Design & Reuse
35 IP
1
200.0
CC-6xx CryptoManager Core
The Rambus CryptoManager Core CC-6xx is a standalone symmetric cipher-only subsystem of the CryptoManager Hub CH-6xx. The CC-6xx products are designed...
2
200.0
CC-7xx CryptoManager Core
The automotive-grade Rambus CryptoManager Core CC-7xx family is a standalone symmetric cipher-only subsystem of the CryptoManager Hub CH-7xx. The CC-7...
3
200.0
CH-6xx CryptoManager Hub
The Rambus CryptoManager Hub CH-6xx is the next generation of flexible and configurable cryptographic family of accelerator cores. CH-6xx designs targ...
4
200.0
CH-7xx CryptoManager Hub
The automotive-grade CryptoManager Hub (CMH) from Rambus is the next-generation of flexible and configurable cryptographic family of accelerator cores...
5
200.0
RT-6xx CryptoManager Root of Trust
The Rambus CryptoManager RT-6xx v3 Root of Trust (CMRT) family from is the latest generation of fully programmable FIPS 140-3 compliant hardware secur...
6
100.0
Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution. The Securyzr™ iSSP (integrated Security Services Platform) enab...
7
100.0
Securyzr™ neo Core Platform - One core, multiple products
Securyzr™ neo Core Platform is Secure-IC’s enhanced version of its flagship offering Securyzr™ integrated Secure Element (iSE) Series. Thanks to its c...
8
40.0
On-chip Security Enclave - Digital IP delivered as RTL
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
9
30.0
QuarkLink IoT secure connectivity platform
Our patented IoT security platform that works with any root-of-trust for easy-to-use, scalable end-to-end security. QuarkLink is our software-based Io...
10
15.5556
Hardware Security Platform
Our FPGA based Hardware Security Modules are offered both as IP Core and as a separate chip. The Enhanced Hardware Security Modules is extension of th...
11
10.0
Agile Secure Element
Our Agile Secure Element IP provides designers with the flexibility to customise security features according to specific application requirements with...
12
6.0
Secure Enclave (RISC-V Based)
A secure enclave subsystem based on RISC-V, integrating cryptographic accelerators and secure software libraries. Hardware is silicon-proven; software...
13
1.0
nQrux® Confidential Computing Engine (CCE)
nQrux® Confidential Computing Engine (CCE) offers customisable solutions protecting data, code execution, and AI (Artificial Intelligence) models in d...
14
0.0
RADIX-M Emulation Based Security Verification
Radix-M provides SoC system level hardware security verification leveraging commercial emulators for firmware and hardware security validation. By run...
15
0.0
RADIX-S - Simulation Based Security Verification
Radix-S is used during design creation and verification to detect and remediate security issues in IP blocks and subsystems of an SoC. Its advanced i...
16
0.0
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our hardware and software development...
17
0.0
Secure IP a Robust Security Enclave
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
18
0.0
Geon Secure Execution Processor
Geon Secure Execution Processor delivers secure code execution by supporting two secure contexts. All code and data belonging to a secure context is c...
19
0.0
GEON Security Platform
There is a growing awareness of threats posed by devices that were traditionally not considered security critical. With rising connectivity, versatili...
20
0.0
Verimatrix WhiteBox
Verimatrix's WhiteBox enables you to build, control and trust your own software crypto-security. It does this in a pure software environment, with...
21
0.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
22
0.0
FIPS Security Toolkit for OpenSSL
The Rambus FIPS Security Toolkit (formerly from Inside Secure) is a complete cryptographic security solution for IoT providing the tools required to s...
23
0.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography Modular IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ...
24
0.0
FortifyIQ High-Performance Quantum-Ready CryptoBox IP Core (AES, HMAC-SHA2, RSA/ECC, ML-KEM, ML-DSA, SCA/DPA/FIA-Resistant)
FortifyIQ’s High-Performance Hybrid Crypto Box IP core delivers maximum cryptographic throughput by combining classical asymmetric (RSA, ECC), symmetr...
25
0.0
FortifyIQ's Compact Crypto Box IP Core for Resource-Constrained Devices (AES, HMAC SHA2, ECC/RSA etc.)
FortifyIQ’s Crypto Box IP core is a compact, power-efficient cryptographic engine that combines essential asymmetric algorithms (RSA, ECC) with high-s...
26
0.0
FortifyIQ's Compact Modular DPA and FIA Hardened Post-Quantum ML-KEM IP Core for Resource-Constrained Devices
As quantum computing threatens traditional public-key cryptography, resource-constrained devices must adopt quantum-resistant algorithms without compr...
27
0.0
FortifyIQ's Secure Hybrid Crypto Box IP Core with Classical and Post-Quantum Cryptography for Embedded Systems (AES, HMAC-SHA2, ECC/RSA etc., PQC) (SCA,DPA,FIA secure)
FortifyIQ’s Hybrid Crypto Box IP core is a comprehensive, high-efficiency cryptographic solution that combines RSA, ECC, AES, and SHA-2/HMAC with a bu...
28
0.0
FortifyIQ's Versatile Crypto Box IP Core with Robust SCA/FI Protections for Balanced Embedded Systems
FortifyIQ’s Crypto Box IP core is a high-efficiency cryptographic solution that combines RSA, ECC, AES, and a SHA-2/HMAC engine, all with advanced pro...
29
0.0
nQrux - Hardware Trust Engines
Xiphera's nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures. The nQrux&t...
30
0.0
CryptoCell-300 - Platform Security Solution for Devices with Strict Power and Area Constraints
The Arm CryptoCell-300 family of embedded security solutions serves high-efficiency systems with a small footprint and low power consumption. The Cryp...
31
0.0
CryptoFirewall Consumable Core
The CryptoFirewall Consumable Core is a tamper-resistant security core that can be integrated into existing chips, or implemented as a discrete securi...
32
0.0
CryptoFirewall Transport Core
The CryptoFirewall Transport core is an independent hardware core within the SoC that provides complete key management and secure video decryption....
33
0.0
CryptoFirewall Verfier Core
Robust, anti-counterfeiting hardware core integrated into the SoC to provide authentication with the highest level of tamper resistance....
34
0.0
QuarkLink - software-based IoT security platform
QuarkLink is our software-based IoT security platform that securely connects IoT devices to server-hosted apps on-premises or in the cloud. QuarkLink ...
35
0.0
Public Key Accelerator Farm Engine
The EIP-154 PKI Farm engine, offers autonoumus processing of Public Key Operations. Due to its scalable architecture, it provides high-performance acc...