Design & Reuse
20 IP
1
95.0
Secure-IC's Securyzr™ Fully Digital Physically Unclonable Function (PUF) - PQC Ready
A Physically Unclonable Function (PUF) is a security mechanism that uses the inherent physical variations of a device to generate a unique, unclonable...
2
50.0
JPUF - Root of Trust Hardware Foundation
Next-generation unclonable identity and key generation IP, resilient against side-channel and modeling attacks. JPUF is Jmem Tek’s patented leakag...
3
40.5882
PUFenc - PUF-based Crypto Engine
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. The informat...
4
10.0
Digital Physical Unclonable Function (PUF) IP
Our Digital PUF IP is a digital version of our quantum-based PUF IP (see QDID). The Logic-based Digital PUF IP is a strong hardware root-of-trust for ...
5
10.0
Quantum-Driven Hardware Root-of-Trust - Physical Unclonable Function (PUF)
Our patented semiconductor design is the most secure hardware root-of-trust available to create unforgeable device identities and cryptographic keys. ...
6
7.0
External NOR Flash Protection
PUFxip is the extension function available for PUFcc, extending the Hardware Root of Trust to protect critical assets in the NOR Flash. PUFxip can wid...
7
6.0
External NAND Flash Protection
PUFenc is the extension function available for PUFcc, extending the Hardware Root of Trust to protect critical assets in the NAND Flash. PUFenc can wi...
8
4.0
Embedded Hardware Security Module (EVITA-Full Compliant)
PUFhsm is an embedded Hardware Security Module solution for automotive chips and general advanced applications. It is the latest offering from PUFsecu...
9
3.0
Upgraded PUF-based Crypto Coprocessor (Compliant with TLS 1.3 / FIPS 186-5)
PUFcc Series Crypto Coprocessor IP presents its uniqueness in the combination of a PUF-based hardware root of trust with a full suite of cryptographic...
10
2.0
PUF-based Secure Crypto Coprocessor
PUFcc is a novel high-security Crypto Coprocessor. Compared to traditional security SoC design (embedded HSM with secure core or discrete crypto compo...
11
1.0
PUF-based Hardware Root of Trust
PUFrt is a Hardware Root of Trust (HRoT) offering the essential features necessary for establishing a trusted foundation from which all security opera...
12
0.0
ASIL-B Ready PUF Hardware Base
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
13
0.0
ASIL-B Ready PUF Hardware Premium with key wrap and certification support
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
14
0.0
PUF FPGA-X Premium with key wrapping
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
15
0.0
PUF FPGA-Xilinx Base
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
16
0.0
PUF Security
A physical unclonable function, or PUF, is a "digital fingerprint" that serves as a unique identity for a semiconductor device such as a microprocesso...
17
0.0
PUF Software Base
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
18
0.0
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
19
0.0
Synopsys PUF Hardware Base IP
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...
20
0.0
Synopsys PUF Hardware Premium with key wrap and certification support
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...