Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Embedded Security Modules

Embedded Security Modules Semiconductor IP

In today's interconnected technological landscape, the security of embedded systems has emerged as a crucial challenge. This is where Embedded Security Modules (ESMs) in semiconductor IPs play a pivotal role. These modules are specialized components integrated into chips, offering enhanced protection against a variety of threats including unauthorized access, data breaches, and malicious attacks. By embedding security at the silicon level, these IPs provide a hardware root of trust, ensuring that the integrity, confidentiality, and authenticity of data and communications are uncompromised.

Embedded Security Modules are used across a spectrum of applications, catering to industries such as IoT, automotive, telecommunications, and consumer electronics. In the IoT realm, these modules protect smart devices from vulnerabilities and ensure secure data transmission between interconnected gadgets. In the automotive sector, ESMs safeguard vehicular communication systems and onboard diagnostics from hacking attempts. Similarly, telecommunications networks utilize these modules to establish secure channels and prevent espionage, maintaining the privacy of sensitive communications.

The products found within this category include a range of security-enhancing solutions such as secure boot processors, cryptographic accelerators, hardware random number generators, and secure element IPs. These products are designed to address specific security needs, offering flexibility and scalability to developers and manufacturers. For instance, secure boot processors ensure that only authenticated software runs on a device, while cryptographic accelerators speed up data encryption and decryption processes, vital for real-time secure communications.

Moreover, as digital threats evolve, Embedded Security Modules semiconductor IPs continue to advance, incorporating cutting-edge technologies like quantum encryption readiness and machine learning-led anomaly detection. This ongoing innovation not only fortifies existing systems but also prepares them for future challenges, making Embedded Security Modules a cornerstone of secure electronic design for years to come. Whether you are developing chips for personal gadgets or intricate industrial systems, integrating these security IPs ensures robust protection and compliance with stringent security standards, enhancing consumer trust and product reliability.

All semiconductor IP
82
IPs available

AHB-Lite APB4 Bridge

The AHB-Lite APB4 Bridge from Roa Logic is a versatile interconnect bridge designed to facilitate communication between the AMBA 3 AHB-Lite and AMBA APB bus protocols. As a parameterized soft IP, it offers flexibility in adapting to different system requirements, ensuring smooth data transfer between high-performance and low-performance buses. This bridge is crucial for systems that integrate diverse peripherals requiring seamless interaction across varying bus standards. Its design prioritizes efficiency and performance, minimizing latency and maximizing data throughput. The AHB-Lite APB4 Bridge supports extensive customization options to meet specific design criteria, making it suitable for a wide range of applications across different industries. By serving as a conduit between different bus protocols, it plays a central role in maintaining system cohesiveness and reliability. Roa Logic enhances the bridge's usability through detailed technical documentation and supportive testbenches, easing its integration into existing frameworks. Developers can readily incorporate the bridge into their designs, optimizing inter-bus communication and ensuring that system performance remains uncompromised. This bridge exemplifies Roa Logic's dedication to providing robust, adaptable IP solutions for contemporary digital environments.

Roa Logic BV
All Foundries
All Process Nodes
AMBA AHB / APB/ AXI, Embedded Security Modules, I2C, Interlaken, Smart Card
View Details

AHB-Lite Multilayer Switch

The AHB-Lite Multilayer Switch developed by Roa Logic is engineered to provide a high-performance, low-latency interconnect solution for systems using the AHB-Lite bus protocol. This IP is designed to support an unlimited number of bus masters and slaves, ensuring scalability and flexibility in complex system architectures. By enabling efficient data routing, the switch enhances throughput and overall system performance, making it indispensable in data-intensive applications. Capable of handling multiple data paths simultaneously, the multilayer switch ensures that there are no bottlenecks in data flow, facilitating real-time data processing and communication. Its design features are tailored to optimize latency and throughput, effectively addressing the challenges encountered in high-demand environments. Roa Logic provides a comprehensive suite of resources, including thorough documentation and testbench environments, to simplify the integration of this switch into larger system designs. This support ensures that developers can achieve optimal performance with ease, utilizing the switch's capabilities to enhance system interconnectivity and efficiency significantly. The AHB-Lite Multilayer Switch exemplifies the commitment of Roa Logic to provide innovative, responsive solutions that cater to the evolving needs of the semiconductor industry.

Roa Logic BV
All Foundries
All Process Nodes
AMBA AHB / APB/ AXI, Embedded Security Modules, Input/Output Controller
View Details

Polar ID Biometric Security System

Polar ID is revolutionizing biometric security by using meta-optic technology to read the unique polarization signature of human faces. This innovative approach significantly improves security, effectively differentiating between real and fake faces primarily through its precise polarization detection capabilities. The system operates efficiently in all lighting conditions thanks to its near-infrared illumination at 940nm, making it versatile enough for both indoor and outdoor settings. It's designed to be compact, suitable even for smartphones with limited space, and significantly more cost-effective compared to conventional structured light solutions. Polar ID not only enhances security by preventing unauthorized access through spoofing with masks or photos, but it also elevates user convenience through its seamless integration into mobile devices. The absence of bulky notch requirements further underscores its design excellence. Its technological makeup stems from Metalenz's proprietary meta-optics, which allows it to fuse advanced functionality into a single compact system. Additionally, Polar ID eliminates the need for additional optical modules, integrating itself as a single image-based recognition and authentication solution. By adopting a complete system approach, Polar ID is set to redefine digital security across a vast array of consumer electronics, including smartphones and IoT devices. This meta-optic advancement is also projected to enhance future applications, likely extending into secure digital transactions and possibly medical diagnostics, broadening the horizons for secure biometric technology in personal and professional spheres.

Metalenz Inc.
TSMC
28nm
13 Categories
View Details

PQPerform Lattice

Up to 1M KeyEnc/sec with improved power efficiency PQPerform-Lattice is a powerful hardware-based product designed for high throughput, high-performance, and high speed. It adds post-quantum cryptography for applications that typically handle a large number of transactions, such as high-capacity network hardware applications and secure key management HSMs. Optimizable for secure boot, as well as other use-cases, PQPerform-Lattice supports FIPS 204 ML-DSA for quantum-secure digital signature verification, as well as FIPS 203 ML-KEM for quantum key exchange. PQPerform-Lattice supports AXI4, PCIe, and is deployable in multiple instances, making it a powerful solution for existing systems and infrastructure requirements.

