Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Cryptography Software Library

Advanced Cryptography Software Library Semiconductor IP Solutions

In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.

Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.

The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.

At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.

All semiconductor IP
34
IPs available

RV12 RISC-V Processor

The RV12 RISC-V Processor is a highly adaptable single-core CPU that adheres to the RV32I and RV64I specifications of the RISC-V instruction set, aimed at the embedded systems market. This processor supports a variety of standard and custom configurations, making it suitable for diverse application needs. Its inherent flexibility allows it to be implemented efficiently in both FPGA and ASIC environments, ensuring that it meets the performance and resource constraints typical of embedded applications. Designed with an emphasis on configurability, the RV12 Processor can be tailored to include only the necessary components, optimizing both area and power consumption. It comes with comprehensive documentation and verification testbenches, providing a complete solution for developers looking to integrate a RISC-V CPU into their design. Whether for educational purposes or commercial deployment, the RV12 stands out for its robust design and adaptability, making it an ideal choice for modern embedded system solutions.

Roa Logic BV
AI Processor, CPU, Cryptography Software Library, IoT Processor, Microcontroller, Processor Cores
View Details

AHB-Lite Timer

The AHB-Lite Timer is a robust timer module compliant with the RISC-V Privileged Specification 1.9.1, designed to provide precise timing and control within a system. This module is an integral part of complex SoC designs where accurate timing functions are essential. Its design offers flexibility and precision, making it ideal for a range of applications that demand reliable timekeeping and event management. The timer supports various counting modes and functions, allowing users to define cycles and generate interrupts based on time-based events. Its versatility and adaptability make it an indispensable component in managing scheduling and timing tasks within embedded systems. By integrating the AHB-Lite Timer, designers can enhance system efficiency and performance, ensuring responsive and accurate operational outcomes.

Roa Logic BV
AMBA AHB / APB/ AXI, Cryptography Software Library, Input/Output Controller, Timer/Watchdog
View Details

PUFrt

PUFrt stands as a flagship hardware root of trust solution, incorporating PUF technology to create a unique and unclonable UID directly on the chip. This ensures robust security from the ground up, offering features such as TRNG, secure OTP, and an attack-resistant shell. The architecture of PUFrt provides a resilient foundation for semiconductor devices, helping to mitigate reverse engineering and counterfeiting risks. It integrates seamlessly with various systems, offering a trusted base for lightweight hardware security keys and full-function security coprocessors.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PQCryptoLib

FIPS 140-3 CMVP compliant, CAVP PQC cryptographic library designed for PQ/T Hybrid PQCryptoLib is a general-purpose FIPS 140-3 CMVP and CAVP-certified cryptographic library. It’s been designed for a wide variety of applications and provides the latest NIST-standardized post-quantum and classical algorithms in a software environment. With a configurable, secure, and easy-to-use API, PQCryptoLib is optimized for crypto-agility, particularly when it comes to FIPS-compliant hybrid PQ/T solutions, and with crypto-agility in mind, it’s built to protect against the threat of ‘harvest-now-decrypt-later’ attacks. The aim of PQCryptoLib is to help organizations transition smoothly and securely to quantum resistance in a manageable, easy-to-integrate solution.

Premium Vendor
PQShield
Content Protection Software, Cryptography Software Library
View Details

PQCryptoLib Embedded

Highly-optimized PQC implementations, capable of running PQC in < 15kb RAM PQCryptoLib-Emebedded is a versatile, CAVP-compliant version of PQCryptoLib, PQShield’s CMVP-certified library of post-quantum cryptographic algorithms. With its design focused on ultra-small area efficiency, PQCryptoLib-Embedded has been specifically designed for embedded systems, microcontrollers and memory-constrained devices. It could be the first step towards a hardware solution for providing PQC integration to devices already in the field.

Premium Vendor
PQShield
Cryptography Software Library, Embedded Security Modules
View Details

PQSDK

Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments

Premium Vendor
PQShield
Cryptography Cores, Cryptography Software Library
View Details

Alcora V-by-One HS Daughter Card

The Alcora V-by-One HS FMC daughter card by Parretto is a high-speed interface solution aimed at enhancing the connectivity of FPGA development boards with high-speed transceivers. By offering 8 RX and 8 TX lanes, the card facilitates high-throughput data transmission, supporting video resolutions such as 4K at 120Hz and 8K at 30Hz. Its dual-variant design, ranging from 41 to 51-pin headers, renders the card adaptable to diverse hardware setups, further broadening its compatibility. Additionally, two clock generators integrated within the card ensure precise synchronization by generating the necessary transceiver reference clocks and reducing jitter. This technology, developed by THine Electronics, finds its primary application in high-resolution video transmission within the flat panel display sector. The card's rich feature set and robust performance make it an ideal choice for industries demanding high-quality video output and seamless integration with existing FCA platforms.

