All IPs > Security IP
Security IPs are an integral category within the semiconductor industry focusing on the protection of electronic data and hardware. As technological advancements continue to proliferate across critical sectors like finance, healthcare, and automotive, securing data and hardware has never been more paramount. Security IPs are designed to provide essential security features such as encryption, secure communications, and access control to safeguard sensitive information and devices from unauthorized access and cyber threats.
Within the Security IP category, you will find robust offerings that include both hardware and software-based solutions tailored to various security needs. Content Protection Software enables secure data transmission and protects digital content from piracy and unauthorized distribution. Cryptography Cores and Cryptography Software Libraries offer foundational tools for implementing strong encryption algorithms that are crucial for securing communications and data storage.
Embedded Security Modules are integrated within semiconductor devices to facilitate secure data processing and enhance trust in device operations by preventing code tampering and unauthorized hardware modification. Platform Security solutions encompass a broad range of protective measures designed to secure the entire hardware and software ecosystem, ensuring that devices are safe from potential vulnerabilities at every level.
Additionally, Security Protocol Accelerators and Security Subsystems act as dedicated processing units to efficiently handle complex security algorithms and protocols, enhancing the performance of security operations while reducing the burden on primary CPUs. With an unpredictable security landscape, leveraging a range of specialized Security IPs allows designers and engineers to build robust, secure, and reliable semiconductor solutions that can withstand evolving cyber threats.
Akida's Neural Processor IP represents a leap in AI architecture design, tailored to provide exceptional energy efficiency and processing speed for an array of edge computing tasks. At its core, the processor mimics the synaptic activity of the human brain, efficiently executing tasks that demand high-speed computation and minimal power usage. This processor is equipped with configurable neural nodes capable of supporting innovative AI frameworks such as convolutional and fully-connected neural network processes. Each node accommodates a range of MAC operations, enhancing scalability from basic to complex deployment requirements. This scalability enables the development of lightweight AI solutions suited for consumer electronics as well as robust systems for industrial use. Onboard features like event-based processing and low-latency data communication significantly decrease the strain on host processors, enabling faster and more autonomous system responses. Akida's versatile functionality and ability to learn on the fly make it a cornerstone for next-generation technology solutions that aim to blend cognitive computing with practical, real-world applications.
The second-generation Akida platform builds upon the foundation of its predecessor with enhanced computational capabilities and increased flexibility for a broader range of AI and machine learning applications. This version supports 8-bit weights and activations in addition to the flexible 4- and 1-bit operations, making it a versatile solution for high-performance AI tasks. Akida 2 introduces support for programmable activation functions and skip connections, further enhancing the efficiency of neural network operations. These capabilities are particularly advantageous for implementing sophisticated machine learning models that require complex, interconnected processing layers. The platform also features support for Spatio-Temporal and Temporal Event-Based Neural Networks, advancing its application in real-time, on-device AI scenarios. Built as a silicon-proven, fully digital neuromorphic solution, Akida 2 is designed to integrate seamlessly with various microcontrollers and application processors. Its highly configurable architecture offers post-silicon flexibility, making it an ideal choice for developers looking to tailor AI processing to specific application needs. Whether for low-latency video processing, real-time sensor data analysis, or interactive voice recognition, Akida 2 provides a robust platform for next-generation AI developments.
The Akida IP is a groundbreaking neural processor designed to emulate the cognitive functions of the human brain within a compact and energy-efficient architecture. This processor is specifically built for edge computing applications, providing real-time AI processing for vision, audio, and sensor fusion tasks. The scalable neural fabric, ranging from 1 to 128 nodes, features on-chip learning capabilities, allowing devices to adapt and learn from new data with minimal external inputs, enhancing privacy and security by keeping data processing localized. Akida's unique design supports 4-, 2-, and 1-bit weight and activation operations, maximizing computational efficiency while minimizing power consumption. This flexibility in configuration, combined with a fully digital neuromorphic implementation, ensures a cost-effective and predictable design process. Akida is also equipped with event-based acceleration, drastically reducing the demands on the host CPU by facilitating efficient data handling and processing directly within the sensor network. Additionally, Akida's on-chip learning supports incremental learning techniques like one-shot and few-shot learning, making it ideal for applications that require quick adaptation to new data. These features collectively support a broad spectrum of intelligent computing tasks, including object detection and signal processing, all performed at the edge, thus eliminating the need for constant cloud connectivity.
Overview: Cybersecurity IPs offer a range of essential security features to protect your digital assets and sensitive information. From True Random Number Generators (TRNG) to advanced encryption algorithms like AES, DES, 3DES, and cryptographic hash functions like SHA, as well as RSA for secure key exchange and digital signatures, the IPs provide a comprehensive suite of tools to safeguard your data. Key Features:  True Random Number Generator (TRNG): Generates unpredictable and unbiased random numbers for cryptographic applications.  Advanced Encryption Standard (AES): Provides robust encryption with symmetric key algorithms for securing data.  Data Encryption Standard (DES) and Triple DES (3DES): Implement legacy encryption algorithms for data protection.  Hash Functions: Includes secure cryptographic hash functions like SHA (Secure Hash Algorithm) for data integrity verification.  RSA: Enables secure key exchange, encryption, and digital signatures for secure communication. These cybersecurity IPs are designed to meet the stringent security requirements of modern applications, ensuring the confidentiality, integrity, and authenticity of your data.