Premium Vendor
PQShield
GLOBALFOUNDRIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

Titanium Ti375 - High-Density, Low-Power FPGA

The Titanium Ti375 FPGA presents an advanced solution ideal for developers seeking high-density, low-power configurations. Within its design is Efinix's Quantum compute fabric, which offers superior computational efficiency bundled with a robust I/O interface. Highlighting its versatility, the Ti375 incorporates a hardened RISC-V block, facilitating complex data processing tasks without confining power usage. Additionally, features such as a SerDes transceiver and LPDDR4 DRAM controller mark it as a powerful asset in high-demand environments, ensuring smooth and reliable data transactions. Further empowering its capability is an integrated MIPI D-PHY, making it particularly well-suited for modern applications demanding high-speed data exchange and connectivity.

Efinix, Inc.
GLOBALFOUNDRIES, Samsung, TSMC
28nm
14 Categories
View Details

PUFrt

PUFrt is a fundamental security module that operates as a Hardware Root of Trust, providing a comprehensive suite of features such as PUF-based key generation, true random number generation (TRNG), and secure OTP storage. Designed to integrate seamlessly with a variety of systems, PUFrt shields against tampering and unauthorized access, thereby strengthening the security posture of semiconductor devices. Its compatibility stretches across lightweight security keys to advanced security coprocessors, marking it essential for safeguarding the integrity and authenticity of chips. The module incorporates a robust anti-tamper shell and features a built-in APB controller with secure/non-secure separation, allowing for flexible integration and custom security configurations. With an extensive 8k-bit OTP enhanced by instant hardware encryption, PUFrt supports secure boot processes, ensuring devices operate only with authenticated software. By addressing the core security needs at the hardware level, PUFrt plays a crucial role in mitigating the risks associated with IoT deployments and other connected devices. PUFrt's technical prowess is reflected in features like multi-chip key provisioning and entropy source integration, which are vital for cost-effective security deployments and cryptographic operations. The IP's design not only enhances security but also simplifies integration, making it a preferred choice for manufacturers seeking to bolster their defense mechanisms against hardware-based threats. Coupled with certifications like NIST CAMP and Riscure, PUFrt stands out as a premier choice for robust and reliable hardware security solutions.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

HDCP Encryption-Decryption Engine

Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Secure OTP

Secure OTP by PUFsecurity offers the next generation in secure storage solutions within semiconductor devices. It builds on standard OTP technology by providing enhanced protection mechanisms for key and data storage. Combining physical macro components with digital RTL, Secure OTP offers comprehensive security for data at rest, in use, and during transit. This level of protection is imperative for today’s connected environments, where devices often face sophisticated hardware attacks. One critical aspect of Secure OTP is its ability to integrate seamlessly within a range of IC applications, supporting various interface controllers (I/F) for easy deployment. This integration ensures that sensitive data such as boot codes and cryptographic keys get the robust protection they need, preventing unauthorized access and possible exploitation. With an anti-tamper shell as part of its design, Secure OTP stands as a resilient guardian against attempts to extract or modify data illegitimately. As the security landscape evolves, Secure OTP acts as a pivotal element in transitioning from outdated e-fuse solutions to more impregnable storage systems. This IP essentially forms a crucial part of the defense-in-depth strategy, underpinning secure operations in IoT developments and beyond. Designed to withstand the increasingly rigorous demands of modern security standards, Secure OTP ensures that data integrity and confidentiality are preserved throughout the life cycle of electronic products.

PUFsecurity
Cryptography Cores, Embedded Memories, Embedded Security Modules, Flash Controller, Platform Security, Security Subsystems, SRAM Controller, Standard cell
View Details

Securyzr iSSP

Securyzr iSSP is designed as a comprehensive security management platform, serving as the backbone for protecting embedded devices throughout their lifecycle. The integrated Security Services Platform facilitates a seamless deployment and management experience for users seeking robust security solutions. One of its main components is the Securyzr iSE neo, which functions as the root of trust within the device, offering secure boot processes and key isolation. The platform also incorporates a host software framework that ensures protected communication between the device's secure element, the host chip, and external servers. By integrating these layers, the Securyzr iSSP delivers an end-to-end security service, addressing critical needs such as firmware updates, security monitoring, and comprehensive device identity management. This secure communication backbone is pivotal in safeguarding all transactions across the network infrastructure. Leveraging its status as a PQC (Post-Quantum Cryptography) ready solution, the iSSP anticipates future security needs by integrating advanced cryptographic techniques. This commitment to evolving security practices ensures that users of Securyzr iSSP are equipped to combat both present and future vulnerabilities, keeping their systems ahead in the cybersecurity landscape.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

eSi-Crypto

The eSi-Crypto package provides a robust suite of cryptographic solutions tailored for ASIC and FPGA targets. It features a comprehensive range of encryption and authentication tools optimized for high throughput with minimal resource usage. A standout feature is its high-quality True Random Number Generator (TRNG), which adheres to NIST 800-22 standards, available as a hard macro in specified technologies. This suite also incorporates a variety of cryptographic algorithms including CRYSTALS Kyber and Dilithium, ECC/ECDSA, RSA, AES, and more for enhanced data security in applications like V2X communications. The eSi-Crypto suite is known for deploying sophisticated algorithms that ensure efficient and secure data processing. These include advanced features like support for algorithms such as ChaCha20 and Poly1305, recognized for their high-security margins and efficient computational profiles. The suite's architecture suits networking applications demanding robust encryption and quick processing due to its compatibility with various chip architectures. Leveraging modern cryptographic standards, eSi-Crypto plays a crucial role in defending against quantum computer threats. Its range of supported features signifies its versatility, catering to a wide spectrum of secure communications and transactions. EnSilica’s cryptographic IP is not only secure but also seamlessly integrates with multiple systems thanks to its customizable design framework and support for AMBA APB/AHB or AXI bus interfaces.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Flash Protection Series

The Flash Protection Series by PUFsecurity encompasses a robust suite of solutions designed to safeguard system-on-chip (SoC) components through PUF-based technology. Extending the protective boundary established by the Hardware Root of Trust and Crypto Coprocessor, these protections are applicable to various types of Flash memory, including embedded, NAND, and NOR. By enabling security measures such as component fingerprinting and integrated cryptographic protections, the series ensures that both the hardware and software assets within an SoC are shielded from unauthorized access and manipulation. This capability is crucial for upholding the integrity of embedded firmware and proprietary software, which, if compromised, could lead to significant security breaches. These solutions allow for the expansion of PUF security across an entire chip, ensuring that every layer of architecture, from the physical hardware to the software application, benefits from maximum protection. Through its capacity to integrate seamlessly with existing systems, the Flash Protection Series helps companies meet sophisticated security standards while reducing the risk of intellectual property theft and counterfeiting in high-stakes markets.

PUFsecurity
Embedded Security Modules, Flash Controller, NAND Flash, Platform Security, Security Subsystems, Standard cell
View Details

PQCryptoLib Embedded

Highly-optimized PQC implementations, capable of running PQC in < 15kb RAM PQCryptoLib-Emebedded is a versatile, CAVP-compliant version of PQCryptoLib, PQShield’s CMVP-certified library of post-quantum cryptographic algorithms. With its design focused on ultra-small area efficiency, PQCryptoLib-Embedded has been specifically designed for embedded systems, microcontrollers and memory-constrained devices. It could be the first step towards a hardware solution for providing PQC integration to devices already in the field.

Premium Vendor
PQShield
Cryptography Software Library, Embedded Security Modules
View Details

ReRAM Memory

CrossBar's ReRAM technology offers a revolutionary approach to data storage and processing. This memory technology leverages a simplistic yet powerful structure that employs a top electrode, a switching medium, and a bottom electrode. Upon applying voltage across these electrodes, a filament forms within the switching material, allowing data to be stored in a stable, efficient manner. ReRAM's capability to withstand extreme temperature fluctuations, its impressive cycle endurance, and its data retention over years make it ideal for various robust applications. What sets ReRAM apart is its ability to integrate directly with CMOS processing, facilitating seamless adoption across various semiconductor processes. Its potential to form dense 3D structures for massive data storage on a single chip offers significant advantages in terms of space and power efficiency. The simple device structure allows for incredible simplicity in its integration, providing a scalable memory solution that enhances performance and reduces energy consumption. Additionally, the technology's versatility allows it to serve multiple non-volatile memory functions, including as few-time or one-time programmable (FTP/OTP) memory. It's particularly well-suited for security applications, using its physical structure for the generation of securely encrypted keys within devices. The potential applications for ReRAM span from consumer electronics to highly secure computing systems, marking a new era in memory technology.

CrossBar Inc.
TSMC
12nm, 14nm, 20nm, 28nm
CPU, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile SDR Controller, NAND Flash, SDRAM Controller, Security Processor, SRAM Controller, Standard cell
View Details

PQPlatform Lattice

FIPS 140-3 CAVP-compliant, compact lattice-based hardware PQC engine PQPlatform-Lattice is a compact FIPS 140-3 CAVP-compliant, PQC engine that adds post-quantum support for hardware components and embedded devices, using lattice-based cryptographic algorithms such as ML-KEM (FIPS 203) for post-quantum key exchange, and ML-DSA (FIPS 204) – post-quantum digital signature verification. It provides secure acceleration of lattice-based PQC alongside support for traditional cryptography. Its use cases include strong user authentication, protecting hardware keys, and small-footprint, configurable side-channel protection. PQPlatform-Lattice is designed for minimal area as well as maximum compatibility and can be deployed with optional firmware-backed side-channel countermeasures. It is covered by multiple PQShield implementation patents.

Premium Vendor
PQShield
GLOBALFOUNDRIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

PQPlatform SubSys

Fully autonomous, FIPS 140-3 CAVP compliant PQC subsystem PQPlatform-SubSys is a cryptographic subsystem, designed to provide offloaded cryptographic services with minimal integration effort and full autonomy from an existing security subsystem, as well as configurable side-channel protection. These services include post-quantum signature generation, verification, and secure key establishment. It’s built with optimal performance in mind, as well as crypto agility with its provision of traditional, PQ/T hybrid and fully post-quantum algorithms. PQPlatform-SubSys uses its built-in RISC-V CPU independently from the surrounding system, allowing cryptographic services to be offloaded efficiently from the system processor.

Premium Vendor
PQShield
Samsung
12nm
Cryptography Cores, Embedded Security Modules
View Details

Secure Protocol Engines

The Secure Protocol Engines offer high-performance IP modules focused on efficient network and security processing. These engines are critical for applications requiring strict adherence to security protocols while managing data flow in a secure manner. By offloading the processing burden from host processors, these engines optimize throughput and maintain secure data transmission across various digital communication infrastructures. These engines support a wide array of protocols and are designed to integrate seamlessly into System-on-Chip environments, whether using FPGA or ASIC implementations. Their architecture prioritizes speed, security, and reliability—key components needed to meet the demanding standards of modern communications networks. By employing advanced cryptographic routines and stringent protocol compliance measures, Secure Protocol Engines facilitate secure interactions between network components. This enables businesses to enhance their security posture without compromising on performance, providing a resilient solution that scales with evolving network demands.

Secure-IC
AMBA AHB / APB/ AXI, CXL, DSP Core, Embedded Security Modules, Ethernet, I2C, IEEE1588, RapidIO, Security Protocol Accelerators, USB, V-by-One
View Details

Securyzr Key Management System

The Securyzr Key Management System is crafted to systematically handle cryptographic keys throughout their lifecycle within secure environments. Ensuring the security of keys involves rigorous management practices, from their generation and storage to distribution and eventual destruction. This management system employs robust protocols to maintain the confidentiality, integrity, and availability of cryptographic keys, vital for securing communications and data access. By automating key lifecycle events, the system reduces the risk of human error while ensuring strict adherence to security policies and standards. Offering a mixture of flexibility and high-level security assurance, the Securyzr Key Management System is ideal for integration into various organizational infrastructures, from enterprise applications to government operations, where secure key management is paramount.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

RISC-V CPU IP NS Class

The NS Class RISC-V CPU IP by Nuclei is ingeniously designed for applications emphasizing security and financial technologies, as well as IoT security. This IP offers a balanced blend of high-performance processing and specialized features aimed at safeguarding data integrity and promoting secure transaction environments. By leveraging a 32-bit architecture, the NS Class is particularly well-suited to applications requiring reliable secure processing capabilities. Equipped with state-of-the-art security extensions, the NS Class IP features trusted execution environments that are crucial for maintaining data security and integrity during operations. Developers can also exploit user-defined instruction extensions to customize security protocols according to specific applications, ensuring the highest level of data protection possible. The NS Class also accommodates a variety of RISC-V extensions, further enhancing the IP's adaptability to modern security-centric applications. With strong support in terms of an integrated toolchain and developmental infrastructure, Nuclei positions this IP as a solution that not only meets current IoT and fintech security requirements but is also adaptable for future developments in secure processing technologies.

Nuclei System Technology
CPU, Cryptography Cores, Embedded Security Modules, Microcontroller, Platform Security, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

Individual IP Core Modules

The Individual IP Core Modules offer a suite of cryptographic solutions that adhere to the latest NIST PQC standards. Included algorithms like Dilithium, Kyber, and XMSS/SPHINCS+ provide robust security foundations. These modules are built for diverse use cases, delivering secure data processing and transmission while featuring AES encryption modes and secure random number generation. Perfect for developers seeking comprehensive, modular cryptographic elements for integration into larger systems.

