Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Videos
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Videos
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller & PHY
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Browse Security
AES Encryption Core (92)
Cryptography (160)
Data Integrity - Error Correction (21)
Embedded Security Modules (18)
Hardware Accelerator (45)
MACsec, IPsec (32)
Post-Quantum Solutions (27)
PUF Based (22)
Random Number Generator (RNG) (19)
Root of Trust (17)
Security Platform (30)
Sensors & Monitors (12)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
495 IP
51
70.0
Unified Hardware IP for Post-Quantum Cryptography based on Kyber and Dilithium
PQSecure™-CRYSTALS from PQSecure Technologies, LLC. is a set of hardware IP cores designed for various target applications of digital signatures and k...
52
53.0
Secure-IC's Securyzr Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA or ASIC....
53
51.0
TLS 1.3 - Security Protocol
Transport Layer Security (TLS) is a cryptographic protocol used for building a secure connection between a client and a server over the Internet. A ha...
54
51.0
True Random Number Generator (TRNG)
The TRNG IP core establishes a benchmark for hardware-based security in cryptographic systems, by generating high-entropy, true random numbers essenti...
55
50.0
Securyzr Digital True Random Number Generator (TRNG) by Secure-IC, compliant with NIST SP800-90
Secure-IC offers both True Random Number Generator (TRNG) resilient to harmonic injection for statistically independent sets of bits generation and De...
56
50.0
AES - GCM - Extreme-speed variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
57
50.0
IPsec - Security Protocol
IPsec (Internet Protocol Security) is a widely implemented protocol to secure communications across the Internet. Xiphera’s IPsec core enhances secure...
58
50.0
JPUF - Root of Trust Hardware Foundation
Next-generation unclonable identity and key generation IP, resilient against side-channel and modeling attacks. JPUF is Jmem Tek’s patented leakag...
59
49.0
Secure-IC's Securyzr(TM) AES-GCM Multi-Booster
The AES-GCM Multi-Booster crypto engine is a scalable implementation of the AES-GCM algorithm compliant with the NIST SP 800-38D standard. The unique ...
60
49.0
Secure-IC's Securyzr(TM) True Random Number Generator
The True Random Number Generator is an essential silicon-proven digital IP core for all FPGA, ASIC and SoC designs that targets cryptographically secu...
61
49.0
Root of Trust eSecure module for SoC security
The eSecure IP is a single subsystem for SoC/ASIC/FPGA to address key security challenges, playing the role of root-of-trust. The module is highly fle...
62
48.0
nQrux® Crypto Module
Xiphera’s nQrux® Crypto Module IP core provides a comprehensive security platform that allows for customisation of top-notch cryptographic services, s...
63
46.0
Post-Quantum Cryptographic Processor
The Post-Quantum Cryptographic Processor is a novel solution for future world with threats coming from quantum computers breaking current public key a...
64
46.0
Post-Quantum Cryptographic Processor
The Post-Quantum Cryptographic Processor is a novel solution for future world with threats coming from quantum computers breaking current public key a...
65
46.0
Cryptography Accelerator
FPGA IP core implementation of a various cryptographic algorithms, including new, post-quantum standards, available as customizable cryptographic acce...
66
46.0
CRYSTALS-Dilithium - Post-Quantum Digital Signature IP Core
Post-quantum CRYSTALS-Dilithium Digital Signature IP Core from ResQuant supports key generation, signing and signature verification operations for II,...
67
46.0
CRYSTALS-Dilithium - Post-Quantum Digital Signature IP Core
Post-quantum CRYSTALS-Dilithium Digital Signature IP Core from ResQuant supports key generation, signing and signature verification operations for II,...
68
45.0
Secure-IC's Securyzr(TM) AES-GCM Ultra-Low Latency
The AES-GCM Ultra-low latency crypto engine is targeted for CXL link encryption with an implementation of the AES-GCM algorithm compliant with the NIS...
69
45.0
AES-GCM Authenticated Encrypt/Decrypt Core
The AES-GCM encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bi...
70
43.0
Elliptic Curve Cryptography (ECC) Accelerator
The high-speed ECC Accelerator reaches to more than a thousand operations per second in a modern FPGA or ASIC. Furthermore, it covers all NIST P curve...
71
40.5882
PUFenc - PUF-based Crypto Engine
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. The informat...
72
40.5882
PUFtrng - PUF-based True Random Number Generator
A random number generator (RNG) is an essential function for security solutions. The security strength of many systems and applications depends on a h...
73
40.5882
PUFuid - PUF-based Unique Identity
Unique identity (UID) is an identifier that is generally stored on each chip. With this UID, chips can generate an internal secret as a seed for key g...
74
40.0
Secure-IC's Securyzr(TM) Crypto Coprocessor
The Crypto Solutions are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA or ASIC. S...
75
40.0
Secure-IC's Securyzr(TM) Crypto Coprocessor (Premium)
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA or ASIC....
76
40.0
Secure-IC's Securyzr(TM) Crypto Coprocessor (Standard)
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA or ASIC....
77
40.0
Secure-IC's Securyzr™ IPsec Engine
The IPsec Engine implements RFC4301 and other relevant RFCs, providing confidentiality, connectionless data integrity, data-origin authentication and ...
78
40.0
UFS 3.0 Host Controller with AES Encryption compatible with M-PHY 4.0 and UniPro 1.8
Arasan's Universal Flash Storage 3.0 (UFS 3.0) is a simple but high performance, serial interface primarily used in mobile systems, between host proce...
79
40.0
On-chip Security Enclave - Digital IP delivered as RTL
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
80
38.0
Secure-IC's Securyzr™ 1.5Tbps MACsec Engine
The MACsec Engine implements the latest IEEE 802.1AE specification, providing connectionless data integrity, data origin authenticity and confidential...
81
30.0
Secure-IC's Securyzr(TM) Network Security Crypto Accelerator
To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain...
82
30.0
Secure-IC's Securyzr(TM) SM4 Crypto Engine
The SM4 crypto engine includes a generic & scalable implementation of the SM4 algorithm which is the block cipher standard of China. It is compliant ...
83
30.0
Media Access Control Security (MACSec)
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
84
30.0
Lightweight Root-of-Trust
QRoot Lite™ is a silicon IP solution designed specifically for resource-constrained MCUs and IoT devices. It provides essential security capabilities ...
85
30.0
DPA- and FIA-resistant Ultra High Bandwidth FortiCrypt AES IP core
Intro The AES XP-DPA-FIA IP core belongs to the FortiCrypt product family. It is intended for applications that require the handling of ultra-high ban...
86
30.0
DPA- and FIA-resistant Ultra Low Power FortiCrypt AES IP core
Intro The AES ULP-DPA-FIA IP core belongs to the FortiCrypt product family. This protected AES IP core provides an extraordinary AES throughput per wa...
87
30.0
RSA-ECC High-Performance Multi Public Key Engine
The High-Performance Multi Public Key Engine is a secure connection engine that can be used to offload the compute intensive Public Key operations (Di...
88
30.0
QuarkLink IoT secure connectivity platform
Our patented IoT security platform that works with any root-of-trust for easy-to-use, scalable end-to-end security. QuarkLink is our software-based Io...
89
25.0
JCrypt - ML-KEM & ML-DSA Cores
Jmem Tek’s PQC Suite is a silicon-proven IP portfolio delivering NIST-selected post-quantum algorithms to ensure long-term security for connected devi...
90
25.0
JCrypt - TRNG & Cryptography Accelerator
Jmem Tek’s TRNG is capable of generating random numbers at high speed, making it particularly suitable for AI applications that require large volumes ...
91
25.0
Secure-IC's Securyzr(TM) DDR Encrypter
The DDR encrypter IP Core module enables on-the-fly encryption and authentication to the external memory. It supports AXI slave/master interfaces, A...
92
20.0
FEC
As serial link speeds have increased, the reach achievable has become more and more limited by the lossy nature of the physical media which introduces...
93
20.0
Secure, compact hardware post-quantum acceleration for subsystems
PQPlatform-CoPro combines hash-based and lattice-based post-quantum cryptography that can be added to an existing security subsystem. It can be optimi...
94
20.0
Secure-IC's Securyzr™ Chacha20-Poly1305 Multi-Booster - 800Gbps
The ChaCha20-Poly1305 Multi-Booster Crypto Engine is RFC7539 compliant to provide Authenticated Encryption with Associated Data (AEAD) using the ChaCh...
95
20.0
Secure-IC's Securyzr™ Memory & Bus Protection IP Core
The Memory & Bus Protection IP Core module enables on-the-fly encryption/decryption and authentication to the external memory. It supports AHB/AXI sl...
96
20.0
AES-XTS encryption/decryption IP
SphinX is designed to accommodate the speed, latency and throughput requirements of high performance computer systems main memory / DRAM. The IP imple...
97
20.0
High capacity post-quantum cryptography processor
PQPerform-Lattice is a powerful hardware-based product designed for high throughput, high-performance, and high speed. It adds post-quantum cryptograp...
98
20.0
High-Performance AES-GCM/CTR IP
The compact, high-performance Synopsys Pipelined AES-GCM/CTR Core implements the AES-GCM/CTR algorithm as specified in the National Institute of Stand...
99
20.0
High-Performance AES-XTS/ECB IP
Memory and storage security involves protecting storage resources and the data stored on them, both on-premises and in external data centers and the c...
100
20.0
FIPS 140-3 CAVP-compliant, compact hardware PQC engine
PQPlatform-Lattice is a compact FIPS 140-3 CAVP-compliant, PQC engine that adds post-quantum support for hardware components and embedded devices, usi...
|
Previous
|
2
|
3
|
4
|
...
|
Next
|