The Talamo Software Development Kit (SDK) is a comprehensive toolset designed to streamline the development and deployment of neuromorphic AI applications. Leveraging a PyTorch-integrated environment, Talamo simplifies the creation of powerful AI models for deployment on the Spiking Neural Processor. It provides developers with a user-friendly workflow, reducing the complexity usually associated with spiking neural networks. This SDK facilitates the construction of end-to-end application pipelines through a familiar PyTorch framework. By grounding development in this standard workflow, Talamo removes the need for deep expertise in spiking neural networks, offering pre-built models that are ready to use. The SDK also includes capabilities for compiling and mapping trained models onto the processor's hardware, ensuring efficient integration and utilization of computing resources. Moreover, Talamo supports an architecture simulator which allows developers to emulate hardware performance during the design phase. This feature enables rapid prototyping and iterative design, which is crucial for optimizing applications for performance and power efficiency. Thus, Talamo not only empowers developers to build sophisticated AI solutions but also ensures these solutions are practical for deployment across various devices and platforms.
The aiWare Neural Processing Unit (NPU) is an advanced hardware solution engineered for the automotive sector, highly regarded for its efficiency in neural network acceleration tailored for automated driving technologies. This NPU is designed to handle a broad scope of AI applications, including complex neural network models like CNNs and RNNs, offering scalability across diverse performance tiers from L2 to more demanding L4 systems. With its industry-leading efficiency, the aiWare hardware IP achieves up to 98% effectiveness over various automotive neural networks. It supports vast sensor configurations typical in automotive contexts, maintaining reliable performance under rigorous conditions validated by ISO 26262 ASIL B certification. aiWare is not only power-efficient but designed with a scalable architecture, providing up to 1024 TOPS, ensuring that it meets the demands of high-performance processing requirements. Furthermore, aiWare is meticulously crafted to facilitate integration into safety-critical environments, deploying high determinism in its operations. It minimizes external memory dependencies through an innovative dataflow approach, maximizing on-chip memory utilization and minimizing system power. Featuring extensive documentation for integration and customization, aiWare stands out as a crucial component for OEMs and Tier1s looking to optimize advanced driver-assist functionalities.
Overview: The Secure Enclave IPs are Common Criteria (CC) EAL5+PP0084/PP0117 and EAL5+PP0117 certification-ready Secure Enclaves, respectively. They are available as hard macros for seamless integration into SoCs. These Secure Enclave IPs provide the highest level of security for an SoC, incorporating patented design techniques and countermeasures against side-channel and perturbation attacks to ensure robust security while minimizing power consumption. Key Features:  Cryptographic Hardware Accelerators: Efficiently support standard cryptography and security operations to increase throughput while adhering to power constraints and security requirements.  BootROM and Secondary Boot Loader: Manage the certified life cycle of the Secure Enclave, enforcing and assuring security from manufacturing to deployment.  Proprietary IP: Based on proprietary IP that is free of 3rd party rights and royalties. Benefits: The Secure Enclave IPs offer robust security measures, efficient cryptographic support, and secure life cycle management, making them ideal for applications that require the highest levels of security and reliability. Applications: The Secure Enclave IP is versatile and suitable for a wide range of applications, including but not limited to:  Secured and Certified iSIM & iUICC  EMVco Payment  Hardware Cryptocurrency Wallets  FIDO2 Web Authentication  V2X HSM Protocols  Smart Car Access  Secured Boot  Secure OTA Firmware Updates  Secure Debug  Any design requiring a Secure Enclave, Secure Element, or Hardware Root of Trust protected against side-channel and perturbation fault attacks. Compliance and Support: The Secure Enclave is compliant with and ready for CC EAL5+ and EMVCo certification. It is delivered with an SDK and pre-certified CryptoLibrary and secure Boot Loader for seamless integration and enhanced security.
The RV12 RISC-V Processor is a highly configurable, single-core CPU that adheres to RV32I and RV64I standards. It’s engineered for the embedded market, offering a robust structure based on the RISC-V instruction set. The processor's architecture allows simultaneous instruction and data memory accesses, lending itself to a broad range of applications and maintaining high operational efficiency. This flexibility makes it an ideal choice for diverse execution requirements, supporting efficient data processing through an optimized CPU framework. Known for its adaptability, the RV12 processor can support multiple configurations to suit various application demands. It is capable of providing the necessary processing power for embedded systems, boasting a reputation for stability and reliability. This processor becomes integral for designs that require a maintainability of performance without compromising on the configurability aspect, meeting the rigorous needs of modern embedded computing. The processor's support of the open RISC-V architecture ensures its capability to integrate into existing systems seamlessly. It lends itself well to both industrial and academic applications, offering a resource-efficient platform that developers and researchers can easily access and utilize.