ResQuant
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

PQPlatform CoPro

FIPS 140-3 CAVP-compliant, compact PQC hardware acceleration for subsystems PQPlatform-CoPro combines hash-based and lattice-based post-quantum cryptography that can be added to an existing security subsystem. It can be optimized for minimum area, maintaining high-performance, and is designed to be run by an existing CPU using PQShield-supplied firmware, meaning it involves low integration effort and flexible configurations to support a wide variety of use cases, including quantum-safe secure boot. Solutions are available for hardware acceleration of SHA-3, SHAKE, ML-KEM, ML-DSA, alongside traditional cryptography. In addition, PQPlatform-CoPro can be configured with side-channel protection. PQPlatform-CoPro is covered by multiple PQShield implementation patents.

Premium Vendor
PQShield
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

Human Body Detector for Ultra-Low-Power

The Human Body Detector from Microdul AG is an ultra-low-power sensor designed to significantly enhance energy efficiency in wearable devices. It operates by detecting the presence of a human body, thus enabling devices to switch to low-power modes when not in use. This functionality is particularly beneficial for devices like fitness trackers and smartwatches, where conserving battery life is crucial. The sensor's static operation capability further aids in reducing unnecessary power consumption, ensuring that devices remain operational for extended periods. Utilizing advanced sensing technology, this detector provides reliable performance even in dynamic environments. Its compact design makes it suitable for integration into various wearable formats without compromising on comfort or functionality. The sensor's versatility ensures adaptability across a wide range of applications, enhancing device functionality through intelligent power management. Ideal for IoT and wearable applications, the Human Body Detector stands out due to its efficiency and precision. With Microdul's expertise in ultra-low-power design, this sensor is crafted to meet the demands of modern device users who require durable and energy-efficient solutions.

Microdul AG
Embedded Security Modules, Sensor, Temperature Sensor, Wireless Processor
View Details

AON1100

The AON1100 is a leading AI chip built for efficient voice and sensor processing tasks, offering exceptional performance with under 260μW power usage. It achieves a 90% accuracy level even in sub-zero decibel noise environments. Ideal for devices that require continuous sensory input without significant power drain, it is designed to function seamlessly in demanding acoustic environments, optimizing both performance and power.

AONDevices, Inc.
11 Categories
View Details

ReRAM IP Cores for Embedded NVM in MCU & SOCs

CrossBar's ReRAM IP Cores for Embedded NVM represent a leap forward in non-volatile memory technology for use in microcontrollers and System-on-Chip (SoC) devices. These IP cores are distinguished by their capacity for multi-time programming, making them a superb choice for applications where high-performance, low-latency memory is critical. The ReRAM technology meets the requirements for today's embedded systems by operating efficiently at advanced process nodes starting from 28nm down to below 10nm. The ReRAM IP Cores are known for their capability to handle large data storage and run efficient code execution while maintaining low energy consumption. This technology exceeds the performance of traditional flash memory, with superior endurance and retention capabilities, making it an excellent fit for demanding industrial, automotive, and high-frequency consumer electronics that call for reliable memory solutions. Furthermore, these cores are engineered to be robust, dealing efficiently with diverse environmental conditions, ensuring data integrity and security. The ReRAM's design also includes options for incorporating secure physical unclonable function (PUF) keys, further enhancing its suitability for secure computing applications. CrossBar's technology thus enables a new wave of intelligent, secure, and low-power electronic devices.

CrossBar Inc.
TSMC
12nm, 14nm, 20nm, 28nm
CPU, Embedded Memories, Embedded Security Modules, Flash Controller, Mobile DDR Controller, Mobile SDR Controller, NAND Flash, SDRAM Controller
View Details

NVM Defender

NVM Defender is a pioneering hardware module designed to safeguard integrated circuits (ICs) from common invasive attacks such as non-volatile memory (NVM) code extraction. This innovative solution emphasizes security by design, creating a self-aware environment that detects potential breaches automatically. The inherent structure of NVM Defender makes bypassing any security measures impractical, ensuring comprehensive protection against emulation, cloning, and counterfeiting attempts. Suitable for chipmakers seeking robust security solutions, NVM Defender effectively protects embedded software, cryptographic keys, and personal data, integrating seamlessly into any chip architecture to offer a cost-effective countermeasure against unauthorized data access.

Texplained
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

PUFcc

PUFcc is a versatile Crypto Coprocessor built on PUFsecurity's Hardware Root of Trust technology. It merges key generation, storage, and a comprehensive suite of cryptographic algorithms into a single, easily deployable IP block. This integration simplifies the development of secure systems, providing features like Secure Boot, TLS, OTA, and robust key management. The IP supports a range of cryptographic functions certified under NIST CAVP and OSCCA, tailored for flexible security applications across IoT devices and beyond. It is engineered to achieve seamless integration with SoC designs, using standard interfaces such as AXI and APB for efficient memory access. The PUFcc also promotes extended security boundaries that include external flash components, enhancing the protection spectrum across entire systems. With its feature-packed architecture, PUFcc proves critical in tackling the security demands of interconnected devices. By embedding hardware-level defense mechanisms, PUFcc positions itself as a cornerstone for developing resilient devices in an era characterized by sophisticated cyber threats. Its built-in protections against cloning and other forms of unauthorized exploitation make it indispensable in fortifying the security of next-generation electronic products.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Post-Quantum Cryptography IP

Post-Quantum Cryptography IP represents a forward-looking approach to cryptographic security, designed to protect against the potential threats posed by quantum computing. This IP incorporates novel algorithms developed to withstand the unique challenges introduced by quantum computational capabilities. This suite of cryptographic solutions is engineered to be resilient against the theoretical potential of quantum computers breaking conventional cryptographic systems. Incorporating these technologies into existing systems ensures that sensitive data is secured even as computation power and methodologies evolve. The Post-Quantum Cryptography IP is indispensable for users seeking future-proof security architectures, providing an assurance that their cryptographic functions will remain secure against the quantum threats of tomorrow.

Secure-IC
3GPP-5G, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AON1020

Designed for both voice recognition and sensor applications, the AON1020 integrates the AONSens Neural Network cores. It features capabilities such as multi-wake-word detection, context awareness, and sensor applications including human activity detection. Delivered in Verilog RTL, it is well-suited for ASIC and FPGA implementations, providing exceptionally low-power operation ideal for always-on listening scenarios. It delivers highly accurate performance amid noisy conditions, making it a comprehensive solution for various sensor-driven applications.