Parretto B.V.
AMBA AHB / APB/ AXI, Analog Filter, Audio Interfaces, Cryptography Cores, Cryptography Software Library, LCD Controller, V-by-One, VESA, VGA
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

SHA Hashing for Secure Data Verification

The SHA hashing core is designed to provide reliable and efficient data verification. It employs Secure Hash Algorithms (SHA) to generate distinct hash values from input data, ensuring data integrity and authentication. With its focus on high-speed operation and low resource usage, this core is ideal for environments requiring secure data handling. Supporting various SHA standards such as SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, this core caters to a wide range of cryptographic applications. It is instrumental in digital signatures, message authentication codes, and secure boot mechanisms. The implementation is optimized for both hardware and software applications, providing robust security measures essential for financial, governmental, and consumer electronics sectors needing secure data transactions and storage.

Helion Technology Limited
Cryptography Cores, Cryptography Software Library
View Details

Securyzr Key Management System

The Securyzr Key Management System offers a robust solution integrated into Secure-IC's security ecosystem to manage cryptographic keys effectively and securely. This system ensures that key generation, distribution, and storage processes are carried out in a highly secure manner, facilitating strong encryption and digital signature functions. Its integration into a wide range of devices guarantees secure communication and data handling across various applications, making it a critical component in safeguarding sensitive data.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

AndeSoft SW Stack

AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.

Andes Technology
CPU, Cryptography Cores, Cryptography Software Library
View Details

PUFcc

PUFcc is an all-encompassing Crypto Coprocessor that delivers key generation, storage, and complete crypto operations in one solution. It builds on the PUFrt's hardware root of trust, offering secure boot, OTA updates, TLS, and key management. Its comprehensive design includes NIST-certified cryptographic algorithms, customizable for a wide range of IoT applications. PUFcc simplifies SoC design with standardized control interfaces and secure memory access, enhancing system security effortlessly.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Ultra-High Throughput 8/10/12-bit JPEG Encoder