The AHB-Lite APB4 Bridge serves as a crucial interconnect that facilitates communication between the AMBA 3 AHB-Lite and AMBA APB bus protocols. As a parameterized soft IP, it offers flexibility and adaptability in managing system interconnections, bridging the gap between high-speed and low-speed peripherals with efficiency. The bridge's architecture is designed to maintain data integrity while transferring information across different protocol tiers. This bridge supports the implementation of a seamless transition for data exchanges, ensuring data packets are transmitted with minimal latency. It is ideal for systems that require stable connectivity across multiple peripheral interfaces, delivering a cohesive platform for system designers to enhance operational uniformity. By enabling efficient bus conversion, it supports broader system architectures, contributing to the overall efficiency of embedded designs. With its open-architecture design, the AHB-Lite APB4 Bridge caters to a wide range of applications, providing necessary adaptability to meet the unique demands of each project. Its robust design ensures that it can accommodate the complex architectures of modern embedded systems, enhancing both performance and reliability.
CrossBar's ReRAM Memory brings a revolutionary shift in the non-volatile memory sector, designed with a straightforward yet efficient three-layer structure. Comprising a top electrode, a switching medium, and a bottom electrode, ReRAM holds vast potential as a multiple-time programmable memory solution. Leveraging the resistive switching mechanism, the technology excels in meter-scale data storage applications, integrating seamlessly into AI-driven, IoT, and secure computing realities. The patented ReRAM technology is distinguished by its ability to perform at peak efficiency with notable read and write speeds, making it a suitable candidate for future-facing chip architectures that require swift, wide-ranging memory capabilities. Unprecedented in its energy-saving capabilities, CrossBar's ReRAM slashes energy consumption by up to 5 times compared to eFlash and offers substantial improvements over NAND and SPI Flash memories. Coupled with exceptional read latencies of around 20 nanoseconds and write times of approximately 12 microseconds, the memory technology outperforms existing solutions, enhancing system responsiveness and user experiences. Its high-density memory configurations provide terabyte-scale storage with minimal physical footprint, ensuring effective integration into cutting-edge devices and systems. Moreover, ReRAM's design permits its use within traditional CMOS manufacturing processes, enabling scalable, stackable arrays. This adaptability ensures that suppliers can integrate these memory solutions at various stages of semiconductor production, from standalone memory chips to embedded roles within complex system-on-chip designs. The inherent simplicity, combined with remarkable performance characteristics, positions ReRAM Memory as a key player in the advancement of secure, high-density computing.
Overview: The Secure Boot IP is a turnkey solution that provides a secure boot facility for an SoC. It implements the Post Quantum secure Leighton-Micali Signature (LMS) as specified in NIST SP800-208. The Secure Boot IP operates as a master or slave peripheral to an Application Processor, serving as a secure enclave that securely stores keys to ensure their integrity and the integrity of the firmware authentication process. Features:  Post Quantum Secure LMS Signature: Utilizes a robust Post-Quantum secure algorithm for enhanced security.  Firmware Updates: Supports up to 32 thousand firmware updates with a minimal signature size of typically less than 5KBytes.  SESIP Level 3 Pre-Certification: Pre-certified to SESIP Level 3 for added security assurance.  RTL Delivery: Delivered as RTL for ease of integration into SoC designs.  Proprietary IP: Based on proprietary IP with no 3rd party rights or royalties. Operation: The Secure Boot IP operates as a master, managing the boot process of the Application Processor to ensure that it only boots from and executes validated and authenticated firmware. The Secure Boot IP also functions as a slave peripheral, where the Application Processor requests validation of the firmware as part of its boot process, eliminating the need for managing keys and simplifying the boot process. Applications: The Secure Boot IP is versatile and suitable for a wide range of applications, including but not limited to:  Wearables  Smart/Connected Devices  Metrology  Entertainment Applications  Networking Equipment  Consumer Appliances  Automotive  Industrial Control Systems  Security Systems  Any SoC application that requires executing authenticated firmware in a simple but secure manner.
The AHB-Lite Timer module designed by Roa Logic is compliant with the RISC-V Privileged 1.9.1 specification, offering a versatile timing solution for embedded applications. As an integral peripheral, it provides precise timing functionalities, enabling applications to perform scheduled operations accurately. Its parameterized design allows developers to adjust the timer's features to match the needs of their system effectively. This timer module supports a broad scope of timing tasks, ranging from simple delay setups to complex timing sequences, making it ideal for various embedded system requirements. The flexibility in its design ensures straightforward implementation, reducing complexity and enhancing the overall performance of the target application. With RISC-V compliance at its core, the AHB-Lite Timer ensures synchronization and precision in signal delivery, crucial for systems tasked with critical timing operations. Its adaptable architecture and dependable functionality make it an exemplary choice for projects where timing accuracy is required.
The AHB-Lite Multilayer Switch by Roa Logic is a sophisticated interconnect fabric that provides high performance with low latency capabilities. Designed for extensive connectivity, it supports an unlimited number of bus masters and slaves, making it ideal for large-scale system architectures. This switch ensures data is efficiently propagated through various paths, optimizing resource allocation and throughput in complex systems. With a focus on performance, the multilayer switch is crafted to manage data traffic within high-demand environments seamlessly. Its support for multiple layers allows it to efficiently handle concurrent data transactions, facilitating effective communication between different system components. The adaptive structure and controlled latency pathways enable it to fit a multitude of applications, including those requiring rapid data transfer and processing. The AHB-Lite Multilayer Switch is engineered to integrate seamlessly into modern system architectures, enhancing throughput without compromising on signal integrity. Its robust design and flexible configuration options make it indispensable within systems necessitating dynamic connectivity solutions.