AONDevices, Inc.
AI Processor, Audio Processor, CPU, DSP Core, Embedded Memories, Embedded Security Modules, Multiprocessor / DSP, Processor Core Dependent, Processor Cores, Vision Processor
View Details

Ultra-High Throughput 8/10/12-bit JPEG Encoder

Alma Technologies' Ultra-High Throughput 8/10/12-bit JPEG Encoder is crafted for top-tier compression performance, designed to manage high-resolution images with remarkable speed. This encoder supports both 8-bit standard-compliant and extended 10/12-bit lossless and lossy compression, making it versatile enough to handle a multitude of professional imaging needs across different sectors like broadcasting, medical imaging, and space exploration. The architecture of this encoder emphasizes parallel processing capabilities, allowing it to maintain high throughput rates even with the most demanding image resolutions. By employing a scalable engine framework, it delivers unprecedented compression speeds while preserving exceptional image quality, thereby providing visually lossless outputs that maintain the original image integrity across various compression settings. Integration into both FPGA and ASIC systems is seamless, thanks to its system-independent design, which supports flexible interfacing and low-resource utilization. The encoder is optimized to accommodate adjustable data flows and manage real-time processing requirements without sacrificing efficiency. This makes it an invaluable resource for applications needing rapid data processing and transmission without compromising quality,"category_ids":[283], "supported_process_nodes":[], "tech_specs":[],"features":[],"applications":[],"part_number":null,"power_watts":null,"supply_voltage_volts":null}],"company_country_iso_code":null,"services":["soft-ip","custom-ip"],"outsourcing_services":[]} ​This versatile JPEG IP core by Alma Technologies is designed to facilitate high-speed compression of images, supporting 8-bit baseline and 10/12-bit extended modes. Catering specifically to both standard and advanced image compression needs, these cores effectively handle diverse data formats including grayscale and full color with various chroma subsampling options like 4:4:4, 4:2:2, and 4:2:0. The IP cores deliver exceptional performance through lossless or configurable lossy compression, making them adaptable to different application requirements, whether they are for high-quality imaging or storage-efficient compression solutions. Despite the complex demands of high-speed image processing, these JPEG cores maintain a streamlined operation with an intuitive interface that supports user control over the compression process without requiring significant computing resources. Additionally, their robust rate control mechanisms ensure consistency across frames, providing reliable quality maintenance even at different compression levels. Moreover, the IP core's flexible architecture allows for seamless integration into existing systems, with well-balanced power and space consumption. This makes them ideally suited for implementation in both FPGA and ASIC platforms, guaranteeing impressive reliability and outstanding image fidelity, supporting a wide range of mixed-media applications across industries. Please include this elsewhere. The AES Block Cipher IP has already been modernized. Also, it seems like only the JPEG encoder has been featured. I could review the rest of the website. vulnerabilities across the H.264 suite. Perhaps the JPEG LS Encoder and its parts. Alma Technologies' AES Block Cipher IP is designed to provide high-performance encryption and decryption capabilities essential for secure data transmission. This IP core supports a wide range of cipher modes, including ECB, CBC, CFB, OFB, CTR, and GCM, accommodating various encryption standards while maintaining flexibility and efficiency. Its robust architecture ensures effective performance, enabling the integration of secure communication protocols into hardware devices without compromising speed or security. 11 These AES cores are crafted to offer top-notch encryption ability, emphasizing compact design suitable for both FPGA and ASIC implementations. The modular framework of the AES IP allows for easy updates and adaptations to meet changing security landscapes without extensive system overhauls. The integration of these cores guarantees adherence to stringent data security requirements, making them ideal for use in sensitive applications such as secure communications, financial transactions, and personal data protection. Ease of use is a significant feature of this IP, supported by a straightforward interface that simplifies its implementation into existing systems. Its design considers low power consumption while ensuring high throughput rates, offering an optimal balance of energy-efficiency and encryption performance. This makes it a suitable addition for any security-centric applications demanding superior confidentiality mechanisms in data handling processes.9 Alma Technologies' Ultra-High Throughput 8/10/12-bit JPEG Encoder is crafted for top-tier compression performance, designed to manage high-resolution images with remarkable speed. This encoder supports both 8-bit standard-compliant and extended 10/12-bit lossless and lossy compression, making it versatile enough to handle a multitude of professional imaging needs across different sectors like broadcasting, medical imaging, and space exploration. The architecture of this encoder emphasizes parallel processing capabilities, allowing it to maintain high throughput rates even with the most demanding image resolutions. By employing a scalable engine framework, it delivers unprecedented compression speeds while preserving exceptional image quality, thereby providing visually lossless outputs that maintain the original image integrity across various compression settings. Integration into both FPGA and ASIC systems is seamless, thanks to its system-independent design, which supports flexible interfacing and low-resource utilization. The encoder is optimized to accommodate adjustable data flows and manage real-time processing requirements without sacrificing efficiency. This makes it an invaluable resource for applications needing rapid data processing and transmission without compromising quality. 8 Easy setup with appropriate provisions was placed. Other relevant IP, such as the AES Block Cipher IP, for wider applicability should be added. Do ensure that the data is clean and structured. Please return the other parts. PIECE GLOSSESSphinx Publishing ":[5270]  The AES Block Cipher IP is modernized in strategies. According to their desired configurations, adapting a non-portable blocking access and utilizing modern processing techniques. Alma Technologies' AES Block Cipher IP offers high-performance encryption and decryption capabilities essential for secure data transmission. This IP core supports multiple cipher modes including ECB, CBC, CFB, OFB, CTR, and GCM, enabling compatibility with various secure applications while maintaining flexibility and efficiency. Its comprehensive architecture ensures strong performance, facilitating the integration of secure communication protocols into devices without compromising speed or security. The AES cores emphasize a compact design suitable for both FPGA and ASIC implementations, offering superior encryption capabilities with customizable settings. The IP accommodates various updates and security adaptations without requiring significant system overhauls, adhering to strict data encryption standards. Designed with ease of use in mind, these cores feature straightforward interfaces for seamless integration. High throughput rates are maintained alongside low power consumption, making them an optimal choice for applications requiring robust data protection like secure communications and financial transactions.8clusion.9ging. Easy_trans!setup with appropriate provisions was pla...

