Software implementation for Hardware Root of Trust Software to Create, Wrap and Manage Keys
SM3 Crypto Accelerator
View SM3 Crypto Accelerator full description to...
- see the entire SM3 Crypto Accelerator datasheet
- get in contact with SM3 Crypto Accelerator Supplier
Sm3 IP
- Tunable HMAC accelerator - compliant with all hash functions (SHA1, SHA2, SM3, SHA3) - optional SCA protection
- Tunable SM3 accelerator
- SM3 Hash Engine
- integrated Secure Element (iSE) for multiple applications - Hardware Security Module (HSM) - Security Enclave - Security Subsystem
- Hash Crypto Engine
- Crypto Coprocessor (Standard)