The H.264 FPGA Encoder and CODEC Micro Footprint Cores are versatile, ITAR-compliant solutions providing high-performance video compression tailored for FPGAs. These H.264 cores leverage industry-leading technology to offer 1080p60 H.264 Baseline support in a compact design, presenting one of the fastest and smallest FPGA cores available. Customizable features allow for unique pixel depths and resolutions, with particular configurations including an encoder, CODEC, and I-Frame only encoder options, making this IP adaptable to varied video processing needs. Designed with precision, these cores introduce significant latency improvements, such as achieving 1ms latency at 1080p30. This capability not only enhances real-time video processing but also optimizes integration with existing electronic systems. Licensing options are flexible, offering a cost-effective evaluation license to accommodate different project scopes and needs. Customization possibilities further extend to unique resolution and pixel depth requirements, supporting diverse application needs in fields like surveillance, broadcasting, and multimedia solutions. The core’s design ensures it can seamlessly integrate into a variety of platforms, including challenging and sophisticated FPGA applications, all while keeping development timelines and budgets in focus.
CrossBar's ReRAM IP Cores present a sophisticated solution for enhancing embedded NVM within Microcontroller Units (MCUs) and System-on-Chip (SoC) architectures. Designed to work with advanced semiconductors and ASIC (Application-Specific Integrated Circuit) designs, these cores offer efficient integration, performance enhancement, and reduced energy consumption. The technology seeks to equip contemporary and next-generation chip designs with high-speed, non-volatile memory, enabling faster computation and data handling. Targeting the unique needs of IoT, mobile computing, and consumer electronics, the ReRAM IP Cores deliver scalable memory solutions that exceed traditional flash memory limits. These cores are built to be stackable and compatible with existing process nodes, highlighting their versatility. Furthermore, the integration of ReRAM technology ensures improved energy efficiency, with the added benefit of low latency data access—a critical factor for real-time applications and processing. These IP cores provide a seamless route to incorporating high-performance ReRAM into chips without major redesigns or adjustments. As the demand for seamless, secure data processing grows, this technology enables manufacturers and designers to aptly meet the challenges presented by ever-evolving digital landscapes. By minimizing energy usage while maximizing performance capabilities, these IP cores hold potential for transformative applications in high-speed, secure data processing environments.
Secure OTP by PUFsecurity offers a tamperproof data storage solution designed for the next generation of secure memory needs. It is an enhanced anti-fuse OTP memory that provides secure storage for key data across various forms, ensuring that data in transit, use, or rest remains protected. This technology integrates physical macros, a digital RTL controller, and a resilient anti-tamper shell to guard against hardware attacks. As IoT devices become increasingly susceptible to early-stage attacks, Secure OTP presents a reliable means to safely store sensitive data such as keys and boot code. By transitioning to this tamperproof storage format, devices can effectively mitigate vulnerabilities inherent in legacy storage systems, fortifying data security at the hardware level.
The Polar ID Biometric Security System offers an advanced, secure face unlock capability for smartphones, utilizing groundbreaking meta-optics technology to capture the full polarization state of light. Unlike traditional biometric systems, Polar ID distinguishes the unique polarization signature of human facial features, which adds an additional security layer by detecting the presence of non-human elements like sophisticated 3D masks. This system eliminates the need for multiple complex optical modules, thus simplifying smartphone design while enhancing security. Designed to fit the most compact form factors, Polar ID uses a near-infrared polarization camera at 940nm paired with active illumination. This configuration ensures functionality across various lighting conditions, from bright outdoor environments to complete darkness, and operates effectively even when users wear sunglasses or face masks. Smartphone OEMs can integrate this secure and cost-effective solution onto a wide range of devices, surpassing traditional fingerprint sensors in reliability. Polar ID not only offers a higher resolution than existing solutions but does so at a reduced cost compared to structured light setups, democratizing access to secure biometric authentication across consumer devices. The system's efficiency and compactness are achieved through Metalenz's meta-optic innovations, offering consistent performance regardless of external impediments such as lighting changes.
D2D® Technology, developed by ParkerVision, is a revolutionary approach to RF conversion that transforms how wireless communication operates. This technology eliminates traditional intermediary stages, directly converting RF signals to digital data. The result is a more streamlined and efficient communication process that reduces complexity and power consumption. By bypassing conventional analog-to-digital conversion steps, D2D® achieves higher data accuracy and reliability. Its direct conversion approach not only enhances data processing speeds but also minimizes energy usage, making it an ideal solution for modern wireless devices that demand both performance and efficiency. ParkerVision's D2D® technology continues to influence a broad spectrum of wireless applications. From improving the connectivity in smartphones and wearable devices to optimizing signal processing in telecommunication networks, D2D® is a cornerstone of ParkerVision's technological offerings, illustrating their commitment to advancing communication technology through innovative RF solutions.
The Dynamic Neural Accelerator II (DNA-II) by EdgeCortix is a versatile and powerful neural network IP core tailored for edge AI applications. Featuring run-time reconfigurable interconnects, it achieves high parallelism and efficiency essential for convolutional and transformer networks. DNA-II can be integrated with a variety of host processors, rendering it adaptable for a wide range of edge-based solutions that demand efficient processing capabilities at the core of AI advancements. This architecture allows real-time reconfiguration of data paths between DNA engines, optimizing parallelism while reducing on-chip memory bandwidth via a patented reconfigurable datapath. The architecture significantly enhances utilization rates and ensures fast processing through model parallelism, making it suitable for mission-critical tasks where low power consumption is paramount. DNA-II serves as the technological backbone of the SAKURA-II AI Accelerator, enabling it to execute generative AI models proficiently. This innovative IP core is engineered to mesh effortlessly with the MERA software stack, optimizing neural network operations through effective scheduling and resource distribution, representing a paradigm shift in how neural network tasks are managed and executed in real-time.
Securyzr iSSP is an integrated Security Services Platform designed by Secure-IC to offer comprehensive lifecycle management of device security. It provides zero-touch security lifecycle services that encompass provisioning, firmware updates, security monitoring, and device identity management. The platform employs a cloud-based architecture, enabling real-time updates and management of security protocols across a fleet of devices. Securyzr iSSP supports Post-Quantum Cryptography standards, ensuring readiness for future cryptographic challenges. This platform integrates seamlessly into diverse system environments, facilitating the protection of sensitive data through robust secure boot processes and key isolation techniques. It structures security around a core Root-of-Trust component named Securyzr iSE neo, which offers anti-tampering protection and dual computation for enhanced security. The platform aligns with an organization's security goals by providing customizable protective measures that are scalable to various applications. Securyzr iSSP is designed to maintain high security levels without compromising system performance or efficiency. By leveraging the latest advancements in cryptography and security protocols, it ensures the resiliency of systems against both physical and remote threats. This platform aids organizations in navigating the increasingly complex landscape of digital security challenges, providing a robust foundation for their cybersecurity strategies.
FIPS 140-3 CAVP-compliant, compact PQC hardware acceleration for subsystems PQPlatform-CoPro combines hash-based and lattice-based post-quantum cryptography that can be added to an existing security subsystem. It can be optimized for minimum area, maintaining high-performance, and is designed to be run by an existing CPU using PQShield-supplied firmware, meaning it involves low integration effort and flexible configurations to support a wide variety of use cases, including quantum-safe secure boot. Solutions are available for hardware acceleration of SHA-3, SHAKE, ML-KEM, ML-DSA, alongside traditional cryptography. In addition, PQPlatform-CoPro can be configured with side-channel protection. PQPlatform-CoPro is covered by multiple PQShield implementation patents.
Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments
Secure Hash Algorithms (SHA) play a critical role in data integrity and security. The SHA family, including SHA-1, SHA-2, and the widely used SHA-256, provides a method for verifying data through unique hash values that represent original content. Helion Technology designs high-performance and resource-efficient hash cores that cater to both high-speed and low-power applications. Hash functions are integral in digital signatures, message authentication, and integrity verification, ensuring that transmitted or stored data remains unchanged and secure. By aligning the hashing capabilities with robust FPGA and ASIC technologies, Helion offers solutions that enhance data security without imposing hefty resource demands. These cores are engineered for low area and power consumption, making them ideal for compact and energy-sensitive applications.
The Universal DSP Library is designed to simplify digital signal processing tasks. It ensures efficient and highly effective operations by offering a comprehensive suite of algorithms and functions tailored for various DSP applications. The library is engineered for optimal performance and can be easily integrated into FPGA-based designs, making it a versatile tool for any digital signal processing needs. The comprehensive nature of the Universal DSP Library simplifies the development of complex signal processing applications. It includes support for key processing techniques and can significantly reduce the time required to implement and test DSP functionalities. By leveraging this library, developers can achieve high efficiency and performance in their digital signal processing tasks, thereby optimizing overall system resources. Moreover, the DSP library is designed to be compatible with a wide range of FPGAs, providing a flexible and scalable solution. This makes it an ideal choice for developers seeking to create innovative solutions across various applications, ensuring that their designs can handle demanding signal processing requirements effectively.
aiData is an automated data pipeline tailored for Advanced Driver-Assistance Systems (ADAS) and Autonomous Driving (AD). This system is crucial for processing and transforming extensive real-world driving data into meticulously annotated, training-ready datasets. Its primary focus is on efficiency and precision, significantly reducing the manual labor traditionally associated with data annotation. aiData dramatically speeds up the data preparation process, providing real-time feedback and minimizing data wastage. By employing the aiData Auto Annotator, the system offers superhuman precision in automatically identifying and labeling dynamic entities such as vehicles and pedestrians, achieving significant cost reductions. The implementation of AI-driven data curation and versioning ensures that only the most relevant data is used for model improvement, providing full traceability and customization throughout the data's lifecycle. The pipeline further includes robust metrics for automatically verifying new software outputs, ensuring that performance stays at an optimal level. With aiData, companies are empowered to streamline their ADAS and AD data workflows, ensuring rapid and reliable output from concept to application.
