Design & Reuse
5492 IP
101
0.0
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our hardware and software development...
102
0.0
PCIe 7.0 Integrity and Data Encryption (IDE) Security IP Module
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
103
0.0
GEON Security Platform
There is a growing awareness of threats posed by devices that were traditionally not considered security critical. With rising connectivity, versatili...
104
0.0
NeoPUF - an ideal security solution for IoT
NeoPUF is a hardware security technology based on the physical unclonable variations occurring in silicon manufacturing process. The underlying benefi...
105
0.0
Certified ASIL B & ISO 21434 Cybersecurity Compliant PCIe 5.0 Integrity and Data Encryption Security Module
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
106
0.0
FIPS Security Toolkit for OpenSSL
The Rambus FIPS Security Toolkit (formerly from Inside Secure) is a complete cryptographic security solution for IoT providing the tools required to s...
107
0.0
Small and Fast Security Solutions for Critical Automotive Applications
Today's vehicles are equipped with multiple microcontrollers that control critical safety and performance functions in a vehicle. When considering...
108
0.0
Inline Memory Encryption (IME) Security Module for DDR6/LPDDR6/MRDIMM2/MRDIMM3
As our connected world expands, the technological advances in high-performance computing (HPC) are reshaping system-on-chip (SoC) designs to address t...
109
0.0
Integrity and Data Encryption (IDE) Security Module IP for CXL 3.0
The Compute Express Link (CXL) interface protocol enables low-latency data communication between system-on-chip (SoC) and general-purpose accelerators...
110
0.0
Robust Embedded Security Solutions for Industrial Applications
One of the most critical requirements for industrial IoT applications is to provide security for devices that must be controlled remotely. For example...
111
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
112
0.0
FortifyIQ Secure SCA/FI protected Chiplet RoT with Post-Quantum Security (SCA/DPA/FIA resistant)
Heterogeneous chiplet-based architectures require a trusted hardware anchor to ensure secure integration, firmware integrity, and device identity. For...
113
0.0
FortifyIQ Secure SCA/FI protected Chiplet RoT with Post-Quantum Security (SCA/DPA/FIA resistant)
Heterogeneous chiplet-based architectures require a trusted hardware anchor to ensure secure integration, firmware integrity, and device identity. For...
114
0.0
LPDDR5/4/4X Controller with Inline Memory Encryption (IME) Security Module
SynopsysLPDDR5/4/4X Controller is a next generation controller optimized for power, latency, bandwidth, and area, supporting JEDEC standard LPDDR5, LP...
115
0.0
LPDDR5X/5/4X Controller with Inline Memory Encryption (IME) Security Module
Synopsys LPDDR5X/5/4X Controller is a next generation controller optimized for power, latency, bandwidth, and area, supporting JEDEC standard LPDDR5X,...
116
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
117
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
118
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
119
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
120
0.0
ASIL-B Compliant 1G-25G MACsec Security Module (select configurations)
Data security between Ethernet-connected devices is expanding due to multiple factors: exponential growth of data containing sensitive and private inf...
121
0.0
RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
Rambus Hardware Root of Trust RT-630-FPGA is a fully-programmable hardware security core offering security by design. It protects against a wide range...
122
0.0
RT-640 Embedded Hardware Security Module (HSM) for Automotive ASIL-B
Rambus Hardware Root of Trust RT-640 is a fully programmable, ISO-26262 ASIL-B ready hardware security core offering security by design for automotive...
123
0.0
RT-645 Embedded Hardware Security Module (HSM) for Automotive ASIL-D
Rambus Hardware Root of Trust RT-645 is a fully-programmable hardware security core that protects against a wide range of attacks with state-of-the-ar...
124
0.0
RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
Rambus Hardware Root of Trust RT-660-FPGA is a fully-programmable hardware security core offering security by design. It protects against a wide range...
125
0.0
Multipurpose Security Protocol Accelerator, ASIL B compliant
Complex system-on-chip (SoC) requirements can include security at the MAC layer, VPN layer, and application layer. The SynopsysSecurity Protocol Accel...