Alma Technologies
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, JPEG
View Details

NeoPUF

NeoPUF technology harnesses the unpredictability and uniqueness of physical variations formed during chip manufacturing to create a highly secure root of trust. This technology is crucial in providing secure keys and authentication for applications needing strong security frameworks, such as IoT and mobile communications. NeoPUF's ability to generate cryptographic keys without storing them aims to protect data from unauthorized access and cloning, making it highly valuable for devices requiring elevated security standards.

eMemory Technology Inc
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Capacitive Proximity Switch for Energy Efficiency

Microdul AG offers a Capacitive Proximity Switch designed to maximize energy efficiency in electronic devices. This ultra-low-power switch leverages capacitive touch technology to detect user interaction, providing seamless operation for a variety of applications. By reliably sensing touch or proximity, the switch can serve as an effective tool for power management, turning devices on or into sleep mode based on user activity. This approach not only conserves energy but also enhances user experience by allowing intuitive device operation. The proximity switch is suitable for implementing simple user interfaces requiring only single or multiple touch points, such as sliders or virtual buttons. Its capacity to function in both standalone and integrated system environments makes it a versatile component in the design of modern electronics, particularly those relying on battery efficiency and extended operation times. Engineered with precision by Microdul, this switch supports enhanced functionality in devices across various sectors, including consumer electronics and industrial control. With the company's deep expertise in microelectronics, customers can rely on this switch to deliver both performance and energy savings.

Microdul AG
Clock Generator, Embedded Security Modules, Input/Output Controller, LCD Controller, Peripheral Controller, Sensor, Temperature Sensor, USB
View Details

SiFive Automotive

The SiFive Automotive portfolio is engineered for top-tier applications within the automotive sector, bringing robust processing capabilities to vehicles. These solutions are tailored for advanced systems such as in-vehicle infotainment, driver-assistance, and other critical automotive applications, providing both high-end application processors and real-time solutions. With a focus on safety and performance, these automotive cores are designed for high reliability and efficiency, incorporating key certifications like ISO 26262 ASIL B and D. These processors provide support for both infotainment and safety-critical systems within vehicles, ensuring a blend of high performance and minimal energy consumption. Through leveraging SiFive’s RISC-V expertise, the Automotive series accommodates rigorous industry demands, offering a scalable platform from basic microcontrollers to high-performance compute solutions. This adaptability presents a reliable solution for automotive manufacturers seeking to enhance technology and safety in modern vehicles.

SiFive, Inc.
Building Blocks, Embedded Security Modules, LIN, Microcontroller, Multiprocessor / DSP, Processor Cores, Safe Ethernet
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator is designed to adapt to specific client needs, offering a broad spectrum of configurability. It integrates seamlessly with all NIST PQC standards, including Dilithium and Kyber, while allowing the extension of additional algorithms, even custom ones. This accelerator ensures robust processing with adjustable performance and size, delivering resilience against differential power analysis (DPA), timing, and side-channel attacks. Compatible with AXI4, the solution emphasizes versatility and security, making it an ideal choice for organizations seeking tailored cryptographic solutions.

ResQuant
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

AON1000

The AON1000 is a cutting-edge AI processing engine that excels in wake word detection, voice commands, acoustic event detection, and speaker identification, specifically designed for low-power, high-accuracy operations. It boasts superior performance in noisy surroundings by using proprietary neural network architectures and inference algorithms. This IP can be deployed within standalone chips or integrated into sensors like microphones. Its ultra-low power design allows other processors to remain in idle mode during always-on listening states, optimizing power consumption without compromising accuracy.

AONDevices, Inc.
AI Processor, Audio Processor, CPU, DSP Core, Embedded Memories, Embedded Security Modules, Multiprocessor / DSP, Processor Core Dependent, Processor Cores, Vision Processor
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

QDID PUF

The QDID PUF provides a unique identity based directly on quantum effects observed in standard CMOS processes. These identities are inherently secure due to the randomness that originates from variations in device oxide thickness and defect distribution. By leveraging such inherent unpredictability, QDID PUFs form a robust basis for hardware root-of-trust. This IP simplifies secure provisioning by avoiding traditional factory-based key injections, thereby reducing reliance on external secure manufacturing processes. QDID PUFs also ensure that identities are not stored in memory, instead being generated dynamically. This characteristic defends against side-channel attacks exploiting memory vulnerabilities. Additionally, the high entropy of the quantum effects they harness offers robust resistance to machine learning-based entropy source attacks, generating customizable security seeds up to 256 bits. Boosting its security, the QDID PUF integrates strategic countermeasures against side-channel attacks and has been certified to comply with stringent standards like PSA Level 2 and CC EAL4+. It supports wide-ranging environmental conditions and boasts extensive process node compatibility with major fabrication technologies. Typically used for key generation and device authentication, it represents the vanguard of cryptographic consistency for post-quantum applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 16nm, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

AES Crypto

The AES Crypto core by Dillon Engineering offers robust encryption and decryption capabilities consistent with the Federal Information Processing Standard (FIPS) 197. Developed using the ParaCore Architect™ utility, this IP core can be precisely tailored to meet diverse throughput, size, and performance needs, making it an ideal solution for modern cybersecurity applications. With data throughput capabilities up to 12.8 Gb/s, this core supports several encryption modes, including ECB, CBC, CFB, OFB, and CTR. Its high adaptability allows dynamic key changes without incursions in throughput, making it flexible for various encryption tasks. The core is fully compliant with NIST standards and can function in both standalone and integrated encryption/decryption modes. This AES Crypto core, available in generic HDL or targeted EDIF formats, is easily integrable into different design architectures, whether for FPGA or ASIC environments. It is suited for applications demanding robust security measures, providing dependable encryption performance across a plethora of processing needs.

Dillon Engineering, Inc.
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

PUFhsm is a sophisticated Embedded Hardware Security Module designed for automotive chips and complex applications requiring high-level security compliance. It acts as an isolated security enclave, featuring a dedicated CPU, cryptographic engines, and multifunctional software modules. These components work collectively to deliver secure operations across various critical processes such as secure boot, secure updates, and lifecycle management. Complying with the EVITA-Full standard, PUFhsm provides unparalleled protection against advanced threats targeting automotive systems. The module’s architecture supports seamless integration with PUFrt, enhancing tamper resistance and secure key storage, while promoting a streamlined design process through standardized protocols. The flexibility and scalability of PUFhsm allow designers to address and meet rigorous security requirements efficiently, without detracting from system performance. Its comprehensive suite of features makes it an invaluable tool for developers aiming to optimize security in high-reliability domains, accelerating time-to-market for cutting-edge applications in automotive and beyond.