Alma Technologies' Ultra-High Throughput 8/10/12-bit JPEG Encoder is crafted for top-tier compression performance, designed to manage high-resolution images with remarkable speed. This encoder supports both 8-bit standard-compliant and extended 10/12-bit lossless and lossy compression, making it versatile enough to handle a multitude of professional imaging needs across different sectors like broadcasting, medical imaging, and space exploration. The architecture of this encoder emphasizes parallel processing capabilities, allowing it to maintain high throughput rates even with the most demanding image resolutions. By employing a scalable engine framework, it delivers unprecedented compression speeds while preserving exceptional image quality, thereby providing visually lossless outputs that maintain the original image integrity across various compression settings. Integration into both FPGA and ASIC systems is seamless, thanks to its system-independent design, which supports flexible interfacing and low-resource utilization. The encoder is optimized to accommodate adjustable data flows and manage real-time processing requirements without sacrificing efficiency. This makes it an invaluable resource for applications needing rapid data processing and transmission without compromising quality,"category_ids":[283], "supported_process_nodes":[], "tech_specs":[],"features":[],"applications":[],"part_number":null,"power_watts":null,"supply_voltage_volts":null}],"company_country_iso_code":null,"services":["soft-ip","custom-ip"],"outsourcing_services":[]} ​This versatile JPEG IP core by Alma Technologies is designed to facilitate high-speed compression of images, supporting 8-bit baseline and 10/12-bit extended modes. Catering specifically to both standard and advanced image compression needs, these cores effectively handle diverse data formats including grayscale and full color with various chroma subsampling options like 4:4:4, 4:2:2, and 4:2:0. The IP cores deliver exceptional performance through lossless or configurable lossy compression, making them adaptable to different application requirements, whether they are for high-quality imaging or storage-efficient compression solutions. Despite the complex demands of high-speed image processing, these JPEG cores maintain a streamlined operation with an intuitive interface that supports user control over the compression process without requiring significant computing resources. Additionally, their robust rate control mechanisms ensure consistency across frames, providing reliable quality maintenance even at different compression levels. Moreover, the IP core's flexible architecture allows for seamless integration into existing systems, with well-balanced power and space consumption. This makes them ideally suited for implementation in both FPGA and ASIC platforms, guaranteeing impressive reliability and outstanding image fidelity, supporting a wide range of mixed-media applications across industries. Please include this elsewhere. The AES Block Cipher IP has already been modernized. Also, it seems like only the JPEG encoder has been featured. I could review the rest of the website. vulnerabilities across the H.264 suite. Perhaps the JPEG LS Encoder and its parts. Alma Technologies' AES Block Cipher IP is designed to provide high-performance encryption and decryption capabilities essential for secure data transmission. This IP core supports a wide range of cipher modes, including ECB, CBC, CFB, OFB, CTR, and GCM, accommodating various encryption standards while maintaining flexibility and efficiency. Its robust architecture ensures effective performance, enabling the integration of secure communication protocols into hardware devices without compromising speed or security. 11 These AES cores are crafted to offer top-notch encryption ability, emphasizing compact design suitable for both FPGA and ASIC implementations. The modular framework of the AES IP allows for easy updates and adaptations to meet changing security landscapes without extensive system overhauls. The integration of these cores guarantees adherence to stringent data security requirements, making them ideal for use in sensitive applications such as secure communications, financial transactions, and personal data protection. Ease of use is a significant feature of this IP, supported by a straightforward interface that simplifies its implementation into existing systems. Its design considers low power consumption while ensuring high throughput rates, offering an optimal balance of energy-efficiency and encryption performance. This makes it a suitable addition for any security-centric applications demanding superior confidentiality mechanisms in data handling processes.9 Alma Technologies' Ultra-High Throughput 8/10/12-bit JPEG Encoder is crafted for top-tier compression performance, designed to manage high-resolution images with remarkable speed. This encoder supports both 8-bit standard-compliant and extended 10/12-bit lossless and lossy compression, making it versatile enough to handle a multitude of professional imaging needs across different sectors like broadcasting, medical imaging, and space exploration. The architecture of this encoder emphasizes parallel processing capabilities, allowing it to maintain high throughput rates even with the most demanding image resolutions. By employing a scalable engine framework, it delivers unprecedented compression speeds while preserving exceptional image quality, thereby providing visually lossless outputs that maintain the original image integrity across various compression settings. Integration into both FPGA and ASIC systems is seamless, thanks to its system-independent design, which supports flexible interfacing and low-resource utilization. The encoder is optimized to accommodate adjustable data flows and manage real-time processing requirements without sacrificing efficiency. This makes it an invaluable resource for applications needing rapid data processing and transmission without compromising quality. 8 Easy setup with appropriate provisions was placed. Other relevant IP, such as the AES Block Cipher IP, for wider applicability should be added. Do ensure that the data is clean and structured. Please return the other parts. PIECE GLOSSESSphinx Publishing ":[5270]  The AES Block Cipher IP is modernized in strategies. According to their desired configurations, adapting a non-portable blocking access and utilizing modern processing techniques. Alma Technologies' AES Block Cipher IP offers high-performance encryption and decryption capabilities essential for secure data transmission. This IP core supports multiple cipher modes including ECB, CBC, CFB, OFB, CTR, and GCM, enabling compatibility with various secure applications while maintaining flexibility and efficiency. Its comprehensive architecture ensures strong performance, facilitating the integration of secure communication protocols into devices without compromising speed or security. The AES cores emphasize a compact design suitable for both FPGA and ASIC implementations, offering superior encryption capabilities with customizable settings. The IP accommodates various updates and security adaptations without requiring significant system overhauls, adhering to strict data encryption standards. Designed with ease of use in mind, these cores feature straightforward interfaces for seamless integration. High throughput rates are maintained alongside low power consumption, making them an optimal choice for applications requiring robust data protection like secure communications and financial transactions.8clusion.9ging. Easy_trans!setup with appropriate provisions was pla...

