Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Cryptography Software Library

Advanced Cryptography Software Library Semiconductor IP Solutions

In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.

Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.

The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.

At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.

All semiconductor IP

RV12 RISC-V Processor

The RV12 RISC-V Processor is a versatile single-core microprocessor that adheres to both the RV32I and RV64I RISC-V instruction sets. Designed primarily for the embedded market, this processor features a Harvard architecture that enables simultaneous instruction and data accesses, enhancing performance in computing tasks. As part of the Roa Logic CPU family, this processor is highly configurable, allowing users to adjust its parameters to fit specific application requirements, thus making it an excellent choice for technology developers seeking efficient custom solutions.

Roa Logic BV
AI Processor, CPU, Cryptography Software Library, IoT Processor, Microcontroller, Processor Cores
View Details

AHB-Lite Timer

Roa Logic's AHB-Lite Timer is a timer module that adheres to the RISC-V Privileged 1.9.1 specification, designed for use in RISC-V compliant systems. This module offers reliable timing functions essential for task scheduling and precise time control in embedded applications, delivering dependable performance required in various electronic applications.

Roa Logic BV
AMBA AHB / APB/ AXI, Cryptography Software Library, Input/Output Controller, Timer/Watchdog
View Details

PUFrt

PUFrt stands as a flagship hardware root of trust solution, incorporating PUF technology to create a unique and unclonable UID directly on the chip. This ensures robust security from the ground up, offering features such as TRNG, secure OTP, and an attack-resistant shell. The architecture of PUFrt provides a resilient foundation for semiconductor devices, helping to mitigate reverse engineering and counterfeiting risks. It integrates seamlessly with various systems, offering a trusted base for lightweight hardware security keys and full-function security coprocessors.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM IP Cores for Embedded NVM in MCU & SOCs

CrossBar's ReRAM IP Cores for Embedded NVM are engineered to optimize the functionality of microcontrollers and System-on-Chip (SoC) designs. These cores are specially tailored for multi-time programmable (MTP) non-volatile memory applications across a range of devices, from IoT gadgets to industrial and automotive systems. By enhancing memory performance while reducing latency and energy consumption, these cores set a new standard for embedded system efficiency. The IP cores support process nodes starting at 28nm and can scale below 10nm, ensuring compatibility with contemporary semiconductor manufacturing processes. They provide customizable memory sizes from 2M bits to 256M bits, allowing for tailored solutions that meet specific application needs. The cores excel in low-energy code execution, making them ideal for devices that prioritize energy efficiency without compromising on performance. In addition to their utility in consumer electronics and smart devices, these ReRAM IP cores are equipped to enhance security functions, integrating secure keys into semiconductors to bolster data protection. Their scalability and versatility make them an excellent choice for developers seeking to integrate high-performance, non-volatile memory components into their silicon architectures.

CrossBar Inc.
TSMC
28nm
CPU, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile DDR Controller, Mobile SDR Controller, NAND Flash, NVM Express, SDRAM Controller
View Details

SHA Hashing for Secure Data Verification

Helion's SHA Hashing cores are robust solutions for cryptographic integrity verification, supporting SHA-1, SHA-2, and MD5 algorithms. Designed for creating a secure, fixed-length hash from input data, these cores are pivotal in digital signatures and data integrity protocols. SHA Hashing from Helion is renowned for its high-speed performance, offering both FAST and TINY modes. These cores ensure that any alteration in the input data results in a different hash, making them indispensable for data integrity and security measures across various applications. The flexibility of Helion’s SHA Hashing solutions makes them suitable for diverse technological environments, whether in FPGAs or ASICs. The integrity assurance provided by these cores is crucial in fields such as secure communications and data verification, supporting protocols like SSL/TLS and IPsec.