126
200.0
RISC V 32 bit Embedded General-Purpose CPU IP, Enhanced With L1 Cache, B/F Extensions, Zicbom, And Smepmp Security, Comparable To M33
TGE315 - A low-power, high-performance 32-bit RISC-V processor, enhanced with L1 cache, B/F extensions, Zicbom, and Smepmp security. Ideal for industr...
127
200.0
RISC-V 64-bit, 9-Stage Superscaler Application-level Functional Security Processor, Comparable To A55
TAS500 - A 64-bit RISC-V application-grade functional safety processor, compliant with ASIL-B standards....
128
140.0
VIA PUF (vPUF) IP for roots of trust and security chips
Learn more about physically unclonable functions (PUF) from ICTK (Kosdaq 456010). ICTK’s VIA PUF (vPUF) IP uses the unique via hole fingerprint in ea...
129
100.0
MACsec - Extreme-speed - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
130
100.0
Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution. The Securyzr™ iSSP (integrated Security Services Platform) enab...
131
60.0
Integrated Security Manager (iSM)
The Integrated Security Manager (iSM) is a proactive security and lifecycle framework built into the Embedded Microservice Runtime. It is engineered t...
132
51.0
TLS 1.3 - Security Protocol
Transport Layer Security (TLS) is a cryptographic protocol used for building a secure connection between a client and a server over the Internet. A ha...
133
50.0
IPsec - Security Protocol
IPsec (Internet Protocol Security) is a widely implemented protocol to secure communications across the Internet. Xiphera’s IPsec core enhances secure...
134
49.0
Root of Trust eSecure module for SoC security
The eSecure IP is a single subsystem for SoC/ASIC/FPGA to address key security challenges, playing the role of root-of-trust. The module is highly fle...
135
45.0
AES - GCM Authenticated Encryption / Decryption Security Core
The AES-GCM encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bi...
136
40.0
Kudelski Labs On-chip Security Enclave - Digital IP delivered as RTL
Kudelski Labs Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robu...
137
30.0
Secure-IC's Securyzr(TM) Network Security Crypto Accelerator
To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain...
138
20.0
AES Encryption / Decryption Security Core
The AES encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit bl...
139
19.0
Hardware Security Module (HSM)
The HSM IP module is a Hardware Security Module for a wide range of applications. It is developed, validated and licensed by Secure-IC (partner of Xil...
140
15.0
Secure-IC's Securyzr™ Hardware Security Module (HSM) for Automotive
The HSM IP module is a Hardware Security Module for automotive applications. It is developed, validated and licensed by Secure-IC (partner of Xilinx) ...
141
12.0
AES - XTS for Storage Encryption / Decryption Security Core
The AES-XTS encryption IP core implements encryption/decryption for sector-based storage data. It uses the AES block cypher, in compliance with the NI...
142
10.0
Programmable Mode AES Encryption / Decryption Security Core
The AES-P encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit ...
143
5.0
Compact Processor for Security
Enhanced security is becoming essential as IoT devices find their way in to home automation and wearable applications. In addition to security, these ...
144
4.0
Embedded Hardware Security Module (EVITA-Full Compliant)
PUFhsm is an embedded Hardware Security Module solution for automotive chips and general advanced applications. It is the latest offering from PUFsecu...
145
0.0
MACsec - Balanced - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
146
0.0
MACsec - High-speed - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
147
0.0
RADIX-M Emulation Based Security Verification
Radix-M provides SoC system level hardware security verification leveraging commercial emulators for firmware and hardware security validation. By run...
148
0.0
RADIX-S - Simulation Based Security Verification
Radix-S is used during design creation and verification to detect and remediate security issues in IP blocks and subsystems of an SoC. Its advanced i...
149
0.0
Hardware Security Platform
Our FPGA based Hardware Security Modules are offered both as IP Core and as a separate chip. The Enhanced Hardware Security Modules is extension of th...
150
0.0
Security Enclave IP based on RISC-V
The eSecure IP is a single subsystem for SoC/ASIC/FPGA to address key security challenges, playing the role of root-of-trust. The module is highly fle...