Design & Reuse
504 IP
301
1.0
nQrux® Confidential Computing Engine (CCE)
nQrux® Confidential Computing Engine (CCE) offers customisable solutions protecting data, code execution, and AI (Artificial Intelligence) models in d...
302
1.0
PUF
A physical unclonable function, or PUF, is a "digital fingerprint" that serves as a unique identity for a semiconductor device such as a microprocesso...
303
1.0
PUF-based Hardware Root of Trust
PUFrt is a Hardware Root of Trust (HRoT) offering the essential features necessary for establishing a trusted foundation from which all security opera...
304
1.0
Cypher Processor IP
Vivante’s CYP800 (CYPher) Processor IP encryption and decryption fabric provides a unified data encryption and decryption infrastructure for the SoC....
305
0.0
G.hn AES-CCM Core
Implementation of the new ITU G.9961 standard for home networking requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encrypti...
306
0.0
400G AES Encryption Core
The 400G AES Encryption Core is a high performance and yet low footprint AES engine for 400G/s application. Typical applications are providing bulk en...
307
0.0
800G Channelized Ethernet MACsec IP
The Rianta Solutions MACsec IP cores are best-in-class, fully-featured 1G to 800G channelized MACsec streaming processor cores supporting both LAN and...
308
0.0
10G/25G/40G/50G AES Encryption Core
The 10G/25G/40G/50G AES Encryption Core is a high performance and yet low footprint AES engine for 10G/s - 50G/s application. Typical applications are...
309
0.0
P1619/802.1ae (MACSec) GCM/XEX/XTS-AES Core
General Description LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 us...
310
0.0
13 Different Cryptographic Hash Functions Core
These are 13 different cryptographic hash function originally submitted to NIST hash function competition which made upto round 2. All of these cores ...
311
0.0
MACsec - Balanced - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
312
0.0
MACsec - High-speed - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
313
0.0
RADIX-M Emulation Based Security Verification
Radix-M provides SoC system level hardware security verification leveraging commercial emulators for firmware and hardware security validation. By run...
314
0.0
RADIX-S - Simulation Based Security Verification
Radix-S is used during design creation and verification to detect and remediate security issues in IP blocks and subsystems of an SoC. Its advanced i...
315
0.0
Walnut DSA (TM) Fast, Future-Proof Digital Signature Algorithm Designed for Low-Resource Devices
WalnutDSA™ is a fast, small footprint, future-proof, public-key digital signature solution for low-resource devices–running on 8-, 16-, an...
316
0.0
Camellia Crypto Accelerator
The Camellia Engine implements the Camellia crypto algorithm, as specified in “Specification of Camellia” and RFC3713. Designed for fast integration...
317
0.0
HASH Accelerator with SHA-3, SHA-2, SHA-1
The EIP-57 is the IP for accelerating the various secure hash integrity algorithms like MD5 (RFC1231), SHA-1 (FIPS-180-2), SHA-2 (FIPS-180-3/4) and SH...
318
0.0
Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode. DSHA2-384 bridge to APB, AHB, AXI bus, it is a universal solution...
319
0.0
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our hardware and software development...
320
0.0
KASUMI Engine
As part of Rambus' award-winning silicon Intellectual Property (IP) product portfolio, the EIP-06 KASUMI Engine implement the Specification of the 3GP...
321
0.0
ECC Core
Rambus Error Correction Coding (ECC) Core implements the standard Hamming Code based DRAM Single Error Correction (SEC) and Double Error Detection (DE...
322
0.0
ECDSA sign engine
Elliptic curves form the foundation of cutting-edge public-key cryptography, serving as a crucial component for secure digital signatures and robust k...
323
0.0
NCR Processor
NCR (Network Clock Reference) is a procedure to provide the master clock (i.e. time information) of the satellite to all its user terminals. Typically...
324
0.0
MD5 Hashing Core
The es1005 hash fully implements the MD5 (Message Digest Algorithm RFC 1321). The core can be used for data authentication in digital broadband, wire...
325
0.0
MD5 Message-Digest Algorithm
The MD5 core from Alma Technologies is a high-performance implementation of the MD5 Message-Digest algorithm, a one-way hash function, compliant to th...
326
0.0
HDCP 2.0 Encryption Suite
HDCP Suite consists of hardware and software components implementing the HDCP 2.0 protocol. The hardware components are fully synchronous and availabl...
327
0.0
HDCP 2.x Receiver IP
HDCP 2.3 Receiver core is compliant with standard HDCP specification as 2.2 and 2.3. Through its compatibility, it provides a simple interface to a wi...
328
0.0
HDCP 2.x Transmitter IP
HDCP 2.3 Transmitter core is compliant with standard HDCP specification as 2.2 and 2.3. Through its compatibility, it provides a simple interface to a...
329
0.0
HDCP Engine
The EIP-116 High-bandwidth Digital Content Protection Control Path module provides the required technology for implementing all the secure access, cry...
330
0.0
Advanced DPA- and FIA-resistant FortiCrypt AES SW library
Intro The FortiCrypt software library provides ultra-strong protection against SCA and FIA while preserving exceptionalperformance enabling encryption...
331
0.0
Advanced DPA- and FIA-resistant FortiMac HMAC SHA2 IP core
Intro The HMAC-SHA2-DPA-FIA IP core belongs to the FortiMac product family. Like all the FortiMac product family members, this IP provides ultra-stron...
332
0.0
Advanced DPA- and FIA-resistant FortiMac HMAC SHA2 SW library
Intro The FortiMac library belongs to the FortiMac product family. This software library provides ultra-strong protection against SCA, FIA, and cache ...
333
0.0
Advanced Encryption Standard (AES) Engine
ParaQum Technologies® advanced Encryption Standard (AES) engine is a highly configurable and multipurpose encryption/decryption engine. The AES en...
334
0.0
Advanced Encryption Standard (AES) IP core 128/192/256
VISENGI’s Advanced Encryption Standard (AES) IP core provides AES-128, AES-192, and AES-256 encryption and decryption, as per FIPS-197, with a s...
335
0.0
Advanced Encryption Standard compliant with FIPS 197
AES bridge, a cryptographic coprocessor that complies with FIPS 197 Advanced Encryption Standard, employs the Rijndael encryption method to link APB, ...
336
0.0
Advanced Encryption Standard Cryptographic Co-Processor
DAES is a cryptographic co-processor which implements Rijndael encryption algorithm compliant with FIPS 197 Advanced Encryption Standard. AES is a wid...
337
0.0
IEC 61850/62351 Substation Automation Systems Cryptographic IP Core
IEC 61850/62351 Substation Automation Systems Cryptographic (SASCrypt) IP Core secures the strict real-time traffic used in the Substation Automation ...
338
0.0
Reconfigurable Parallel CRC Generator
Parallel CRC IP is reconfigurable high-speed CRC generator, flexible in terms of input data width and generating polynomial. With different data size...
339
0.0
SecurCore_SC000
The Arm® SecurCore® SC000 processor is designed specifically for the highest-volume smartcard and embedded security applications. The SC000 combines t...
340
0.0
SecurCore_SC300
The Arm® SecurCore® SC300 processor is designed specifically for high-performance smartcard and embedded security applications. The SC300 combines the...
341
0.0
Secure 128-bit Advanced Encryption Standard (AES) coprocessor
The Secure AES Coprocessor encrypts and decrypts 128-bit data blocks by computing an AES algorithm with a 128, 192 or 256-bit key through a highly sec...
342
0.0
Secure Enclave IP
The TESIC-420 IP is a Common Criteria (CC) EAL5+ PP0117 certification ready Secure Enclave available as a hard-macro for plug and-play SoC integration...
343
0.0
Secure Hash Algorithm 384 IP Core
Bridge to APB, AHB, and AXI bus SHA2-384 is a universal solution that effectively speeds up the SHA2-384 hash function that complies with FIPS PUB 180...
344
0.0
Secure Hash Algorithm 512 IP Core
A universal solution that effectively accelerates the SHA2-512 hash function complying with FIPS PUB 180-4 is the SHA2-512 bridge to APB, AHB, and AXI...
345
0.0
Secure IP a Robust Security Enclave
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
346
0.0
Secure-IC's Securyzr™ ARIA Crypto Engine
The ARIA crypto engine includes a generic implementation of the ARIA algorithm which is the block cipher standard of South Korea. It is compliant wit...
347
0.0
Secure-IC's Securyzr™ SM4-XTS Multi-Booster
The SM4-XTS Multi-Booster crypto engine includes a generic & scalable implementation of the SM4 algorithm (a block cipher specified by the OSCCA) maki...
348
0.0
SecureOne anti-counterfeiting solution
BlueSemi's SecureOne™ is the anti-counterfeiting solution you need to protect your premier products from imitations. SecureOne™ is an ...
349
0.0
Securyzr™ Intrusion Detection System (IDS)
Securyzr™ IDS is an Intrusion Detection System software module, embedded in the device to protect and part of the Secure-IC threat detection, analysi...
350
0.0
Centralised Real Time Processor IP Core
We provide many configurations for our cryptographic solutions based on the requirements of the project. When compared to competing designs, the CR...