Design & Reuse
540 IP
401
0.0
Elliptic Curve Cryptography IP
Our ECC IP Core is a state-of-the-art solution that gives your systems access to the capabilities of elliptic curve encryption. Developed with perf...
402
0.0
Elliptic Curve Digital Signature Algorithm
Modern public-key cryptography is built on elliptic curves, which are essential to reliable key agreement methods and safe digital signatures. As t...
403
0.0
Elliptic Curve Digital Verification Algorithm
CryptOne's abilities encompass not just supporting several elliptic curves but also the highly recognized Elliptic Curve Digital Verification Algorith...
404
0.0
Bloodhound Wi-Fi Packet Sniffer/Injector for Network Characterization, Surveillance, and Law Enforcement
In 2017 and beyond, analysts, agencies, and security experts are all in agreement that threats to public safety, critical infrastructure, and data wil...
405
0.0
Ultra-secure PQC-first Root of Trust Subsystem
PQPlatform-TrustSys is a versatile security solution designed for the post-quantum era. It provides a scalable Root of Trust that blends next-generati...
406
0.0
SM3 Crypto Accelerator
The EIP-52 SM3 Engine implements the SM3 hash algorithm. The accelerators include I/O registers, hash calculation cores, message padding logic, and da...
407
0.0
SM4 Crypto Accelerator
The EIP-12 SM4 Engine implements the SM4 cipher block algorithm. The accelerator includes I/O registers, encryption and decryption cores. Designed for...
408
0.0
SM4-XTS Crypto Accelerator
The EIP-312 – SM4-XTS Accelerator is specifically suited for next generation processors deployed in networking and storage appliances and SSD controll...
409
0.0
HMAC Accelerator with SHA-3, SHA-2, SHA-1
The EIP-59 is the IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algorithms like MD5 (RFC1231),...
410
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design that...
411
0.0
HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
Rambus DPA Resistant HMAC-SHA-2 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through attacks when ...
412
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
413
0.0
HMAC-SHA256 Accelerator
Chevin Technology’s HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes. Message authe...
414
0.0
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, SSL, TLS and DTLS pro...
415
0.0
SNOW Crypto Accelerator
The EIP-46 cipher accelerators implement the specification of the 3GPP Confidentiality and Integrity Algorithms as specified by 3GPP and ETSI. Desig...
416
0.0
SNOW-V Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...
417
0.0
Integrated Secure Element (iSE) for high-end devices with HW isolated secure processing
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
418
0.0
Integrated Secure Element (iSE) for industrial IoT, factory automation, and AI devices
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
419
0.0
Integrity and Data Encryption (IDE) Security Module IP for CXL 3.0
The Compute Express Link (CXL) interface protocol enables low-latency data communication between system-on-chip (SoC) and general-purpose accelerators...
420
0.0
Enterprise class SSL / TLS software library, in cross-platform C
Available SafeZone FIPS 140-2 Level 1 validate cryptography module. FIPS 140-2 Level 1 is the highest certifi cation available for a software module....
421
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...
422
0.0
Poly1305 Crypto Accelerator
The EIP-53 Poly engine is an efficient hardware implementation of the Poly1305 algorithm, as specified by the Internet Research Task Force (IRTF), RFC...
423
0.0
Combo P1619 / 802.1ae (MACSec) GCM-AES/LRW-AES Cores
LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 uses the LRW mode. Sin...
424
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
425
0.0
Comira MACSec IP
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
426
0.0
Complete FEC Encoder Solution compliant to LTE/ LTE A Specification
The Lekha IP – 3GPP LTE FEC Encoder IP Core V1.0 addresses the implementation of the FEC building blocks compliant to 3GPP TS 36.212 V 10.5.0. S...
427
0.0
Root of Trust Solutions
Providing a hardware-based foundation for security, Rambus offers a portfolio of robust Root of Trust solutions, ranging from richly featured military...
428
0.0
FortifyIQ AES-SX-GCM-XTS Secure Core: High-Performance AES Encryption Core with GCM/XTS Support and Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES Encryption Core is a fast, encryption-only hardware accelerator built for systems that demand secure and authenticate...
429
0.0
FortifyIQ AES-XP-GCM-XTS Ultra-High-Performance Secure Core: High-Performance AES-GCM/XTS Core with Integrated SCA/FI Protection
FortifyIQ’s AES-GCM/XTS IP core delivers high-throughput encryption and decryption with support for both AES-GCM (for data in motion) and AES-XTS (for...
430
0.0
FortifyIQ AES-SX-full Secure Core: High-Performance AES Encryption/Decryption Core with Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES IP core delivers fast, secure AES-128/256 encryption and decryption for systems requiring high throughput and certifi...
431
0.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Core with Proven SCA Protection for Constrained Devices (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra-Low-Power AES IP core is a compact encryption engine optimized for deeply embedded and battery-powered systems where minimizing ener...
432
0.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance, Ultra Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s High-Throughput, low-power consumption AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS ...
433
0.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance/Ultra Low Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra Low Power, High-Throughput AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS modes,...
434
0.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Low-Energy AES IP core delivers AES-128/256 encryption-only with support for all major modes, including ECB, CBC, CTR, GCM, and XTS, while...
435
0.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Low-Energy AES IP core delivers AES-128/256 encryption-only with support for all major modes, including ECB, CBC, CTR, GCM, and XTS, while...
436
0.0
FortifyIQ AES-XP-GCM Ultra-High-Performance Secure Core: Ultra-High-Performance AES-GCM Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-GCM IP core delivers ultra-high-throughput authenticated encryption and decryption using a fully pipelined architecture, optimized for...
437
0.0
FortifyIQ AES-XP-GCM Ultra-High-Performance Secure Core: Ultra-High-Performance AES-GCM Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-GCM IP core delivers ultra-high-throughput authenticated encryption and decryption using a fully pipelined architecture, optimized for...
438
0.0
FortifyIQ AES-XP-XTS Ultra-High-Performance Secure Core: High-Performance AES-XTS Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-XTS IP core delivers high-throughput AES-128/256 encryption and decryption in XTS mode, optimized for data-at-rest protection in secur...
439
0.0
FortifyIQ AES-XP-XTS Ultra-High-Performance Secure Core: High-Performance AES-XTS Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-XTS IP core delivers high-throughput AES-128/256 encryption and decryption in XTS mode, optimized for data-at-rest protection in secur...
440
0.0
FortifyIQ Balanced AES Core with Multi-Mode Support and Advanced SCA/FI Protection
FortifyIQ’s Balanced AES IP core is a compact yet capable cryptographic accelerator designed for embedded systems with moderate performance and resour...
441
0.0
FortifyIQ Balanced AES Core with Multi-Mode Support and Advanced SCA/FI Protection
FortifyIQ’s Balanced AES IP core is a compact yet capable cryptographic accelerator designed for embedded systems with moderate performance and resour...
442
0.0
FortifyIQ Compact RSA Signature Verification Accelerator for Constrained Devices (SCA, FIA resistant)
RSA signature verification is widely used in secure boot and code authentication, yet it can strain the limited computational resources of low-power e...
443
0.0
FortifyIQ ECC-ECDH-ECDSA Accelerator: Compact and Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
Resource-constrained devices often lack the area and power budget for secure elliptic curve operations, yet face serious risk from physical attacks li...
444
0.0
FortifyIQ ECC-ECDH-ECDSA RSA Accelerator: Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
In performance-sensitive systems where speed and responsiveness are critical, but area and power constraints are less extreme, FortifyIQ’s FIQ-PKA02B ...
445
0.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ML-DSA) ...
446
0.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ML-DSA) ...
447
0.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography Modular IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ...
448
0.0
FortifyIQ High-Performance Quantum-Ready CryptoBox IP Core (AES, HMAC-SHA2, RSA/ECC, ML-KEM, ML-DSA, SCA/DPA/FIA-Resistant)
FortifyIQ’s High-Performance Hybrid traditional + PQC Crypto Box IP core delivers maximum cryptographic throughput by combining classical asymmetric (...
449
0.0
FortifyIQ High-Performance Quantum-Ready CryptoBox IP Core (AES, HMAC-SHA2, RSA/ECC, ML-KEM, ML-DSA, SCA/DPA/FIA-Resistant)
FortifyIQ’s High-Performance Hybrid Crypto Box IP core delivers maximum cryptographic throughput by combining classical asymmetric (RSA, ECC), symmetr...
450
0.0
FortifyIQ High-Performance Quantum-Ready CryptoBox IP Core (AES, HMAC-SHA2, RSA/ECC, ML-KEM, ML-DSA, SCA/DPA/FIA-Resistant)
FortifyIQ’s High-Performance Hybrid Crypto Box IP core delivers maximum cryptographic throughput by combining classical asymmetric (RSA, ECC), symmetr...