Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Videos
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Videos
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller & PHY
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Design Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Browse Security
AES Encryption Core (96)
Cryptography (190)
Data Integrity - Error Correction (18)
Embedded Security Modules (18)
Hardware Accelerator (42)
MACsec, IPsec (33)
Post-Quantum Solutions (34)
PUF Based (20)
Random Number Generator (RNG) (17)
Root of Trust (21)
Security Platform (38)
Sensors & Monitors (9)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
536 IP
451
0.0
Integrity and Data Encryption (IDE) Security Module IP for CXL 3.0
The Compute Express Link (CXL) interface protocol enables low-latency data communication between system-on-chip (SoC) and general-purpose accelerators...
452
0.0
Enterprise class SSL / TLS software library, in cross-platform C
Available SafeZone FIPS 140-2 Level 1 validate cryptography module. FIPS 140-2 Level 1 is the highest certifi cation available for a software module....
453
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...
454
0.0
Poly1305 Crypto Accelerator
The EIP-53 Poly engine is an efficient hardware implementation of the Poly1305 algorithm, as specified by the Internet Research Task Force (IRTF), RFC...
455
0.0
Combo P1619 / 802.1ae (MACSec) GCM-AES/LRW-AES Cores
LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 uses the LRW mode. Sin...
456
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
457
0.0
Comira MACSec IP
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
458
0.0
Complete FEC Encoder Solution compliant to LTE/ LTE A Specification
The Lekha IP – 3GPP LTE FEC Encoder IP Core V1.0 addresses the implementation of the FEC building blocks compliant to 3GPP TS 36.212 V 10.5.0. S...
459
0.0
Root of Trust Solutions
Providing a hardware-based foundation for security, Rambus offers a portfolio of robust Root of Trust solutions, ranging from richly featured military...
460
0.0
FortifyIQ High-Performance Quantum-Ready CryptoBox IP Core (AES, HMAC-SHA2, RSA/ECC, PQC) SCA/DPA/FIA-Resistant)
FortifyIQ’s High-Performance Hybrid Crypto Box IP core delivers maximum cryptographic throughput by combining classical asymmetric (RSA, ECC), symmetr...
461
0.0
FortifyIQ Secure RoT for Data Centers with Post-Quantum Cryptography (SCA/DPA/FIA resistant)
Datacenter-class SoCs such as CPUs, GPUs, DPUs, and NVMe controllers require a trusted hardware foundation to ensure firmware integrity, secure boot, ...
462
0.0
FortifyIQ Secure RoT for Data Centers with Post-Quantum Cryptography (SCA/DPA/FIA resistant)
Datacenter-class SoCs such as CPUs, GPUs, DPUs, and NVMe controllers require a trusted hardware foundation to ensure firmware integrity, secure boot, ...
463
0.0
FortifyIQ Secure RoT for Data Centers with Post-Quantum Cryptography (SCA/DPA/FIA resistant)
Datacenter-class SoCs such as CPUs, GPUs, DPUs, and NVMe controllers require a trusted hardware foundation to ensure firmware integrity, secure boot, ...
464
0.0
FortifyIQ Secure SCA/FI protected Chiplet RoT with Post-Quantum Security (SCA/DPA/FIA resistant)
Heterogeneous chiplet-based architectures require a trusted hardware anchor to ensure secure integration, firmware integrity, and device identity. For...
465
0.0
FortifyIQ Secure SCA/FI protected Chiplet RoT with Post-Quantum Security (SCA/DPA/FIA resistant)
Heterogeneous chiplet-based architectures require a trusted hardware anchor to ensure secure integration, firmware integrity, and device identity. For...
466
0.0
FortifyIQ's Secure Hybrid Crypto Box IP Core with Classical and Post-Quantum Cryptography for Embedded Systems (AES, HMAC-SHA2, ECC/RSA etc., PQC) (SCA,DPA,FIA secure)
FortifyIQ’s Hybrid Crypto Box IP core is a comprehensive, high-efficiency cryptographic solution that combines RSA, ECC, AES, and SHA-2/HMAC with a bu...
467
0.0
Post-Quantum Cryptography - Digital Signature IP Core (ML-DSA)
The KiviPQC-DSA is an IP core implementing the ML-DSA (Module-Lattice-based Digital Signature Algorithm) a post-quantum cryptographic standard defined...
468
0.0
Post-Quantum Cryptography - Key Encapsulation and Digital Signature IP Core (ML-KEM & ML-DSA)
The KiviPQC-Box is an IP core that combines the algorithms ML-DSA and ML-KEM into one single package. ML-DSA and ML-KEM are algorithms that are standa...
469
0.0
Post-Quantum Cryptography - Key Encapsulation IP Core (ML-KEM)
The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptographic standard defined...
470
0.0
Post-Quantum Cryptography Accelerator IP Core
The PQC1 Implements ML-KEM and ML-DSA post-quantum cryptography digital signature standards. The system interface is an microprocessor slave bus (APB,...
471
0.0
DPA Resistant AES Core
The DPA Resistant AES solution implements the AES algorithm with built-in robust, flexible side-channel resistance validated and optimized for differe...
472
0.0
DPA Resistant Software Library
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family ...
473
0.0
DPA Resistant Software Library
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family ...
474
0.0
SphinX - AES-XTS encryption/decryption IP
SphinX is designed to accommodate the speed, latency and throughput requirements of computer systems main memory. The IP implements the standard (NIST...
475
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
476
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
477
0.0
IPsec software toolkit
The Rambus IPsec Toolkit (previously QuickSec from Inside Secure) is client/server software for cloud and embedded security. It provides a complete so...
478
0.0
PQC CRYSTALS full hardware acceleration of NIST FIPS 202, FIPS 203 and FIPS 204
eSi-Crystals is a hardware core for accelerating the high-level operations specified in the NIST FIPS 202, FIPS 203 and FIPS 204 standards. It supp...
479
0.0
nQrux - Hardware Trust Engines
Xiphera's nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures. The nQrux&t...
480
0.0
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 co...
481
0.0
ARC4 Crypto Accelerator
The EIP-44 is the IP for accelerating the ARC4 stream cipher algorithm (used for legacy SSL & IPsec). Designed for fast integration, low gate count a...
482
0.0
ARIA Crypto Accelerator
The EIP-11 ARIA algorithm, as specified in RFC 5794. The accelerators include I/O registers, encryption and decryption cores, and the logic for feedba...
483
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
484
0.0
JRoot - Root of Trust (JPUF-based, Quantum Safe)
JRoot is Jmem Tek’s next-generation Root of Trust (RoT) IP, delivering immutable hardware-based trust anchors for SoCs across AI/ML, IoT, automotive, ...
485
0.0
tRoot F004 G Hardware Secure Module (w/ ARC EM4, SEMC, PKA, SPAcc)
Synopsys tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authenticate themselv...
486
0.0
tRoot F110 G Hardware Secure Module
Synopsys tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authenticate themselv...
487
0.0
tRoot V023 FS Hardware Secure Module, ASIL-B compliant (w/ ARC EM22FS)
The ASIL B compliant DesignWare® tRoot™ Hardware Secure Module (HSM) for Automotive augments its comprehensive root of trust security solution with a ...
488
0.0
CryptoCell-300 - Platform Security Solution for Devices with Strict Power and Area Constraints
The Arm CryptoCell-300 family of embedded security solutions serves high-efficiency systems with a small footprint and low power consumption. The Cryp...
489
0.0
CryptoFirewall Consumable Core
The CryptoFirewall Consumable Core is a tamper-resistant security core that can be integrated into existing chips, or implemented as a discrete securi...
490
0.0
CryptoFirewall Transport Core
The CryptoFirewall Transport core is an independent hardware core within the SoC that provides complete key management and secure video decryption....
491
0.0
CryptoFirewall Verfier Core
Robust, anti-counterfeiting hardware core integrated into the SoC to provide authentication with the highest level of tamper resistance....
492
0.0
ES-GCM/CCM/CCM*/EAX' Core
The GCE1-MP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard and encryption/authentication mode...
493
0.0
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem. It performs the Ae mod M ca...
494
0.0
RSA Signature Verification
The RSA Signature Verification from Xiphera is a very compact Intellectual Property (IP) core designed for RSA (Rivest-Shamir-Adleman) signature verif...
495
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-28 is a range of Public Key Accelerators operating as co-processors to offload Public Key operations from the Host processor....
496
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-150 is an integrated module combining the Public Key Acceleration module, True Random Generator, interrupt controller and a standard bus inter...
497
0.0
RSA-ECC Public Key Accelerator Engine DPA Resistant, 8K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
498
0.0
RSA-ECC Public Key Accelerator Engine, 2K ops/sec, DPA Resistant
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
499
0.0
RSA-ECC Public Key Accelerator Engine, 50K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
500
0.0
RSA-ECC Public Key Accelerator Engine, 750K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
|
Previous
|
10
|
11
|
Next
|