PUFsecurity
Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

CANsec Controller Core

The CANsec Controller Core is engineered to deliver secure data transmission for automotive and industrial environments. It implements the CAN in Automation (CiA) specification for secure communications, enhancing data protection on standard CAN networks. The controller core offers a flexible architecture that supports multiple CAN networks, providing mechanisms for secure key management and message encryption. This makes it ideal for applications that require high levels of security to protect against data interception and malicious attacks. With CANsec, systems benefit from both the reliability of traditional CAN communications and the enhanced security features that meet modern cybersecurity standards. This robust security feature set ensures the integrity and confidentiality of data transmissions across connected devices and infrastructure.

Fraunhofer Institute for Photonic Microsystems (IPMS)
CAN, CAN XL, CAN-FD, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Temperature Sensor
View Details

FortiCrypt

FortiCrypt stands as a cornerstone in FortifyIQ's portfolio, offering cutting-edge protection solutions for cryptographic integrity. This product is intricately designed to withstand both side-channel and fault injection attacks, vital for secure deployments across various tech environments. Utilizing advanced distributed pipeline architecture, the ultra-high bandwidth core delivers performance in the range of hundreds of Gbps, making it ideal for applications demanding intense data throughput without compromising security. The IP core’s innovative structure ensures minimal impact on latency, allowing real-time secure processing that parallels unsecured implementations in speed. Through sophisticated masking techniques, FortiCrypt maintains operational efficiency while safeguarding sensitive cryptographic information. Its compatibility extends across multiple hardware platforms, affirming its adaptability to diverse industrial needs. FortiCrypt's implementation is a testament to FortifyIQ's commitment to high-security standards that do not succumb to traditional overhead constraints. These attributes bolster its application in fields such as financial encryption systems, secure communication networks, and other critical sectors that demand heightened data protection.

FortifyIQ
Content Protection Software, Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

NeoFuse

NeoFuse is a cutting-edge anti-fuse OTP silicon IP, engineered to provide secure and high-yield embedded memory solutions. Designed for advanced and more-than-Moore technology nodes, NeoFuse is integral for applications requiring reliable and tamper-resistant memory options. It’s particularly beneficial in environments demanding enhanced data security and authentication, making it a preferred choice for automotive and mobile devices. NeoFuse's ability to maintain data integrity throughout a device’s lifecycle highlights its essential role in semiconductor applications.

eMemory Technology Inc
Coder/Decoder, Embedded Memories, Embedded Security Modules, Flash Controller, Platform Security
View Details

MIFARE Certification Technologies

MIFARE Certification Technologies offers a suite of solutions to ensure that smart card and reader products adhere to stringent ISO/IEC standards. This technology facilitates interoperability across diverse devices, enhancing security and reliability for data transmission in various applications. It is tailored to assess compliance, providing clients confidence in their product’s performance and compatibility in the global market, especially in sectors where secure data exchange is pivotal. Employing robust testing protocols, the certification technology aids manufacturers in identifying potential vulnerabilities, thereby mitigating risk and fortifying the safety of transactions. The technology proves indispensable in areas such as public transport ticketing, corporate security systems, and cashless payments, ensuring seamless and secure data handling. This certification process underpins the credibility and quality of products, significantly decreasing integration issues. It supports a comprehensive verification method, certifying that ambiguities are mitigated from the outset, and performance standards are continually met. Each product undergoes rigorous testing to affirm its compatibility, enhancing confidence in deploying smart technologies across different platforms.

LSI-TEC
DDR, Embedded Security Modules, USB, V-by-One
View Details

Suite-Q HW

Suite-Q HW is a comprehensive system-on-chip design featuring a suite of standardized cryptographic protocols essential for secure communication. Built for both high-end servers and low-end embedded systems, Suite-Q HW incorporates a unique hardware accelerator that performs efficient symmetric and asymmetric cryptographic operations. This system targets the diverse processing demands of different hardware environments, with distinct configurations based on processor core selection, connectivity options, and clock frequency adjustments. The Suite-Q HW solution integrates several cryptographic standards, including classical public-key cryptography like ECDSA and post-quantum cryptography methods such as isogeny-based and lattice-based cryptography. It ensures enhanced execution efficiency by offloading compute-intensive tasks, featuring a True Random Number Generator (TRNG) compliant with NIST standards, along with classical algorithms like AES and SHA, and emerging post-quantum schemes. Its capability for CPU offload alongside optional Differential Power Analysis (DPA) countermeasures makes it a flexible choice for a range of applications. Designed for ease of integration across SoC and FPGA architectures, Suite-Q HW brings substantial power savings and validated security measures. With built-in testbenches and known-answer test vectors, developers are equipped with essential tools for verification and synthesis. These features combined position Suite-Q HW as an ideal scalable architecture ready to meet the performance and security demands of both current encryption standards and future quantum-safe protocols.

PQ Secure Technologies, LLC
10 Categories
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator dedicated to cryptographic hashing operations. Offering high throughput and area efficiency, it adheres strictly to the NIST FIPS 202 standard. This engine supports the full range of SHA-3 hash functions and extendable output functions (XOFs) like SHAKE-128 and SHAKE-256. Its robust design ensures protection against timing-based side channel attacks, making it ideal for secure communications, e-commerce, blockchain, and data storage applications. Completely verified and built for integration, it supports single clock domain operations. Beyond its compliance and security features, the SHA-3 Crypto Engine is optimized for both FPGA and ASIC implementations. It leverages synchronous designs and integrates smoothly with systems via the AMBA AXI4-Stream interface. The engine’s resource efficiency paired with its performance capabilities make it a reliable choice for any application demanding rigorous data integrity and authentication processes. Extensive documentation and support services are available, enhancing the ease of adoption and scale-up within various industrial settings. The versatility of this engine is underscored by its approved applications in Message Authentication Codes (MAC), IPsec and IKE protocol engines, secure boot operations, and more. With a streamlined deployment process and comprehensive support, the SHA-3 Crypto Engine is equipped to handle the complex security needs of modern digital applications.

KiviCore
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library that aims to optimize the implementation of security protocols through efficient code size, stack usage, and performance adaptations. Available in both portable C and optimized assembly languages, Suite-Q SW targets a range of embedded processors and microcontrollers, from 8-bit to 64-bit architectures. This makes it an excellent choice for devices with limited memory seeking to incorporate robust cryptographic functions without compromising on valuable application space. Supporting development across multiple environments, Suite-Q SW provides simple plug-in modules tailored for ease of use and integration. The software is engineered to support hardware acceleration, offering a selection of speed versus memory size configurations to match specific application requirements. Its libraries are both fully portable and configured to accommodate hardware offloading needs, assisting developers in meeting diverse performance obligations. An essential part of PQ Secure's cryptographic offering, Suite-Q SW is designed with scalability in mind, providing validations tests and performance metrics to ensure reliable implementation across varied systems. Whether for general-purpose applications or embedded devices, the Suite-Q SW library ensures organizations can maintain security best practices effortlessly, adapting as technology and security threats evolve.