Helion Technology Limited
All Foundries
All Process Nodes
Cryptography Cores, Cryptography Software Library
View Details

PQSDK

Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments

Premium Vendor
PQShield
Cryptography Cores, Cryptography Software Library
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

PQCryptoLib

FIPS 140-3 CMVP compliant, CAVP PQC cryptographic library designed for PQ/T Hybrid PQCryptoLib is a general-purpose FIPS 140-3 CMVP and CAVP-certified cryptographic library. It’s been designed for a wide variety of applications and provides the latest NIST-standardized post-quantum and classical algorithms in a software environment. With a configurable, secure, and easy-to-use API, PQCryptoLib is optimized for crypto-agility, particularly when it comes to FIPS-compliant hybrid PQ/T solutions, and with crypto-agility in mind, it’s built to protect against the threat of ‘harvest-now-decrypt-later’ attacks. The aim of PQCryptoLib is to help organizations transition smoothly and securely to quantum resistance in a manageable, easy-to-integrate solution.

Premium Vendor
PQShield
Content Protection Software, Cryptography Software Library
View Details

PQCryptoLib Embedded

Highly-optimized PQC implementations, capable of running PQC in < 15kb RAM PQCryptoLib-Emebedded is a versatile, CAVP-compliant version of PQCryptoLib, PQShield’s CMVP-certified library of post-quantum cryptographic algorithms. With its design focused on ultra-small area efficiency, PQCryptoLib-Embedded has been specifically designed for embedded systems, microcontrollers and memory-constrained devices. It could be the first step towards a hardware solution for providing PQC integration to devices already in the field.

Premium Vendor
PQShield
Cryptography Software Library, Embedded Security Modules
View Details

Alcora V-by-One HS Daughter Card

Designed for seamless integration of the V-by-One HS interface with FPGA development platforms, the Alcora V-by-One HS Daughter Card supports high-speed video data transmission. This card can interface with FPGA boards using 8 RX and 8 TX lanes, allowing for extensive bandwidth utilization. The Alcora card is distinguished by its two available versions, differing by their header pin count: 51-pin and 41-pin. Optimized for high-definition video transmission, it supports resolutions of 4K at 120Hz or 8K at 30Hz by combining two daughter cards for enhanced lane capacity. To maintain signal integrity, Alcora incorporates two clock generators to manage transceiver reference clock synthesis and reduce recovered RX clock jitter. As a high-speed digital video interface solution, it is tailored particularly for display applications that demand rigorous performance and reliability standards.

Parretto B.V.
AMBA AHB / APB/ AXI, Analog Filter, Audio Interfaces, Cryptography Cores, Cryptography Software Library, LCD Controller, V-by-One, VESA, VGA
View Details

Suite-Q SW

Suite-Q SW stands as a versatile cryptographic software library offered by PQ Secure that is meticulously engineered to optimize code size, stack usage, and performance across various processing environments. This library is built to be portable, with implementations available in C and assembly languages, catering to a wide array of processor architectures including 8-, 16-, 32-, and 64-bit systems. The software library is designed to seamlessly integrate into diverse development environments, providing developers with modular plug-in modules that facilitate easy hardware offload. Suite-Q SW supports a comprehensive spectrum of cryptographic operations, including both symmetric encryption such as AES and advanced post-quantum schemes, ensuring robust data protection. As part of its feature set, Suite-Q SW offers multiple configurations, allowing developers to balance memory utilization and processing speed according to their specific application needs. This flexibility makes the library suitable for both general-purpose applications and highly specialized embedded systems, ensuring it meets the stringent requirements of modern security demands.

PQ Secure Technologies, LLC
Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

AndeSoft SW Stack

AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.

Andes Technology
CPU, Cryptography Cores, Cryptography Software Library
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

FortiCrypt

FortiCrypt is designed to address side-channel and fault injection vulnerabilities, providing strong protection for cryptographic implementations. Its architecture uses a combination of patented techniques to deliver robust security without impacting performance or power efficiency, making it suitable for both high-performance and power-sensitive applications.

FortifyIQ
GLOBALFOUNDRIES, TSMC
20nm, 28nm
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

PUFcc

PUFcc is an all-encompassing Crypto Coprocessor that delivers key generation, storage, and complete crypto operations in one solution. It builds on the PUFrt's hardware root of trust, offering secure boot, OTA updates, TLS, and key management. Its comprehensive design includes NIST-certified cryptographic algorithms, customizable for a wide range of IoT applications. PUFcc simplifies SoC design with standardized control interfaces and secure memory access, enhancing system security effortlessly.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Post-Quantum Cryptography IP