Alma Technologies
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, JPEG
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library offered by PQ Secure, tailored to optimize code size, stack usage, and performance for diverse device specifications. Available in both high-speed assembly and portable C code, it suits a variety of embedded processors ranging from 8-bit to 64-bit platforms. This software solution ensures that memory-constrained devices can still maintain robust security features without sacrificing critical system resources. Compatible with general-purpose and specialized CPUs, Suite-Q SW supports hardware offload, enhancing processing efficiency across different applications. Key functionalities include support for various symmetric and asymmetric cryptographic standards, aligning with global security protocols. Suite-Q SW offers customization options to balance speed and memory use, meeting specific performance criteria while providing thorough validation tests and performance metrics for seamless integration into existing systems.

PQ Secure Technologies, LLC
Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

FortiCrypt

FortiCrypt is an advanced encryption technology developed for protecting data against side-channel and fault injection attacks. This solution implements algorithmic resistance using finite field arithmetic, ensuring secure handling of data without adding extra latency or requiring custom silicon processing. It stands out for its successful passage of rigorous evaluations, including the Test Vector Leakage Assessment conducted on one billion traces. This ensures FortiCrypt can be used flexibly across various technologies and platforms while maintaining high security.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a robust hardware accelerator specifically designed for cryptographic hashing functions. It presents a balance of high throughput and area efficiency and aligns with the FIPS 202 standards set by NIST. This engine supports all SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, as well as SHAKE-128 and SHAKE-256. Built to mitigate security vulnerabilities, it provides comprehensive defense against time-based side-channel attacks, ensuring data integrity. Operating within a single clock domain, the SHA-3 Crypto Engine is adequately verified, boasting automatic byte padding and effortless integration into existing systems. Its versatility spans numerous applications ranging from Message Authentication Codes (MACs) to protocol engines like IPsec and TLS/SSL, alongside secure boot engines and encrypted data storage solutions. Through integrating this engine, clients can guarantee the integrity and security of financial transactions, e-commerce platforms, and even blockchain applications. Delivered in System Verilog RTL with supportive testbenches and integration examples, the SHA-3 Crypto Engine offers straightforward deployment while maintaining compliance with industry standards. Its resource utilization spans a variety of FPGA families such as AMD Spartan, Kintex-7, and AMD Zynq MPSoC, presenting adaptability and efficiency across diverse platforms.

KiviCore
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Cryptographic Core

PQ Secure's Cryptographic Core is designed to handle a variety of cryptographic operations required for secure communication and data protection. This core supports both symmetric and asymmetric cryptographic algorithms, ensuring a comprehensive range of security features. With adaptability for different system requirements, it can be integrated into various hardware platforms including FPGAs and ASICs, offering efficient and secure processing. This core is capable of executing classical public key operations such as ECDSA, Ed25519, Curve25519, and Curve448, as well as supporting advanced encryption standards like AES and SHA algorithms. These capabilities ensure that the cryptographic core can handle multiple cryptographic needs, maintaining the integrity and confidentiality of data within digital systems. Designed with flexibility in mind, the core can be configured to meet specific performance and security requirements, making it suitable for applications that range from high-performance servers to low-power IoT devices. Alongside these features, the core is fortified against potential side-channel attacks, providing robust security in various application environments.

PQ Secure Technologies, LLC
AI Processor, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators, Standard cell
View Details

Keccak Hash Engine

The Keccak Hash Engine is renowned for its adaptability and capability, primarily recognized as a cryptographic hash function. Its core structure is based on a unique sponge construction featuring the Keccak-f cryptographic permutation, allowing for extensive customization in output length and security strength. This flexibility has secured its adoption in mobile telephony standards like 3GPP TS 35.231 and NIST standards, namely FIPS 202 and SP 800-185. Capable of executing hash functions and providing support for authentication, encryption, and pseudo-random number generation, the Keccak Hash Engine is a versatile asset in various cryptographic applications. Its design rests on simplicity and ease of integration, coupled with a single clock domain to ensure seamless deployment and operation across platforms. Due to its extensively verified code, the Keccak Hash Engine is dependable for applications demanding high security levels, like blockchain, random number generation, and authentication protocols. Available in System Verilog RTL, it is suitable for diverse industrial applications that demand robust cryptographic functions adaptable to evolving security needs.

KiviCore
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Side-channel Attack Resistance

This IP core offers advanced technology to resist side-channel attacks, crucial for maintaining the integrity and confidentiality of sensitive data. It is specifically engineered to withstand efforts to extract cryptographic keys via analysis of physical emanations from hardware devices. The side-channel attack resistance feature of this product ensures that it can be deployed in environments where data protection is paramount, such as in financial systems and secure communications.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Injection Attack Countermeasures

Aimed at mitigating the risk of fault injection attacks, this IP employs sophisticated strategies to maintain security integrity under extreme conditions. It uses error-detection and correction techniques to prevent unauthorized manipulations that could otherwise lead to unauthorized access. The IP is designed to be robust against fault conditions induced by attackers using methods like voltage manipulation and clock glitching. Its deployment is vital in secure environments where data integrity is non-negotiable.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Subsystems
View Details

FortiMac

FortiMac offers a secure implementation of HMAC SHA2, aimed at providing strong resistance to side-channel and fault injection attacks. Utilizing the Threshold Implementation paradigm ensures its ability to protect critical applications, both in software and hardware deployments. FortiMac's market distinction lies in its unique capability of employing only a minimal number of standard digital gates, while concurrently offering robust security for SCA and FIA threats.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ATEK250P3 (SPDT Switch)

The ATEK250P3 is a sophisticated absorptive SPDT switch tailored for RF applications. Operating efficiently over a frequency range from LF to 14 GHz, this switch is known for maintaining low insertion loss of 1.5 dB while providing high isolation of 43 dB. The device is ideal for applications requiring reliable performance, as it supports positive control voltages and is packaged in a compact 3x3 mm QFN form factor, facilitating its integration into various systems. The ATEK250P3 is designed for optimal performance in demanding environments, offering a P1dB compression point of 27 dBm and an IIP3 of 44 dBm, which is critical for maintaining signal integrity in high-power situations. Its robust construction and efficient function make it a preferred choice for communication systems requiring stable and high-performance switching capabilities. Integrating seamlessly into complex RF systems, the ATEK250P3 combines cutting-edge technology with user-friendly interfacing, ensuring it supports modern telecommunication demands. As part of Atek Midas's product lineup, it exemplifies their commitment to developing components that are both reliable and high-caliber.

Atek Midas
AMBA AHB / APB/ AXI, Analog Multiplexer, Cryptography Software Library, Peripheral Controller, Receiver/Transmitter, USB
View Details

AES Block Cipher IP

Alma Technologies' AES Block Cipher IP is designed to provide high-performance encryption and decryption capabilities essential for secure data transmission. This IP core supports a wide range of cipher modes, including ECB, CBC, CFB, OFB, CTR, and GCM, accommodating various encryption standards while maintaining flexibility and efficiency. Its robust architecture ensures effective performance, enabling the integration of secure communication protocols into hardware devices without compromising speed or security. These AES cores are crafted to offer top-notch encryption ability, emphasizing compact design suitable for both FPGA and ASIC implementations. The modular framework of the AES IP allows for easy updates and adaptations to meet changing security landscapes without extensive system overhauls. The integration of these cores guarantees adherence to stringent data security requirements, making them ideal for use in sensitive applications such as secure communications, financial transactions, and personal data protection. Ease of use is a significant feature of this IP, supported by a straightforward interface that simplifies its implementation into existing systems. Its design considers low power consumption while ensuring high throughput rates, offering an optimal balance of energy-efficiency and encryption performance. This makes it a suitable addition for any security-centric applications demanding superior confidentiality mechanisms in data handling processes.

Alma Technologies
Cryptography Cores, Cryptography Software Library, Embedded Security Modules
View Details

Low Power Security Engine

Low Power Futures offers a formidable solution in the Low Power Security Engine, tailored to enhance the security measures of resource-constrained embedded devices. This advanced IP features a compact design that combines power efficiency with robust security capabilities, including support for ECDHE and ECDSA protocols. Its integrated acceleration engine offers protection against timing and side-channel attacks while enabling efficient cryptographic operations. Designed for seamless prototyping and real-world application, this security engine makes an impressive addition to any smart IoT device looking to emphasize security without compromising on performance.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

KiviPQC-KEM

The KiviPQC-KEM is an advanced cryptographic solution developed for the post-quantum era, designed to support all ML-KEM variants standardized under NIST's FIPS 203. This IP core performs key operations necessary for key generation, encapsulation, and decapsulation, ensuring robust defenses against quantum computer attacks. The engine is a central asset in post-quantum cryptography, facilitating secure secret key establishment over public channels. Targeted for integration within ASIC and FPGA systems, the KiviPQC-KEM distinguishes itself with its minimalistic logic utilization and efficient resource management. It incorporates hardware acceleration to bolster performance during computationally intense tasks, bridging the gap between security needs and computational capabilities. KiviPQC-KEM is encapsulated as a standalone unit, allowing easy integration without extensive resources. Applications for this core cover a broad spectrum of secure communications, from quantum-resistant networks to electronic transactions. It also features seamless compatibility with network security protocols like MACsec, IPsec, and transport protocols such as TLS and SSL. The KiviPQC-KEM is delivered with comprehensive supporting documentation and source codes, ensuring that it meets the needs of developers seeking robust, quantum-safe solutions.

KiviCore
Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

QRoot Lite

QRoot Lite is designed for resource-constrained MCUs and IoT devices, offering a lightweight, configurable root-of-trust. Built on TCG MARS specification, it simplifies integration and reduces cost, ensuring secure boot, attestation, and key protection. The IP minimizes silicon and power requirements, making it ideal for low-power device applications. Its flexible architecture allows seamless inclusion into SoC designs, offering not only secure boot and firmware validation but also tamper protection and unauthorized access prevention during device operation. QRoot Lite provides secure attestation using Trusted Computing Group standards, making it an excellent choice for meeting compliance and security standards in smart sensors, medical devices, and gateway products. It supports integration with standard industry interfaces and is optimized for low silicon footprint, reinforcing its versatility in diverse IoT environments.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiCrypt Library

The FortiCrypt Library is an advanced software component designed for defense against both differential power analysis and fault injection attacks, enhancing the security posture of systems utilizing cryptographic operations. Its robust configurations support high-definition video encryption and decryption, even on low-end processors. By fortifying existing hardware solutions in the field, the library offers an efficient upgrade path for devices that need enhanced security without complete hardware overhauls.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

AES XP-DPA-FIA

AES XP-DPA-FIA represents a high-performance cryptographic solution offering superior defense against both differential power analysis and fault injection attacks. With its multi-pipeline architecture, it delivers exceptional throughput while maintaining a high level of security. Designed to function efficiently under low latency conditions, AES XP-DPA-FIA is an optimal choice for applications demanding both speed and security, ensuring that cryptographic operations proceed smoothly without compromising data protection.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

JTAG TAP Controller

The JTAG TAP (Test Access Port) Controller delivers critical test access functions in integrated circuits, supporting standard JTAG protocol. Its implementation enables precise testing and debugging of complex systems, forming an essential element in device validation and fault isolation.

Beyond Semiconductor
Cryptography Software Library, Input/Output Controller, Interrupt Controller
View Details

HMAC-SHA2-DPA-FIA

This IP ensures strong cryptographic security with its resistance to differential power analysis and fault injection attacks, making it suitable for environments with stringent security needs. The HMAC-SHA2 algorithm implemented here provides a robust mechanism against various security threats, ensuring the safe execution of operations that rely heavily on secure hashing techniques. Its design focuses on maintaining operational efficiency while delivering top-tier security for sensitive applications.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

AES ULP-DPA-FIA

AES ULP-DPA-FIA provides ultra-low power cryptographic processing, integrating resistance to both power and fault injection attacks within battery-sensitive applications. It delivers a balance between maintaining essential security standards and ensuring minimal power consumption, crucial for portable and battery-dependent environments. This core is ideal for smart wearables and IoT devices that require sustained protection against cyber threats without draining energy resources.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

AES SX-DPA-FIA

The AES SX-DPA-FIA combines balanced security and performance, providing resistance against both differential power analysis and fault injection attacks while optimizing for low power use. This IP core is crafted for delivering security in balanced scenarios, where an equilibrium of speed, power efficiency, and gate count is desired. It shines in environments that prioritize overall efficiency without compromising security, making it suitable for a wide range of technological applications.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

AES UC-DPA-FIA

AES UC-DPA-FIA is tailored for ultra-compact security-critical applications where space and efficiency are of the essence. Its design enables the implementation of high-level cryptographic security within a minimal gate footprint, differentiating it as an economically efficient choice for low-cost, high-security devices. Its compact architecture is instrumental in driving wide adoption within hardware-constrained applications requiring robust protection against data breaches and unauthorized access.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt