Design & Reuse
504 IP
201
5.0
Advanced Encryption Standard Module
The CC-AES-AXI is a synthesisable Verilog model of a Advanced Encryption Standard module. The AES core can be efficiently implemented on FPGA and ASIC...
202
5.0
Secure cryptographic library compliant with the X9.31 and FIPS 186-4 standards.
The Software RSA Key Generator is a secure cryptographic library compliant with the X9.31 and FIPS 186-4 standards....
203
5.0
Secure key computation, encryption, decryption, signature and verification functionalities compliant with the PKCS#1
The Software RSA library provides standardized key computation, encryption, decryption, signature and verification functionalities for all key sizes u...
204
5.0
Secure software implementation of SHA-1, SHA-2 and HMAC-SHA-256
The Software HMAC-SHA is a secure cryptographic library including SHA-1, SHA-2 and HMAC-SHA-256 implementations....
205
5.0
DES and Triple DES (TDES or 3DES) encryption and decryption coprocessor
The Triple DES Coprocessor is a Data Encryption Standard (FIPS 46-3) peripheral computing DES and Triple DES (TDES and 3DES) encryption and decryption...
206
5.0
AES-XTS Multi-Booster
The AES-XTS Multi-Booster crypto engine includes a generic & scalable implementation of the AES algorithm making the solution suitable for a wide rang...
207
5.0
Device Secure Debug
The Joint Test Action Group (JTAG) is the IEEE1149.1 Standard Test Access Port (TAP) and Boundary Scan Architecture. Giving a full access to the inte...
208
5.0
SHA IP Core with native SHA2-256 HMAC support
The DSHA2-256 is a universal solution which efficiently accelerates SHA2-256 hash function compliant with FIPS PUB 180-4. It computes message digest i...
209
5.0
SHA-256 encryption and decryption coprocessor
The SHA-256 Coprocessor is a hardware implementation of the SHA-256 cryptographic hash function...
210
5.0
SHA-384 and SHA-512 Secure Hash Crypto Engine
The SHA-384/512 is a high-throughput, and compact hardware implementation of the SHA-384 and the SHA-512 cryptographic hash functions provisioned by t...
211
5.0
The True Random Number Generator (TRNG) Digital Noise Source is a standard-cell based entropy generator
​The True Random Number Generator (TRNG) Digital Noise Source is a standard-cell based entropy generator compliant with the statistical test of the FI...
212
5.0
High Throughput Elliptic Curve Cryptography hardware acceleration Core
eSi-ECDSA-HT is a High Throughput (HT) Elliptic Curve Cryptography (ECC) hardware acceleration core, which supports EC Digital Signature Algorithm (EC...
213
5.0
Elliptic Curve Digital Signature generation and verification
eSi-ECDSA is a hardware acceleration core for Elliptic Curve (EC) Digital Signature Algorithm modular arithmetic operations defined in IEEE1363 and ot...
214
5.0
SNOW3G Crypto Engine
The SNOW3G IP core is 3GPP confidentiality and integrity algorithms (UEA2/UIA2) stream cipher for telecommunication applications, requiring high perfo...
215
5.0
Integrated Secure Element (iSE)
As attacks become more sophisticated, connected electronic devices require more and more security. Because of this, FPGA and Systems On Chip are expec...
216
5.0
True Random Number Generator (TRNG) Analog Noise Source based on a robust state-of-the-art physical entropy source
The True Random Number Generator (TRNG) Analog Noise Source is a physical entropy source compliant with the AIS 31 standard....
217
5.0
True Random Number Generator (TRNG) Digital Post Processing compliant with the FIPS 140-2 and AIS 31 standards.
The True Random Number Generator (TRNG) Digital Post-Processing is a digital IP compliant with the AIS 31 and NIST SP 800-90B standards....
218
5.0
Cryptographic co-processor for lightweight cryptography
DAES XTS IP Core from Digital Core Design is a compact cryptographic co-processor designed to seamlessly implement the Rijndael encryption algorithm i...
219
5.0
Cryptographic Cores IP
Crypto Quantique’s Cryptographic Cores IP portfolio delivers secure, high-performance implementations of symmetric, asymmetric, and post-quantum algor...
220
5.0
Cryptographic library for Elliptic Curve Diffie–Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities: - ECDSA key generation; - ECDSA signature and verificat...
221
5.0
Cryptographic library for encryption and decryption of Advanced Encryption Standard (AES) in ECB, CBC, OFB, CTR and GCM modes
The Software AES is a cryptographic library encrypting and decrypting 128-bit data blocks through a secure AES algorithm. The AES key length can be ch...
222
5.0
Attack resistant ECC hardware acceleration core
eSi-ECC is a hardware acceleration core for Elliptic Curve (EC) modular arithmetic operations, which are commonly performed within EC cryptographic pr...
223
5.0
ZUC Crypto Engine
The ZUC IP core is 3GPP confidentiality and integrity algorithms (EEA3/EIA3) stream cipher for telecommunication applications, requiring high performa...
224
5.0
Fully digital sensor against EM and body biasing fault injections
​​The Electromagnetic Pulse Detector is a fully digital sensor against EM and body biasing fault injections....