PQ Secure Technologies, LLC
Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Subsystems
View Details

MACSec

CoMira Solutions offers a Media Access Control Security (MACSec) solution adhering to IEEE standards aimed at safeguarding communication within 802.1 LAN environments. MACSec ensures data confidentiality and integrity, preventing unauthorized access and disruptions. It employs advanced encryption standards and supports flexible traffic management through various port configurations. The MACSec IP's time-division multiplexed architecture aligns seamlessly with CoMira's UMAC, ensuring synchronous operation despite differing link speeds. This implementation includes FIPS-compliant encryption methods such as GCM-AES-128 and GCM-AES-256, supporting robust security needs. Furthermore, CoMira's MACSec supports multiple secure channels and security associations per port, adding layers of protection to client systems. The configurability of Secure Channels and the ability to strip security tags enhances its adaptability in varied networking scenarios, reflecting CoMira's commitment to delivering tailor-fit security solutions.

CoMira Solutions
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

ReRAM IP Cores for High-Density Data Storage

Targeting the new demands of data-heavy applications, CrossBar's ReRAM IP Cores for High-Density Data Storage deliver unparalleled performance for high-capacity memory applications. These IP cores are crafted to meet the rigorous requirements of storage-intensive environments such as data centers, mobile computing, and artificial intelligence systems, providing a high-density, low-latency memory solution that exceeds the capabilities of traditional storage technologies. The High-Density Data Storage Cores leverage 3D stacking capability, which allows CrossBar to enhance storage capacity significantly, reaching up to 1TB NV-DIMM configurations with superior read performance and power efficiency. This makes them highly advantageous for large-scale data operations requiring rapid access times and robust storage solutions. CrossBar's technology is versatile and supports various advanced semiconductor processes, enabling customization and architectural flexibility to meet specific application needs. These cores not only bolster performance and reduce power consumption but also support secure PUF key deployment for applications where data security is of paramount importance. The versatility and advanced features of these cores are crafted to empower the next generation of data storage solutions.

CrossBar Inc.
TSMC
12nm, 14nm, 20nm, 28nm
Embedded Memories, Embedded Security Modules, Flash Controller, NAND Flash, Other, SDRAM Controller
View Details

ReRAM as FTP/OTP Memory

ReRAM as FTP/OTP Memory by CrossBar provides a flexible non-volatile memory solution that caters to applications requiring secure memory functionality. This technology is an extension of CrossBar's standard ReRAM and offers two approaches to memory programmability: MTP compatible Few-Time Programmable (FTP) and One-Time Programmable (OTP) solutions. This adaptability allows for the design of memory configurations according to specific application needs, optimizing performance and cost. This IP is particularly well-suited for high-security environments where data integrity and endurance are vital. CrossBar’s ReRAM-based FTP/OTP technology can be integrated seamlessly into various semiconductor processes, delivering advantages such as reduced die area and cost without sacrificing memory endurance. It supports a broad range of applications, from automotive to consumer electronics, providing robust memory solutions customized for the unique demands of each industry. The integration of secure Physical Unclonable Function (PUF) keys within the ReRAM memory architecture reinforces security, making it a staple for systems requiring secure key storage and cryptographic functionality. CrossBar's ReRAM memory solutions enhance the security and efficiency of embedded systems, delivering a versatile and reliable memory choice.

CrossBar Inc.
TSMC
12nm, 14nm, 20nm, 28nm
Cryptography Cores, Embedded Memories, Embedded Security Modules, Flash Controller, HBM, Mobile DDR Controller, Mobile SDR Controller, NAND Flash
View Details

Specialty ESD

Specializing in ESD protections, Certus Semiconductor offers highly adaptive solutions that meet various operational demands. These circuits provide enduring defense against ESD threats, surpassing traditional HBM and CDM specifications. Capabilities include low capacitance solutions and customized protections tailored to endure voltages between -18V to +30V. These ESD circuits are integrated with specialized features like Rad-Hard technology, high-temperature resilience, and enhanced burst immunity, setting a standard for highly secure semiconductor solutions in harsh environments.

Certus Semiconductor
TSMC
55nm
Embedded Security Modules, Power Management, Sensor
View Details

HPC Platform

SEMIFIVE's HPC Platform is engineered to meet the demanding requirements of high-performance computing, combining powerful processing capabilities with robust infrastructure to handle large-scale computations efficiently. Utilizing ARM Cortex cores alongside cutting-edge memory interfaces, this platform targets expansive applications such as cloud servers and network processors. The platform's architecture is optimized for hyperscale data centers, providing PCIe Gen5 interfaces and advanced support for DDR6 memory modules. This configuration facilitates the rapid processing of high volumes of data while maintaining enhanced power efficiency and operational reliability. Aimed at accelerating developments in AI and network computing, the HPC Platform supports a scalable, high-throughput environment essential for modern computational challenges. It allows flexibility in design and scalability, ensuring that businesses can develop solutions that adapt to evolving technological landscapes while achieving optimal performance.

SEMIFIVE
2D / 3D, CPRI, CPU, Embedded Security Modules, Ethernet, Multiprocessor / DSP, Processor Core Dependent, Processor Core Independent, Vision Processor, Wireless Processor
View Details

AI in Business Intelligence

Gyrus AI's offering in Business Intelligence harnesses cutting-edge AI technologies to transform the landscape of enterprise analytics. This solution interfaces seamlessly with business data layers to provide actionable insights, enhancing decision-making processes across organizational levels. By integrating with existing AI and ML frameworks, it draws on vast amounts of data, processing it to reveal patterns and predictive insights that drive strategic business outcomes. The AI in Business Intelligence solution is designed to handle large datasets efficiently, utilizing machine learning models to automate the data processing and analysis pipeline. With its capacity to quickly generate detailed visual and textual summaries, businesses can achieve enhanced visibility over operations and market trends, aiding in more informed and timely decision-making. This capability empowers organizations to stay agile and responsive in today's fast-paced economic environment. Its AI-powered analytics is implemented using intuitive dashboards and reporting tools that are user-friendly, allowing multiple stakeholders to glean insights without the need for deep technical expertise. This democratization of data intelligence significantly increases the utility and accessibility of business analytics, providing a competitive edge through data-driven strategy formulation and execution.

Gyrus AI
AI Processor, Coprocessor, Embedded Security Modules, Processor Core Dependent
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt