Design & Reuse
295 IP
201
0.0
AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA & Fault Injection Resistant Crypto Accelerator
Rambus DPA & Fault Injection Resistant AES-AE Cryptographic Cores prevent against the leakage of secret cryptographic key material through attacks whe...
202
0.0
AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA Resistant Crypto Accelerator
Rambus Crypto Accelerator AES-AE–Fast Hardware Cores offload compute intensive cryptographic algorithms in SoC’s CPU at 100x performance (when run at ...
203
0.0
AES-ECB-CBC-CFB-OFB-CTR Crypto Accelerator
The EIP-36 AES Engines implement the Advanced Encryption Standard (AES) algorithm, as specified in Federal Information Processing Standard (FIPS) Publ...
204
0.0
AES-ECB-CBC-CFB-OFB-CTR-GCM-XTS-CCM Crypto Accelerator
The EIP-39 AES Accelerators implement the Advanced Encryption Standard (AES) algorithm, as specified in Federal Information Processing Standard (FIPS)...
205
0.0
AES-GCM - Balanced variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
206
0.0
AES-GCM - High-speed variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
207
0.0
AES-GCM MACsec (IEEE 802.1AE) and FC-SP Cores
Implementation of the new LAN security standard 802.1ae (MACSec) requires the NIST standard AES cipher in the GCM mode for encryption and message auth...
208
0.0
AES-GCM Single-channel Crypto Accelerator
The EIP-61 is the IP for accelerating AES-GCM based cryptographic solutions. Designed for easy integration and very high performance the EIP-61 crypto...
209
0.0
AES-GCM Single-channel Crypto Accelerator
The EIP-61 is the IP for accelerating AES-GCM based cryptographic solutions. Designed for easy integration and very high performance the EIP-61 crypto...
210
0.0
AES-GCM-XTS Crypto Accelerator
The EIP-38 - AES/GCM/XTS/LRW Engines are specifically suited for next generation processors deployed in networking and storage appliances that need to...
211
0.0
AES-XTS - Balanced variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
212
0.0
AES-XTS - High-speed variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
213
0.0
Agile ECC/RSA Public Key Accelerator with 128-bit ALU
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
214
0.0
Agile ECC/RSA Public Key Accelerator with 32-bit ALU
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
215
0.0
Agile Post Quantum Crypto (PQC) Public Key Accelerator - NIST algorithms
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
216
0.0
SHA - DSHA2-384 - Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode. DSHA2-384 bridge to APB, AHB, AXI bus, it is a universal soluti...
217
0.0
SHA-1 Hashing Core
The ES1002 hash core fully implements the SHA-1 (Secure Hash Algorithm RFC 3174). The core can be used for data authentication in digital broadband, w...
218
0.0
SHA-1 IP Core fully verified with NIST test vectors
...
219
0.0
SHA-2 Hash Function (SHA-256) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 cryptographic hash function with extended support for HM...
220
0.0
SHA-2 Hash Function (SHA-256/512) - Compact variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 and SHA-512 cryptographic hash functions with extended s...
221
0.0
SHA-2 Hash Function (SHA-384) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-384 cryptographic hash function with extended support for HM...
222
0.0
SHA-2 Hash Function (SHA-512) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-512 cryptographic hash function with extended support for HM...
223
0.0
SHA-256 Secure Hash Function
The Alma Technologies SHA256 IP core is a high performance implementation of the SHA-256 Message Digest algorithm, a one-way hash function, compliant ...
224
0.0
SHA-3 Crypto Engine
The SHA-3 – secure hash algorithms – crypto engine is a hardware accelerator for cryptographic hashing functions. It is an area efficient ...
225
0.0
SHA-3 Hash Function - Compact variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
226
0.0
SHA-3 Hash Function - High-speed variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
227
0.0
SHA-3 Secure Hash Crypto Engine
It is compliant with NIST's FIPS 202 standards. The core can provide all the fixed-length hashing functions provided as part of the SHA-3 standard...
228
0.0
ChaCha20 Crypto Accelerator
The EIP-13 ChaCha engine implements the ChaCha20 algorithm, as specified by [ChaCha]. The accelerators include I/O registers and an encryption/decrypt...
229
0.0
ChaCha20 DPA Resistant Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
230
0.0
ChaCha20-Poly1305 - Balanced variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
231
0.0
ChaCha20-Poly1305 - High-speed variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
232
0.0
Whirlpool Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
233
0.0
HIP 1000 - HCR_AES Crypto Core Family
The use of IP cores in ASIC, FGPA and system-on-chip (SoC) design has become a critical methodology as companies struggle to address the need for rapi...
234
0.0
FIPS 140-2 certified cryptographic software module
SafeZone FIPS cryptographic module is a compact and portable cryptographic library validated by NIST (certificate 3661; https://csrc.nist.gov/Project...
235
0.0
FIPS Security Toolkit for OpenSSL
The Rambus FIPS Security Toolkit (formerly from Inside Secure) is a complete cryptographic security solution for IoT providing the tools required to s...
236
0.0
Circuit Camouflage Technology
Rambus Circuit Camouflage Technology (formerly Inside Secure), also known as SecureMedia Library (SML), is an anti-reverse engineering and anti-clonin...
237
0.0
NIST P-224/P-256/P-384/P521 ECDH+ECDSA
The NIST P-224/P-256/P-384/P-521 ECDH+ECDSA can be used for elliptic curve key generation, computation of Diffie-Hellman shared secrets as well as for...
238
0.0
Elliptic Curve Cryptography IP
Our ECC IP Core is a state-of-the-art solution that gives your systems access to the capabilities of elliptic curve encryption. Developed with perf...
239
0.0
Elliptic Curve Digital Signature Algorithm
CryptOne's abilities encompass not just supporting several elliptic curves but also the highly recognized Elliptic Curve Digital Signature Algorithm (...
240
0.0
Elliptic Curve Digital Signature Algorithm
Modern public-key cryptography is built on elliptic curves, which are essential to reliable key agreement methods and safe digital signatures. As t...
241
0.0
SM3 Crypto Accelerator
The EIP-52 SM3 Engine implements the SM3 hash algorithm. The accelerators include I/O registers, hash calculation cores, message padding logic, and da...
242
0.0
SM4 Crypto Accelerator
The EIP-12 SM4 Engine implements the SM4 cipher block algorithm. The accelerator includes I/O registers, encryption and decryption cores. Designed for...
243
0.0
SM4-XTS Crypto Accelerator
The EIP-312 – SM4-XTS Accelerator is specifically suited for next generation processors deployed in networking and storage appliances and SSD controll...
244
0.0
HMAC Accelerator with SHA-3, SHA-2, SHA-1
The EIP-59 is the IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algorithms like MD5 (RFC1231),...
245
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design that...
246
0.0
HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
Rambus DPA Resistant HMAC-SHA-2 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through attacks when ...
247
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
248
0.0
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, SSL, TLS and DTLS pro...
249
0.0
SNOW Crypto Accelerator
The EIP-46 cipher accelerators implement the specification of the 3GPP Confidentiality and Integrity Algorithms as specified by 3GPP and ETSI. Desig...
250
0.0
SNOW-V Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...