225
5.0
Fully integrated mixed-signal IP detecting bit-flipping attacks
​​The Laser Pulse Detector is a fully integrated mixed-signal IP detecting bit-flipping attacks....
226
5.0
Fully-integrated 256-bit Physically Unclonable Function (PUF) with embedded reliability check
The Physical Unclonable Function (PUF) acts as a device fingerprint: it exploits the random variations of the process parameters to generate a per chi...
227
5.0
Fully-integrated top-metal mesh sensor protecting integrated circuits against tampering attacks
The Active Shield is a fully integrated digital IP protecting System-on-Chip (SoC) against tampering through a metal mesh sensor....
228
4.0
ECC with BCH Algorithm
The IntelliProp IPC-BL119A-ZM is a highly configurable IP core that provides a method of extending an information block with extra bits to guard again...
229
4.0
Secure-IC's Securyzr™ AES Multi-purpose crypto engine with SCA protections
The AES Multi-Purpose crypto engine includes a generic and scalable implementation of the AES algorithm and a configurable wrapper making the solution...
230
4.0
AES 256 encryption IP core
Logic Fruit’s AES 256 encryption IP core implements Rijndael encoding and decoding. It works with 256-bit blocks and is programmed to work with 256-bi...
231
4.0
AES Encryption Core with XTS
The IntelliProp IPC-BL120A-ZM is an AES-XTS Encryption Core supporting 128 or 256 bit encryption. The IPC-BL120A-ZM provides encryption/decryption bas...
232
4.0
AES-CTR Encryption Core
The IntelliProp IPC-BL204A-ZM is an AES-CTR (Counter Mode) Encryption Core supporting 128 or 256 bit encryption. The IPC-BL204A-ZM provides encryption...
233
4.0
AES-GCM Encryption Core
The IntelliProp IPC-BL193A-ZM is an AES-GCM (Galois Counter Mode) Encryption Core supporting 128 or 256 bit encryption. The IPC-BL193A-ZM provides enc...
234
4.0
SHA 256-bit hash generator
An n-bit hash is a map from arbitrary length messages to n-bit hash values. An n-bit cryptographic hash is an n-bit hash which is one-way and collisio...
235
4.0
SHA3 core for accelerating NIST FIPS 202 Secure Hash Algorithm
eSi-SHA3 is area-efficient hardware accelerator core for the SHA3 and SHAKE cryptographic hashing algorithms compliant with the NIST FIPS 202 standar...
236
4.0
High Throughput Additive White Gaussian Noise Generator
A configurable AWGN generator that can be used as emulator of a noisy transmission channel and can support very high throughput rates up to 10 Gbps....
237
4.0
NIST FIPS-197 Compliant High Throughput Rate AES IP Core
ntAES128 core implements the NIST FIPS-197 Advanced Encryption Standard and can be programmed to either encrypt or decrypt 128-bit blocks of data usin...
238
4.0
NIST FIPS-197 Compliant Ultra-Low Power AES IP Core
ntAES8 core implements NIST FIPS-197 Advanced Encryption Standard. ntAES8 core can be programmed to encrypt or decrypt 128-bit blocks of data using a ...
239
4.0
Embedded Hardware Security Module (EVITA-Full Compliant)
PUFhsm is an embedded Hardware Security Module solution for automotive chips and general advanced applications. It is the latest offering from PUFsecu...
240
4.0
XTS mode AES Processor
The ntAES_XTS IP Core is fully compliant with AES-XTS algorithm standardized at NIST SP800-38E and IEEE 1619-2007 recommendations targeting disk encry...
241
3.0
802.11i CCM (CTR+CBC) AES Core for WiFi WLAN
Implementation of the new WLAN security standard 802.11i requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encryption and me...
242
3.0
802.11i CCMP/TKIP IP Core
Implementation of the WLAN security standard (802.11i) requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encryption and mess...
243
3.0
802.15.3 CCM AES Core
Implementation of the new WPAN security standard (802.15.3) requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encryption and...
244
3.0
P1619/802.1ae (MACSec) GCM/XEX/XTS-AES Core
General Description LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 us...
245
3.0
Kasumi Encryption Core
The KSM1 core implements Kasumi encryption in compliance with the ETSI SAGE specification. It processes 64-bit blocks using 128-bit key. Basic core is...
246
3.0
MBOA MAC AES Core
Implementation of the new WPAN security standard for MBOA MAC requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encryption ...
247
3.0
RC4 Keystream Generator
The RC4 core implements the RC4 stream cipher in compliance with the ARC4 specification. It produces the keystream that consists of 8-bit words using ...
248
3.0
Scalable RSA and Elliptic Curve Accelerator
Rivest-Shamir-Adelman (RSA) is a public-key cryptographic technology that uses the mathematics of so called “finite field exponentiation”. The operati...
249
3.0
HDCP 2.0 Encryption Suite
HDCP Suite consists of hardware and software components implementing the HDCP 2.0 protocol. The hardware components are fully synchronous and availab...
250
3.0
3DES Crypto Engine
The DES/3DES crypto engine offers a hardware implementation of the Data Encryption Standard (DES) according to Federal Information Processing Standard...