The AES-XTS standard, as outlined by NIST and IEEE, provides a critical security layer for disk-level data encryption. Through its unique 'tweakable' cipher design, AES-XTS is particularly effective in securing data at rest on disk drives. Helion's AES-XTS solutions are tailored for applications ranging from single drives to extensive storage arrays, offering configurations that balance speed and hardware resource use. With throughput capacities exceeding 64 Gbps, these cores can support both high and low-speed storage applications. Benefiting from Helion's dedication to flexible and efficient designs, these cores ensure consistent data protection across various environments, making them suitable for use in both commercial and industrial sectors. They are available for implementation in leading FPGA and ASIC technologies, ensuring adaptability and integration ease.
Up to 1M KeyEnc/sec with improved power efficiency PQPerform-Lattice is a powerful hardware-based product designed for high throughput, high-performance, and high speed. It adds post-quantum cryptography for applications that typically handle a large number of transactions, such as high-capacity network hardware applications and secure key management HSMs. Optimizable for secure boot, as well as other use-cases, PQPerform-Lattice supports FIPS 204 ML-DSA for quantum-secure digital signature verification, as well as FIPS 203 ML-KEM for quantum key exchange. PQPerform-Lattice supports AXI4, PCIe, and is deployable in multiple instances, making it a powerful solution for existing systems and infrastructure requirements.
Microdul's Human Body Detector for Ultra-Low-Power is designed to be highly efficient, allowing devices to reduce power consumption when not in use. This innovative sensor effectively detects human presence, optimally adjusting the power usage in applications such as wearable devices. It stands out for its ability to maintain functionality with minimal energy requirements, making it ideal for prolonging the battery life of smart devices. The sensor operates dynamically to sense touch events, which can be crucial for wake-up functions and feature selections in a variety of applications. Its low power draw does not compromise its sensitivity or performance, providing reliable detection in various environments. With its sophisticated design, it enhances device efficiency by ensuring power is only used when necessary, effectively supporting battery-operated gadgets. The device benefits not only from its technical specifications but also from its adaptable integration but is specifically advantageous in fields requiring energy-harvesting solutions. By utilizing this sensor, products can be manufactured to meet energy efficiency standards, reducing environmental impact while maintaining user convenience.
Specially engineered for the automotive industry, the NA Class IP by Nuclei complies with the stringent ISO26262 functional safety standards. This processor is crafted to handle complex automotive applications, offering flexibility and rigorous safety protocols necessary for mission-critical transportation technologies. Incorporating a range of functional safety features, the NA Class IP is equipped to ensure not only performance but also reliability and safety in high-stakes vehicular environments.
FIPS 140-3 CAVP-compliant, compact lattice-based hardware PQC engine PQPlatform-Lattice is a compact FIPS 140-3 CAVP-compliant, PQC engine that adds post-quantum support for hardware components and embedded devices, using lattice-based cryptographic algorithms such as ML-KEM (FIPS 203) for post-quantum key exchange, and ML-DSA (FIPS 204) – post-quantum digital signature verification. It provides secure acceleration of lattice-based PQC alongside support for traditional cryptography. Its use cases include strong user authentication, protecting hardware keys, and small-footprint, configurable side-channel protection. PQPlatform-Lattice is designed for minimal area as well as maximum compatibility and can be deployed with optional firmware-backed side-channel countermeasures. It is covered by multiple PQShield implementation patents.
AES-GCM, or AES Galois Counter Mode, combines encryption with authentication to provide both data confidentiality and integrity. Originally developed for high-throughput applications, it can efficiently use pipelining and parallel processing to achieve exceptional speeds. Helion's AES-GCM solutions are tailored to meet diverse data rate requirements, ranging from several megabits to over 40 Gbps. The solutions are versatile across various technologies, offering unparalleled flexibility and performance. Beyond speed, Helion's AES-GCM cores are noted for their compact design, ensuring minimal resource utilization in both FPGA and ASIC implementations. Designed to fit scalable applications, these cores ensure robust data protection in high-demand environments, like networking and data storage.
The Aeonic Integrated Droop Response System is a groundbreaking approach to managing voltage droop in complex IC environments. This solution combines fast multi-threshold detection with churn-key integration of fine-grained dynamic voltage and frequency scaling capabilities. It offers advanced features such as tight coupling of droop detection and response, leading to the fastest commercial adaptation times that can significantly reduce margin requirements and power usage. The system’s observability features provide valuable data for silicon health assessments and lifecycle management. Process portability ensures scalability across different technology nodes, making the solution versatile for use in various sophisticated systems. This system is crucial for managing droop-induced challenges, and its integration with current architectures leads to enhanced system power and performance efficiency.
The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.
Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.
FIPS 140-3 CAVP compliant ultra-fast, compact, and power efficient secure hash acceleration PQPlatform-Hash is a power side-channel accelerator, supporting a wide range of Hash-Based Signature Schemes (HBSS). PQPlatform-Hash deploys tried-and-tested HBSS including quantum-safe LMS and XMSS (not hybrid). It provides acceleration of HBSS in embedded devices, especially where high throughput is required, or resource constraints necessitate minimal additional area. For example, PQPlatform-Hash is a solution for secure first-stage boot loading with hash-based signature schemes. HBSS offer different trade-offs of memory/area to lattice-based schemes, and as a result, PQPlatform-Hash is ideally suited for smaller key sizes, larger signature sizes, and processing times for key generation, signature generation and verification.
The SiFive Essential family provides a comprehensive range of embedded processor cores that can be tailored to various application needs. This series incorporates silicon-proven, pre-defined CPU cores with a focus on scalability and configurability, ranging from simple 32-bit MCUs to advanced 64-bit processors capable of running embedded RTOS and full-fledged operating systems like Linux. SiFive Essential empowers users with the flexibility to customize the design for specific performance, power, and area requirements. The Essential family introduces significant advancements in processing capabilities, allowing users to design processors that meet precise application needs. It features a rich set of options for interface customizations, providing seamless integration into broader SoC designs. Moreover, the family supports an 8-stage pipeline architecture and, in some configurations, offers dual-issue superscalar capabilities for enhanced processing throughput. For applications where security and traceability are crucial, the Essential family includes WorldGuard technology, which ensures comprehensive protection across the entire SoC, safeguarding against unauthorized access. The flexible design opens up various use cases, from IoT devices and microcontrollers to real-time control applications and beyond.
The L5-Direct GNSS Receiver by oneNav offers cutting-edge performance by exclusively leveraging L5-band signals for navigation. This receiver directly captures signals in the L5 band, bypassing traditional L1 signals, which are often susceptible to interference and jamming. Designed for modern GNSS applications, it provides unmatched accuracy and robustness in urban areas and other challenging environments. The L5-direct technology boasts innovative features such as an Application Specific Array Processor (ASAP), which ensures rapid location acquisition without sacrificing sensitivity. It supports over 70 satellite signals across multiple constellations, including GPS, Galileo, BeiDou, and QZSS. This capability guarantees reliable positioning, making it ideal for users who require accurate and tamper-resistant navigation data. One of the unique aspects of the L5-Direct GNSS Receiver is its low power consumption, thanks to its optimized processing efficiencies. It is crafted to cater to applications with stringent size and cost restrictions, such as wearables and IoT devices. Furthermore, the receiver offers a single RF chain design, simplifying integration and reducing system complexity. This innovation makes oneNav's solution a compelling choice for next-generation GNSS receivers in diverse technological contexts.
The NS Class is Nuclei's crucial offering for applications prioritizing security and fintech solutions. This RISC-V CPU IP securely manages IoT environments with its highly customizable and secure architecture. Equipped to support advanced security protocols and functional safety features, the NS Class is particularly suited for payment systems and other fintech applications, ensuring robust protection and reliable operations. Its design follows the RISC-V standards and is accompanied by customizable configuration options tailored to meet specific security requirements.
The ArrayNav Adaptive GNSS Solution ushers in an era of enhanced automotive navigation, leveraging advanced adaptive antenna technology. This solution expertly applies multiple antennas to increase antenna gain and diversity, offering substantial advancements in navigation precision and operational consistency within complex environments. By integrating array-based technology, ArrayNav is tailored to improve the sensitivity and coverage necessary for sophisticated automotive systems. ArrayNav's use of adaptive antennas translates to significant reductions in issues such as multipath fading, which often affects navigation accuracy in urban canyons. With these enhancements, the solution ensures more reliable performance, boosting accuracy even in challenging terrains or when faced with potential signal interference. This solution has been specifically engineered for applications that demand robustness and precision, such as automotive advanced driver-assistance systems (ADAS). By employing the ArrayNav technology, users can benefit from higher degrees of jamming resistance, leading to safer and more accurate navigation results across a broad range of environments.
The Advanced Encryption Standard (AES) provides robust encryption for data security applications. Originally chosen by the National Institute of Standards and Technology (NIST) in the late 1990s, AES became the standard for encryption, replacing the older DES system. Helion Technology was at the forefront of this shift, offering a variety of AES IP cores suitable for ASIC and FPGA technologies. Helion's range of AES solutions can address different application needs from minimal area to high-speed data processing. This allows customization and scalability to fit specific encryption requirements. AES includes multiple operational modes, such as CBC, CTR, OFB, and more, enabling users to choose based on throughput and security priorities. With core offerings that cover ultra-low gate count applications to high throughput scenarios, Helion's AES cores are designed to fit seamlessly into a wide range of systems. Furthermore, by embracing process nodes from leading foundry groups, these cores ensure efficient implementation in diverse commercial settings.
The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.
The AES Core by Algotronix is a sophisticated solution tailored for securing data using advanced encryption methods. This core supports various encryption modes such as ECB, CBC, CTR, CFB, OFB, CCM, GCM, and XTS, which cater to a wide array of applications requiring different levels and methods of data protection. The flexibility in supported modes allows for tailored implementations in different security-critical environments. This encryption core is known for its deployment among prominent defense electronics organizations, and it has been operational within several NATO member states, testifying to its high-level security assurance and operational readiness in sensitive global contexts. Offered typically in source code form, the AES Core ensures that users can perform thorough security audits and tailor enhancements specific to their security policies and infrastructural needs. This capability positions Algotronix's offering as an optimal choice for organizations prioritizing stringent security postures.
Belonging to the AONSensâ„¢ Neural Network series, the AON1020 is crafted for both voice and audio recognition alongside other sensor applications. Recognized for its hectic performance in minimal power environments, AON1020's AI processing engine is available in Verilog RTL, making it accessible for use in ASIC and FPGA technologies. Engineered for scenarios like human activity detection through sensor applications, this IP provides always-on multi-wake-word detection and on-device voice command recognition. Its features ensure adaptability even in environments characterized by noise, offering stable performance irrespective of user or environmental changes. The AON1020's robust architecture accommodates sensor fusion applications, enhancing its capability in multi-sensor environments where it can decipher activities like running or walking. This offers developers potent solutions in expanding markets such as smart home automation and industrial IoT applications.
The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.
Suite-Q SW is a versatile cryptographic software library provided by PQSecure, crafted to enhance the security capabilities of devices through efficient cryptographic processing. Available in portable C code and optimized assembly variations, Suite-Q SW caters to a wide array of processors, including both general-purpose and embedded CPUs. This software library is engineered to optimize code size, stack usage, and overall performance, allowing it to operate effectively even on memory-limited devices. It provides a comprehensive set of cryptographic functions including secure hashing, encryption, and digital signatures, designed to meet the demands of diverse security scenarios. The software solution is an ideal choice for developers seeking ease of integration, support for hardware offload, and customization for specific needs. Its plug-and-play architecture makes it straightforward to deploy across different platforms, providing a robust defense against modern security threats for IoT devices, mobile applications, and more.
The NI Class RISC-V CPU IP caters to communication, video processing, and AI applications, providing a balanced architecture for intensive data handling and processing capabilities. With a focus on high efficiency and flexibility, this processor supports advanced data crunching and networking applications, ensuring that systems run smoothly and efficiently even when managing complex algorithms. The NI Class upholds Nuclei's commitment to providing versatile solutions in the evolving tech landscape.
Suite-Q HW is an integrated system-on-chip (SoC) solution by PQSecure designed to encapsulate complete cryptographic functionalities within a compact and efficient package. It targets both high-end servers and low-end embedded systems, offering a unified architecture that employs the same hardware accelerators across its different implementations. The hardware system integrates multiple cryptographic operations, including symmetric and asymmetric algorithms, within a streamlined chip design. This allows for a comprehensive offloading of cryptographic tasks, freeing up the main processor for other critical operations, and ensures rapid execution and enhanced performance. Additionally, Suite-Q HW's flexibility in configurations aids in balancing performance with silicon footprint, making it suitable for a diverse range of applications. Further, the solution is equipped with anti-tamper technologies and design features to resist side-channel attacks, a critical consideration in environments where secure operations are non-negotiable. Whether used in data-sensitive financial systems or IoT devices with limited computational resources, Suite-Q HW promises dependable security with optimal efficiency.
The JPEG-LS Encoder by Parretto B.V. is a lossless image compression solution for FPGA applications, renowned for its adherence to the JPEG-LS standard. This encoder excels in lossless scenarios, outperforming the JPEG-2000 in resource efficiency while requiring neither external memory nor complicated setup, resulting in lower latency. This IP-core is perfect for applications where high-quality, lossless image compression is essential, catering to image depths from 8 to 16 bits. It processes one pixel per clock cycle, ensuring smooth and efficient compression workflows. With configurable output data width and the ability to manage ultra-high-definition image sizes, it's a versatile choice for a variety of imaging needs. Typically used in applications requiring pristine image fidelity, the JPEG-LS Encoder supports pixel and data FIFO interfaces alongside Avalon streaming for data handling flexibility. Developers can trust its performance for critical tasks where low-latency and high-quality compression are paramount, making it a foundational tool in modern image processing systems.
The Origin E1 is a streamlined neural processing unit designed specifically for always-on applications in personal electronics and smart devices such as smartphones and security systems. This processor focuses on delivering highly efficient AI performance, achieving around 18 TOPS per watt. With its low power requirements, the E1 is ideally suited for tasks demanding continuous data sampling, such as camera operations in smart surveillance systems where it runs on less than 20mW of power. Its packet-based architecture ensures efficient resource utilization, maintaining high performance with lower power and area consumption. The E1's adaptability is enhanced through customizable options, allowing it to meet specific PPA requirements effectively, making it the go-to choice for applications seeking to improve user privacy and experience by minimizing external memory use.
The Cyclone V FPGA with Integrated PQC Processor by ResQuant is a specialized product that comes pre-equipped with a comprehensive NIST PQC cryptography suite. This FPGA is tailored for applications requiring a robust proof-of-concept for quantum-safe implementations. It ensures seamless integration into existing systems, providing a practical platform for testing and deployment in quantum-secure environments. This product is available at a competitive price and represents an ideal starting point for entities looking to explore and adopt quantum-resilient technologies. Its configuration allows for straightforward implementation in diverse hardware infrastructures while offering a reliable option for organizations aiming to stay ahead in the evolving cyber security landscape. By incorporating the latest in cryptographic standards and ensuring vendor independence, the Cyclone V FPGA with Integrated PQC Processor by ResQuant effectively bridges current hardware technologies and future-proof security needs. It supports industry-wide applications, from IoT and ICT to automotive and military sectors, underscoring ResQuant's versatility in hardware security solutions.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
No credit card or payment details required.
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!