cipher in compliance with the ETSI SAGE specification version 1.1. It produces the keystream that consists ...
84
3.0
Poly1305 core
The eSi-POLY1305 core is an easy to use POLY1305 accelerator peripheral that is fully compliant with the RFC7539 IETF standard. Poly1305, along wi...
85
3.0
Combined ChaCha20 and Poly1305 core
The eSi-CHACHA20-POLY1305 core is an easy to use APB hardware accelerator peripheral that is fully compliant with the IETF RFC7539 standard Poly1...
86
3.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ML-DSA) ...
87
3.0
FortifyIQ HMAC-SHA256 Secure Core: Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection
FortifyIQ’s SHA-2/HMAC IP core delivers high-speed, hardware-accelerated SHA-2-224/256 hashing and HMAC computation, optimized for secure embedded sys...
88
3.0
FortifyIQ Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s Hybrid Cryptography IP core combines traditional asymmetric algorithms, such as RSA and ECC, with post-quantum standards including ML-KEM ...
89
3.0
FortifyIQ's Compact DPA and FIA Hardened Post-Quantum ML-KEM IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
As quantum computing threatens traditional public-key cryptography, resource-constrained devices must adopt quantum-resistant algorithms without compr...
90
3.0
FortifyIQ's Compact Post-Quantum ML-DSA Secure Cryptographic Signature IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
As digital signature algorithms face obsolescence in the quantum era, embedded systems require quantum-resistant alternatives that balance performance...
91
3.0
SSL/TLS Processor IP Core with an AXI Bus Interface
The SSL1 core implements SSL and/or TLS frameworks with a configurable variety of cipher suites. SSL1-AXI has a “lookaside” interface to the rest of...
92
2.0
SHA512 & SHA384 core
The eSi-SHA512 core is an easy to use SHA hash accelerator peripheral for both SHA512 and SHA384. This is a cryptographic hash function designed by t...
93
2.0
FortifyIQ AES-SX-GCM-XTS Secure Core: High-Performance AES Encryption Core with GCM/XTS Support and Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES Encryption Core is a fast, encryption-only hardware accelerator built for systems that demand secure and authenticate...
94
2.0
FortifyIQ AES-SX-full Secure Core: High-Performance AES Encryption/Decryption Core with Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES IP core delivers fast, secure AES-128/256 encryption and decryption for systems requiring high throughput and certifi...
95
2.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Core with Proven SCA Protection for Constrained Devices (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra-Low-Power AES IP core is a compact encryption engine optimized for deeply embedded and battery-powered systems where minimizing ener...
96
2.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance, Ultra Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s High-Throughput, low-power consumption AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS ...
97
2.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance/Ultra Low Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra Low Power, High-Throughput AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS modes,...
98
2.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Low-Energy AES IP core delivers AES-128/256 encryption-only with support for all major modes, including ECB, CBC, CTR, GCM, and XTS, while...
99
2.0
FortifyIQ Balanced AES Core with Multi-Mode Support and Advanced SCA/FI Protection
FortifyIQ’s Balanced AES IP core is a compact yet capable cryptographic accelerator designed for embedded systems with moderate performance and resour...
100
2.0
FortifyIQ High-Throughput AES Core with Advanced SCA/FI Protection for Performance-Critical Systems
FortifyIQ’s High-Performance AES IP core is a fast, silicon-proven cryptographic engine designed for systems with demanding encryption workloads. Buil...
|
Previous
|
2
|
3
|
4
|
Next
|