Post-Quantum Cryptography IP offers a hardware-based solution integrated with software capabilities to ensure secure communications in a quantum computing era. Designed with quantum resistance in mind, it supports key exchange, encapsulation, and decapsulation functions using lattice-based algorithms. This IP is equipped with measures to protect against side-channel attacks, including simple power analysis and differential power analysis. Offering interfaces like AMBA, it ensures flexibility in integration within various systems, positioning it as a crucial component for future-proofing communication security against the impending challenges of quantum computation.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM as FTP/OTP Memory

ReRAM deployed as Few-Time Programmable (FTP) and One-Time Programmable (OTP) memory provides a flexible solution for diverse applications requiring reliable non-volatile memory integration. This offering from CrossBar is engineered to deliver efficient memory initialization and reprogramming, critical for applications ranging from consumer electronics to industrial IoT. The ReRAM FTP/OTP memory is distinguished by its robustness and high performance, capable of supporting a wide range of environmental conditions and enduring multiple write cycles while ensuring data retention and integrity. This makes it particularly advantageous for applications where storage permanence and reliability are crucial. Moreover, CrossBar's FTP/OTP memory solutions are designed to reduce system complexity, offering memory configurations that are easily integrated with existing architectures. Its substantial resistance to interference and decay enhances its appeal in synchronous systems, where maintaining data stability is imperative. Additionally, the scalability of this technology across different nodes broadens its applicability within the broader spectrum of digital electronics.

CrossBar Inc.
TSMC
All Process Nodes
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Flash Controller, HBM, Mobile DDR Controller, Mobile SDR Controller, NAND Flash
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine offers a robust hardware acceleration solution for cryptographic hashing functions. Its design prioritizes high throughput and efficient resource utilization, complying with NIST’s FIPS 202 standards. The core supports various SHA-3 hash functions including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, alongside Extendable Output Functions (XOF) like SHAKE-128 and SHAKE-256. This comprehensive support makes it a versatile tool for ensuring data integrity and authentication in a multitude of applications. A key feature of the SHA-3 Crypto Engine is its protection against timing-based side channel attacks, offering a secure cryptographic environment. Fully synchronous in design, it operates within a single clock domain, ensuring stability and reliability across different platforms. Its applications span various domains such as secure boot engines, IPsec and TLS/SSL protocol engines, and even blockchain technologies. The core has been extensively verified and includes features such as automatic byte padding, making it an adaptable solution across a wide range of applications. It’s designed to be implemented on both FPGAs and ASICs, ensuring flexibility and adaptability in various deployment scenarios.

KiviCore
2D / 3D, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Cryptographic Core

The Cryptographic Core is a robust and integral component of PQ Secure's product line, designed to address the need for efficient and effective cryptographic operations across various platforms. This solution is highly configurable and provides comprehensive support for both symmetric and asymmetric cryptographic functions. It is particularly adept at handling complex cryptographic algorithms such as elliptic curve cryptography and other post-quantum algorithms, ensuring data integrity and security. This core is particularly valuable for applications requiring high levels of security without compromising on performance. By incorporating advanced cryptographic techniques, it can operate efficiently on a range of devices, from embedded systems to high-performance computing environments. It is designed to be scalable, allowing integration into a variety of hardware and software architectures to support a wide range of applications. Notably, the Cryptographic Core offers enhanced protection measures against side-channel attacks, providing an additional layer of security for sensitive information. By leveraging this core, developers and engineers can offload intensive cryptographic operations, thereby enhancing the overall performance of their systems while ensuring robust data protection. The flexibility and reliability of this core make it an ideal choice for industries looking to safeguard data against emerging threats.

PQ Secure Technologies, LLC
AI Processor, Cryptography Cores, Cryptography Software Library, Security Processor, Security Protocol Accelerators, Standard cell
View Details

Keccak Hash Engine

The Keccak Hash Engine is a versatile IP core known for its role in guaranteeing data security through a variety of cryptographic operations. This core is not just limited to hashing functions but extends its capabilities to include authentication, encryption, and pseudo-random number generation. Fundamental to its design is the use of the sponge construction and the innovative Keccak-f cryptographic permutation. This IP core stands out for its flexibility, allowing for customization in hash output lengths and security levels. Standardized under widely recognized protocols like NIST's FIPS 202, the Keccak Hash Engine has undergone thorough scrutiny ensuring its robustness. The design is optimized for seamless integration into existing systems, operating efficiently within a single clock domain. The Keccak Hash Engine’s applications extend across various sectors, providing essential security functions for systems like blockchain, PRNG, and more. Its configurability means it can adapt to numerous scenarios, maintaining high security standards as required by different applications.

KiviCore
2D / 3D, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Injection Attack Countermeasures

This IP core offers comprehensive countermeasures against fault injection attacks, utilizing both algorithmic and circuit-level techniques. It enhances the robustness of systems where reliability is paramount, particularly in applications requiring high levels of security under adverse conditions.

FortifyIQ
LFoundry, SilTerra
4nm, 22nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Side-channel Attack Resistance

This IP core is designed to mitigate the risks associated with side-channel attacks, offering circuit-level enhancements to prevent data leakage from power and electromagnetic emissions. It integrates seamlessly with existing architectures, providing an additional layer of security without compromising processing power or speed.

FortifyIQ
Intel Foundry, TSMC
7nm, 65nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM Secure Keys

The ReRAM Secure Keys from CrossBar serve as a cornerstone in bolstering the security framework of semiconductor devices by embedding secure keys within the hardware. These secure key solutions leverage CrossBar's innovative ReRAM technology to deliver exceptional protection against tampering and unauthorized access. Incorporating ReRAM Secure Keys into a semiconductor not only fortifies device security but also enhances the overall integrity of the system by ensuring that cryptographic operations are conducted securely and effectively. The ReRAM technology provides a platform for creating physical unclonable functions (PUF) that are essential to protecting sensitive data in an ever-evolving threat landscape. The adaptability of ReRAM Secure Keys across different platforms and use cases allows for their deployment in a variety of environments requiring stringent security measures, such as in IoT devices, secure communication systems, and financial transaction platforms. By offering a tamper-resistant solution, CrossBar strengthens the confidence in digital transactions and communications across sectors.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details

Low Power Security Engine

The Low Power Security Engine is designed by Low Power Futures to provide robust security for IoT devices while maintaining minimal power usage. Focusing on compact and comprehensive security capabilities, it supports elliptic-curve based cryptographic algorithms, including ECDHE (Elliptic-Curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm). The design is perfect for ensuring secure operations in constrained environments like RFID systems and embedded SIM cards, offering side-channel and timing attack resistance, thus securing sensitive data in demanding applications like IIoT and connected infrastructure.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Root of Trust

Rambus' Root of Trust is a foundational technology for securing system on chip (SoC) hardware and safeguarding data at rest. This solution caters to government and automotive sectors, featuring programmable secure co-processors and highly compact designs with options for Quantum Safe Cryptography. Available with certifications for FIPS 140 CMVP and ISO 26262, it is vital for applications requiring stringent security measures.

Rambus
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiMac

The FortiMac library provides advanced protection for HMAC SHA2 implementations, ensuring resilience against differential power analysis (DPA) and fault injection. It is designed for situations requiring high-security cryptographic computations without sacrificing efficiency, particularly in environments where power and area are constrained.

FortifyIQ
Samsung, TSMC
7nm LPP, 28nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ATEK250P3 (SPDT Switch)

The ATEK250P3 is a sophisticated absorptive SPDT switch tailored for RF applications. Operating efficiently over a frequency range from LF to 14 GHz, this switch is known for maintaining low insertion loss of 1.5 dB while providing high isolation of 43 dB. The device is ideal for applications requiring reliable performance, as it supports positive control voltages and is packaged in a compact 3x3 mm QFN form factor, facilitating its integration into various systems. The ATEK250P3 is designed for optimal performance in demanding environments, offering a P1dB compression point of 27 dBm and an IIP3 of 44 dBm, which is critical for maintaining signal integrity in high-power situations. Its robust construction and efficient function make it a preferred choice for communication systems requiring stable and high-performance switching capabilities. Integrating seamlessly into complex RF systems, the ATEK250P3 combines cutting-edge technology with user-friendly interfacing, ensuring it supports modern telecommunication demands. As part of Atek Midas's product lineup, it exemplifies their commitment to developing components that are both reliable and high-caliber.

