Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Browse Security
Cryptography (294)
Cryptography Cores (17)
Cryptography Software Library (1)
DRM Solution (1)
Embedded Security Modules (28)
Ethernet Security (10)
Platform Security (13)
PUF Based (11)
Security IP (36)
Security Platform (36)
Security Protocol Accelerators (3)
Security Subsystems (21)
Other (33)
AES (10)
DES (1)
MD5 (1)
Random Number Generator (1)
SHA (1)
Other (3)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
504 IP
451
0.0
SphinX - AES-XTS encryption/decryption IP
SphinX is designed to accommodate the speed, latency and throughput requirements of computer systems main memory. The IP implements the standard (NIST...
452
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
453
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
454
0.0
nQrux - Hardware Trust Engines
Xiphera's nQrux™ family of Hardware Trust Engines offers ready-to-implement security modules for various security architectures. The nQrux&t...
455
0.0
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 co...
456
0.0
ARC4 Crypto Accelerator
The EIP-44 is the IP for accelerating the ARC4 stream cipher algorithm (used for legacy SSL & IPsec). Designed for fast integration, low gate count a...
457
0.0
ARIA Crypto Accelerator
The EIP-11 ARIA algorithm, as specified in RFC 5794. The accelerators include I/O registers, encryption and decryption cores, and the logic for feedba...
458
0.0
Processor Core
The MD5 encryption IP core is a fully compliant hardware implementation of the Message Digest Algorithm MD5, suitable for a variety of applications. ...
459
0.0
Programmable Mode AES Encrypt/Decrypt Core
The AES-P encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit ...
460
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
461
0.0
tRoot V023 FS Hardware Secure Module, ASIL-B compliant (w/ ARC EM22FS)
The ASIL B compliant DesignWare® tRoot™ Hardware Secure Module (HSM) for Automotive augments its comprehensive root of trust security solution with a ...
462
0.0
CryptoCell-300 - Platform Security Solution for Devices with Strict Power and Area Constraints
The Arm CryptoCell-300 family of embedded security solutions serves high-efficiency systems with a small footprint and low power consumption. The Cryp...
463
0.0
CryptoFirewall Consumable Core
The CryptoFirewall Consumable Core is a tamper-resistant security core that can be integrated into existing chips, or implemented as a discrete securi...
464
0.0
CryptoFirewall Transport Core
The CryptoFirewall Transport core is an independent hardware core within the SoC that provides complete key management and secure video decryption....
465
0.0
CryptoFirewall Verfier Core
Robust, anti-counterfeiting hardware core integrated into the SoC to provide authentication with the highest level of tamper resistance....
466
0.0
Cryptographic library for Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities:- ECDSA key generation; - ECDSA signature and verificati...
467
0.0
ES-GCM/CCM/CCM*/EAX' Core
The GCE1-MP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard and encryption/authentication mode...
468
0.0
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem. It performs the Ae mod M ca...
469
0.0
RSA Signature Verification
The RSA Signature Verification from Xiphera is a very compact Intellectual Property (IP) core designed for RSA (RivestShamir-Adleman) signature verifi...
470
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-28 is a range of Public Key Accelerators operating as co-processors to offload Public Key operations from the Host processor....
471
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-150 is an integrated module combining the Public Key Acceleration module, True Random Generator, interrupt controller and a standard bus inter...
472
0.0
RSA-ECC Public Key Accelerator Engine DPA Resistant, 8K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
473
0.0
RSA-ECC Public Key Accelerator Engine, 2K ops/sec, DPA Resistant
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
474
0.0
RSA-ECC Public Key Accelerator Engine, 50K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
475
0.0
RSA-ECC Public Key Accelerator Engine, 750K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
476
0.0
RSA-ECC Public Key Accelerator Engine, 8K ops/sec, DPA & Fault Injection Resistant
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through side channel and fault injection attacks ...
477
0.0
Ascon
Xiphera's Ascon symmetric encryption IP cores provide robust security for a wide range of applications. It is, as a lightweight encryption algorithm, ...
478
0.0
ASCON Authenticated Encryption & Hashing Engine
The ASCON-F IP core is a compact, high-throughput hardware engine implementing the lightweight authenticated encryption with associated data (AEAD) an...
479
0.0
eSi-Crypto
EnSilica provide a comprehensive range of encryption and authentication IP for ASIC and FPGA targets with low resource usage and high throughput. An e...
480
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
481
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
482
0.0
ASIL-B Compliant (select configurations) 1G-25G MACsec Security Module
Data security between Ethernet-connected devices is expanding due to multiple factors: exponential growth of data containing sensitive and private inf...
483
0.0
ASIL-B Ready PUF Hardware Base
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
484
0.0
ASIL-B Ready PUF Hardware Premium with key wrap and certification support
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
485
0.0
STAR Memory System ECC IP
Synopsys SLM STAR ECC 6 IP is a stand-alone product used to mitigate against soft errors in memories with the goal of improving in-field reliability...
486
0.0
QuarkLink - software-based IoT security platform
QuarkLink is our software-based IoT security platform that securely connects IoT devices to server-hosted apps on-premises or in the cloud. QuarkLink ...
487
0.0
Sub-2.5G AES Encryption Core
The sub-2.5G AES Encryption Core is a special low footprint and low-power implementation of AES engine for application requiring less than 2.5G/s. Bec...
488
0.0
Public Key Accelerator Farm Engine
The EIP-154 PKI Farm engine, offers autonoumus processing of Public Key Operations. Due to its scalable architecture, it provides high-performance acc...
489
0.0
ZUC Crypto Accelerator
The EIP-48 is an efficient hardware implementation of the ZUC algorithm. Besides the basic ZUC stream cipher, the EIP-48 fully implements the 3GPP Con...
490
0.0
PUF FPGA-Xilinx Base
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
491
0.0
PUF FPGA-Xilinx Premium with key wrap
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
492
0.0
PUF Software Base
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
493
0.0
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
494
0.0
QuiddiKey 100 - Small Footprint PUF IP to Create, Wrap and Manage Keys
The number of connected devices, machines or sensors that are linked with each other over open communication networks on the internet of things (IoT) ...
495
0.0
Suite-Q (TM) HW cryptographic solution
Suite-Q™ HW is a complete system-on-chip (SoC) design features all standardized cryptography needed for secure protocols in a small and efficien...
496
0.0
Multipurpose Security Protocol Accelerator, ASIL B compliant
Complex system-on-chip (SoC) requirements can include security at the MAC layer, VPN layer, and application layer. The SynopsysSecurity Protocol Accel...
497
0.0
Curve25519 Key Exchange
The Curve25519 Key Exchange from Xiphera is a very compact Intellectual Property (IP) core designed for efficient key exchange using the X25519 protoc...
498
0.0
Curve25519 Key Exchange & Digital Signatures
The Curve25519 Key Exchange & Digital Signatures from Xiphera is a very compact Intellectual Property (IP) core designed for efficient X25519 key exch...
499
0.0
Authenticated Encryption & Decryption AES-GCM128
The Alma Technologies AES-GCM128 IP Core implements the GCM-AES authenticated encryption and decryption, as specified in the NIST SP800-38D recommenda...
500
0.0
DVB S2/S Satellite Tuner SoC White Box IP
This satellite tuner is a direct-conversion (zero IF) receiver for digital TV Broadcasting. On the RF input, there is a variable gain, low-noise ampli...
|
Previous
|
10
|
11
|
Next
|