Design & Reuse
495 IP
401
0.0
HMAC Accelerator with SHA-3, SHA-2, SHA-1
The EIP-59 is the IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algorithms like MD5 (RFC1231),...
402
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design that...
403
0.0
HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
Rambus DPA Resistant HMAC-SHA-2 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through attacks when ...
404
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
405
0.0
HMAC-SHA256 Accelerator
Chevin Technology’s HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes. Message authe...
406
0.0
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, SSL, TLS and DTLS pro...
407
0.0
SNOW Crypto Accelerator
The EIP-46 cipher accelerators implement the specification of the 3GPP Confidentiality and Integrity Algorithms as specified by 3GPP and ETSI. Desig...
408
0.0
SNOW-V Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...
409
0.0
Integrated Secure Element (iSE)
As attacks become more sophisticated, connected electronic devices require more and more security. Because of this, FPGA and Systems On Chip are expec...
410
0.0
Integrated Secure Element (iSE) for high-end devices with HW isolated secure processing
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
411
0.0
Integrated Secure Element (iSE) for industrial IoT, factory automation, and AI devices
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
412
0.0
Integrity and Data Encryption (IDE) Security Module IP for CXL 3.0
The Compute Express Link (CXL) interface protocol enables low-latency data communication between system-on-chip (SoC) and general-purpose accelerators...
413
0.0
Enterprise class SSL / TLS software library, in cross-platform C
Available SafeZone FIPS 140-2 Level 1 validate cryptography module. FIPS 140-2 Level 1 is the highest certifi cation available for a software module....
414
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...
415
0.0
Poly1305 Crypto Accelerator
The EIP-53 Poly engine is an efficient hardware implementation of the Poly1305 algorithm, as specified by the Internet Research Task Force (IRTF), RFC...
416
0.0
Combo P1619 / 802.1ae (MACSec) GCM-AES/LRW-AES Cores
LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 uses the LRW mode. Sin...
417
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
418
0.0
Comira MACSec IP
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
419
0.0
Complete FEC Encoder Solution compliant to LTE/ LTE A Specification
The Lekha IP – 3GPP LTE FEC Encoder IP Core V1.0 addresses the implementation of the FEC building blocks compliant to 3GPP TS 36.212 V 10.5.0. S...
420
0.0
Root of Trust Solutions
Providing a hardware-based foundation for security, Rambus offers a portfolio of robust Root of Trust solutions, ranging from richly featured military...
421
0.0
FortiPKA-RISC-V Public key accelerator
Modern asymmetric cryptography algorithms such as RSA or elliptic curve cryptography over prime fields require complex mathematical calculations of la...
422
0.0
Post-Quantum Cryptography - PQC Key Encapsulation IP Core (ML-KEM)
The KiviPQC-KEM is an IP Core for ML-KEM Key Encapsulation that supports key generation, encapsulation, and decapsulation operations for all ML-KEM va...
423
0.0
Post-Quantum Cryptography Accelerator IP Core
The PQC1 Implements ML-KEM and ML-DSA post-quantum cryptography digital signature standards. The system interface is an microprocessor slave bus (APB,...
424
0.0
DPA Resistant AES Core
The DPA Resistant AES solution implements the AES algorithm with built-in robust, flexible side-channel resistance validated and optimized for differe...
425
0.0
DPA Resistant Software Library
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family ...
426
0.0
DPA Resistant Software Library
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family ...
427
0.0
SphinX - AES-XTS encryption/decryption IP
SphinX is designed to accommodate the speed, latency and throughput requirements of computer systems main memory. The IP implements the standard (NIST...
428
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
429
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
430
0.0
IPsec software toolkit
The Rambus IPsec Toolkit (previously QuickSec from Inside Secure) is client/server software for cloud and embedded security. It provides a complete so...
431
0.0
PQC CRYSTALS full hardware acceleration of NIST FIPS 202, FIPS 203 and FIPS 204
eSi-Crystals is a hardware core for accelerating the high-level operations specified in the NIST FIPS 202, FIPS 203 and FIPS 204 standards. It supp...
432
0.0
nQrux - Hardware Trust Engines
Xiphera's nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures. The nQrux&t...
433
0.0
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 co...
434
0.0
ARC4 Crypto Accelerator
The EIP-44 is the IP for accelerating the ARC4 stream cipher algorithm (used for legacy SSL & IPsec). Designed for fast integration, low gate count a...
435
0.0
ARIA Crypto Accelerator
The EIP-11 ARIA algorithm, as specified in RFC 5794. The accelerators include I/O registers, encryption and decryption cores, and the logic for feedba...
436
0.0
Processor Core
The MD5 encryption IP core is a fully compliant hardware implementation of the Message Digest Algorithm MD5, suitable for a variety of applications. ...
437
0.0
Programmable Mode AES Encrypt/Decrypt Core
The AES-P encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit ...
438
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
439
0.0
JRoot - Root of Trust (JPUF-based, Quantum Safe)
JRoot is Jmem Tek’s next-generation Root of Trust (RoT) IP, delivering immutable hardware-based trust anchors for SoCs across AI/ML, IoT, automotive, ...
440
0.0
tRoot V023 FS Hardware Secure Module, ASIL-B compliant (w/ ARC EM22FS)
The ASIL B compliant DesignWare® tRoot™ Hardware Secure Module (HSM) for Automotive augments its comprehensive root of trust security solution with a ...
441
0.0
True Random Number Generator (TRNG) Analog Noise Source based on a robust state-of-the-art physical entropy source
The True Random Number Generator (TRNG) Analog Noise Source is a physical entropy source compliant with the AIS 31 standard....
442
0.0
True Random Number Generator (TRNG) Digital Post Processing compliant with the FIPS 140-2 and AIS 31 standards.
The True Random Number Generator (TRNG) Digital Post-Processing is a digital IP compliant with the AIS 31 and NIST SP 800-90B standards....
443
0.0
CryptoCell-300 - Platform Security Solution for Devices with Strict Power and Area Constraints
The Arm CryptoCell-300 family of embedded security solutions serves high-efficiency systems with a small footprint and low power consumption. The Cryp...
444
0.0
CryptoFirewall Consumable Core
The CryptoFirewall Consumable Core is a tamper-resistant security core that can be integrated into existing chips, or implemented as a discrete securi...
445
0.0
CryptoFirewall Transport Core
The CryptoFirewall Transport core is an independent hardware core within the SoC that provides complete key management and secure video decryption....
446
0.0
CryptoFirewall Verfier Core
Robust, anti-counterfeiting hardware core integrated into the SoC to provide authentication with the highest level of tamper resistance....
447
0.0
Cryptographic library for Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities:- ECDSA key generation; - ECDSA signature and verificati...
448
0.0
Cryptographic library for Elliptic Curve Diffie–Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities: - ECDSA key generation; - ECDSA signature and verificat...
449
0.0
Cryptographic library for encryption and decryption of Advanced Encryption Standard (AES) in ECB, CBC, OFB, CTR and GCM modes
The Software AES is a cryptographic library encrypting and decrypting 128-bit data blocks through a secure AES algorithm. The AES key length can be ch...
450
0.0
ES-GCM/CCM/CCM*/EAX' Core
The GCE1-MP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard and encryption/authentication mode...