Atek Midas
AMBA AHB / APB/ AXI, Analog Multiplexer, Cryptography Software Library, Peripheral Controller, Receiver/Transmitter, USB
View Details

KiviPQC-KEM

The KiviPQC-KEM is a post-quantum cryptographic IP core designed for the future of secure communications. It implements the ML-KEM Key Encapsulation Mechanism, which is a robust algorithm resistant to quantum computing attacks. This IP core is capable of executing key generation, encapsulation, and decapsulation operations as per the NIST FIPS 203 standard. Highly efficient in performance, the KiviPQC-KEM operates with minimal logic utilization making it cost-effective for clients. It offers high-level security by providing hardware acceleration for computationally demanding tasks, minimizing vulnerabilities and ensuring maximum protection in communications. Ideal for applications that prioritize quantum-resistance, the KiviPQC-KEM is suitable for securing network infrastructures, transport protocols like TLS and SSL, and electronic transactions. The architecture facilitates easy integration into a wide range of platforms, supporting both FPGA and ASIC implementations.

KiviCore
TSMC
10nm, 16nm, 28nm
2D / 3D, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

QRoot Lite

QRoot Lite is a flexible and lightweight root-of-trust designed for microcontrollers and IoT devices, especially those constrained by power and space. Following the TCG MARS specification, it introduces essential security features such as secure boot, attestation, and key protection. This IP minimizes costs and simplifies integration, aiding teams aiming for regulatory compliance and robustness in products that include smart sensors and medical devices. Its architecture is secured against counterfeiting and tampering, offering future-proof security with cryptographic agility.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiCrypt Library

The FortiCrypt Library provides advanced software-based cryptographic solutions resistant to differential power analysis and fault injection attacks. It offers high-grade encryption and decryption capabilities for a range of applications, bringing enhanced security to platforms where hardware protections are not feasible.

FortifyIQ
LFoundry, TSMC
5nm, 16nm
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

AES XP-DPA-FIA

AES XP-DPA-FIA is a high-bandwidth cryptographic engine designed to resist both differential power analysis and fault injection attacks. This IP core is optimized for ultra-high-performance environments, maintaining secure encryption processes across vast data arrays without sacrificing speed or efficiency.

FortifyIQ
GLOBALFOUNDRIES, TSMC
32nm, 55nm
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

AES ULP-DPA-FIA

AES ULP-DPA-FIA is engineered for ultra-low-power devices, offering an AES encryption core that is highly resistant to both DPA and FIA. This IP core is an excellent choice for battery-powered applications where security cannot be compromised but efficiency is crucial.

FortifyIQ
HHGrace, SilTerra
10nm, 40nm
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

HMAC-SHA2-DPA-FIA

This cryptographic IP core provides heightened security for message authentication codes, specifically using HMAC-SHA2 with defenses against differential power analysis and fault injection. It is tailored to facilitate secure communications in sensitive environments where both data integrity and privacy are crucial.

FortifyIQ
GLOBALFOUNDRIES, UMC
150nm, 160nm
AV1, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

AES SX-DPA-FIA

The AES SX-DPA-FIA core achieves a balance between security, performance, and power consumption. It is crafted to handle sensitive data securely while maintaining high performance, making it suitable for a variety of applications, including those demanding a moderate gate count and energy efficiency.

FortifyIQ
Renesas
40/45nm
Amplifier, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

AES UC-DPA-FIA

Designed for space-constrained applications, AES UC-DPA-FIA provides cryptographic security with minimal footprint, making it an ideal choice for devices that require compactness without sacrificing DPA and FIA resistance. It supports a range of encryption applications where size and security are key.

FortifyIQ
SMIC, TSMC
90nm, 800nm
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

PCIe GEN6 PHY

Designed for next-generation PCIe systems, the PCIe GEN6 PHY core delivers reliable performance with data rates up to 64GT/s per lane using advanced PAM4 signaling. It is optimized for high-speed, data-intensive applications such as AI and ML, modern storage solutions, and high-performance computing. This PHY core supports PRBS testing, loopback modes, multiple power states, and jitter measurement, providing robust and scalable throughput, essential for innovation in data-driven environments.

Logic Fruit Technologies
Cryptography Software Library
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt