Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Videos
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Videos
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller & PHY
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Design Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Browse Security
AES Encryption Core (100)
Cryptography (185)
Data Integrity - Error Correction (18)
Embedded Security Modules (26)
Hardware Accelerator (42)
MACsec, IPsec (32)
Post-Quantum Solutions (36)
PUF Based (20)
Random Number Generator (RNG) (16)
Root of Trust (18)
Security Platform (38)
Sensors & Monitors (9)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
540 IP
351
0.0
AES-ECB-CBC-CFB-CTR 1 Billion Trace DPA Resistant Crypto Accelerator
Rambus DPA Resistant AES-FBC Cryptographic Accelerator Cores offload compute intensive cryptographic algorithms in SoC’s CPU at 100x performance (when...
352
0.0
AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA & Fault Injection Resistant Crypto Accelerator
Rambus DPA & Fault Injection Resistant AES-AE Cryptographic Cores prevent against the leakage of secret cryptographic key material through attacks whe...
353
0.0
AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA Resistant Crypto Accelerator
Rambus Crypto Accelerator AES-AE–Fast Hardware Cores offload compute intensive cryptographic algorithms in SoC’s CPU at 100x performance (when run at ...
354
0.0
AES-ECB-CBC-CFB-OFB-CTR Crypto Accelerator
The EIP-36 AES Engines implement the Advanced Encryption Standard (AES) algorithm, as specified in Federal Information Processing Standard (FIPS) Publ...
355
0.0
AES-ECB-CBC-CFB-OFB-CTR-GCM-XTS-CCM Crypto Accelerator
The EIP-39 AES Accelerators implement the Advanced Encryption Standard (AES) algorithm, as specified in Federal Information Processing Standard (FIPS)...
356
0.0
AES-GCM MACsec (IEEE 802.1AE) and FC-SP Cores
Implementation of the new LAN security standard 802.1ae (MACSec) requires the NIST standard AES cipher in the GCM mode for encryption and message auth...
357
0.0
AES-GCM Multi-channel upto 2Tbps Crypto Accelerator
The EIP-63, high speed AES-GCM engine is a scalable high-performance, multi-channel cryptographic engine that offers AES-GCM operations as well as AES...
358
0.0
AES-GCM Single-channel Crypto Accelerator
The EIP-61 is the IP for accelerating AES-GCM based cryptographic solutions. Designed for easy integration and very high performance the EIP-61 crypto...
359
0.0
AES-GCM Single-channel Crypto Accelerator
The EIP-61 is the IP for accelerating AES-GCM based cryptographic solutions. Designed for easy integration and very high performance the EIP-61 crypto...
360
0.0
AES-GCM-XTS Crypto Accelerator
The EIP-38 - AES/GCM/XTS/LRW Engines are specifically suited for next generation processors deployed in networking and storage appliances that need to...
361
0.0
VESA DisplayPort 1.4 Forward Error Correction (FEC) Receiver
The DisplayPort Forward Error Correction (FEC) Receiver IP core implements Reed-Solomon FEC and symbol interleaving as specified by the VESA DisplayPo...
362
0.0
VESA DisplayPort 1.4 Forward Error Correction (FEC) Transmitter
The DisplayPort Forward Error Correction (FEC) Transmitter IP core implements Reed-Solomon FEC and symbol interleaving as specified by the VESA Displa...
363
0.0
VESA DisplayPort 1.4 Forward Error Correction (FEC) Transmitter
The DisplayPort Forward Error Correction (FEC) Transmitter IP core implements Reed-Solomon FEC and symbol interleaving as specified by the VESA Displa...
364
0.0
VESA DisplayPort 2.0 FEC RX
The DisplayPort Forward Error Correction (FEC) Receiver IP Core implements Reed-Solomon FEC and symbol interleaving as specified by the VESA DisplayPo...
365
0.0
Key Expander Core
The KEXP IP core performs AES key expansion, and is an option for the AES, AES-P and AES-GCM cores. It processes 128-bit blocks, and is programmable f...
366
0.0
Agile ECC/RSA Public Key Accelerator with 128-bit ALU
The impending development of sufficiently powerful quantum computers will break all ECC and RSA public key cryptographic schemes that are deployed in ...
367
0.0
Agile ECC/RSA Public Key Accelerator with 32-bit ALU
The impending development of sufficiently powerful quantum computers will break all ECC and RSA public key cryptographic schemes that are deployed in ...
368
0.0
Agile Post Quantum Crypto (PQC) Public Key Accelerator - NIST algorithms
The impending development of sufficiently powerful quantum computers will break all ECC and RSA public key cryptographic schemes that are deployed in ...
369
0.0
Agile Public Key Accelerator Firmware - RSA, ECC, PQC (ML-KEM, ML-DSA, XMSS, LMS, SLH-DSA)
The impending development of sufficiently powerful quantum computers will break all ECC and RSA public key cryptographic schemes that are deployed in ...
370
0.0
Agile Public Key Accelerator Host Driver - RSA, ECC, PQC (ML-KEM, ML-DSA, XMSS, LMS, SLH-DSA)
The impending development of sufficiently powerful quantum computers will break all ECC and RSA public key cryptographic schemes that are deployed in ...
371
0.0
SHA - DSHA2-384 - Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode. DSHA2-384 bridge to APB, AHB, AXI bus, it is a universal soluti...
372
0.0
SHA-1 Hashing Core
The ES1002 hash core fully implements the SHA-1 (Secure Hash Algorithm RFC 3174). The core can be used for data authentication in digital broadband, w...
373
0.0
SHA-1 IP Core fully verified with NIST test vectors
...
374
0.0
SHA-1 Secure Hash Function
The SHA1 core from Alma Technologies is a high performance implementation of the SHA-1 (Secure Hash Algorithm 1) one-way cryptographic hash function, ...
375
0.0
SHA-2 Hash Function (SHA-256) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 cryptographic hash function with extended support for HM...
376
0.0
SHA-2 Hash Function (SHA-256/512) - Compact variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 and SHA-512 cryptographic hash functions with extended s...
377
0.0
SHA-2 Hash Function (SHA-384) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-384 cryptographic hash function with extended support for HM...
378
0.0
SHA-2 Hash Function (SHA-512) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-512 cryptographic hash function with extended support for HM...
379
0.0
SHA-256 Secure Hash Function
The Alma Technologies SHA256 IP core is a high performance implementation of the SHA-256 Message Digest algorithm, a one-way hash function, compliant ...
380
0.0
SHA-3 Hash Function - Compact variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
381
0.0
SHA-3 Hash Function - High-speed variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
382
0.0
SHA-3 Secure Hash Crypto Engine
It is compliant with NIST's FIPS 202 standards. The core can provide all the fixed-length hashing functions provided as part of the SHA-3 standard...
383
0.0
ChaCha20 Crypto Accelerator
The EIP-13 ChaCha engine implements the ChaCha20 algorithm, as specified by [ChaCha]. The accelerators include I/O registers and an encryption/decrypt...
384
0.0
ChaCha20 DPA Resistant Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
385
0.0
ChaCha20-Poly1305 - Balanced variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
386
0.0
ChaCha20-Poly1305 - High-speed variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
387
0.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
388
0.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
389
0.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
390
0.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
391
0.0
Whirlpool Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
392
0.0
High capacity post-quantum cryptography processor
PQPerform-Inferno is a scalable hardware solution engineered for high-performance post-quantum cryptography. It is capable of delivering over one mill...
393
0.0
High capacity post-quantum cryptography processor
PQPerform-Flex is a high-performance post-quantum cryptography solution featuring an integrated RISC-V processor as part of its hardware/software co-d...
394
0.0
Silicon Security Solution
ChevinID™ was designed by Chevin Technology using patented method (GB2609026) to add a further layer of protection to your Silicon supply chain by ide...
395
0.0
Xiphera Hardware Security IP Solutions - Complete IP Overview
We protect your critical systems by designing security directly into hardware. At Xiphera, we specialise in designing cutting-edge, hardware-based s...
396
0.0
FIPS 140-2 certified cryptographic software module
SafeZone FIPS cryptographic module is a compact and portable cryptographic library validated by NIST (certificate 3661; https://csrc.nist.gov/Project...
397
0.0
FIPS Security Toolkit for OpenSSL
The Rambus FIPS Security Toolkit (formerly from Inside Secure) is a complete cryptographic security solution for IoT providing the tools required to s...
398
0.0
Circuit Camouflage Technology
Rambus Circuit Camouflage Technology (formerly Inside Secure), also known as SecureMedia Library (SML), is an anti-reverse engineering and anti-clonin...
399
0.0
NIST P-224/P-256/P-384/P521 ECDH and ECDSA
The NIST P-224/P-256/P-384/P-521 ECDH and ECDSA can be used for elliptic curve key generation, computation of Diffie-Hellman shared secrets as well as...
400
0.0
ML-KEM Key Encapsulation IP Core
The KiviPQC™-KEM IP core is a hardware accelerator for post-quantum cryptographic operations. It implements the Module Lattice-based Key Encapsulation...
|
Previous
|
8
|
9
|
10
|
...
|
Next
|