Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Security Protocol Accelerators

Security Protocol Accelerators Semiconductor IP

Security Protocol Accelerators are crucial components within the realm of semiconductor IP, designed to boost the performance of security protocols in various applications. These accelerators play a pivotal role in enhancing the speed, efficiency, and reliability of data encryption and decryption processes, which are fundamental for secure communications and transactions across networks. By implementing specialized hardware for protocol acceleration, these semiconductor IPs offer significant improvements in processing speed compared to software-only solutions.

One of the primary uses of Security Protocol Accelerators is in network security devices, including routers, firewalls, and VPNs, where they ensure secure communication by accelerating tasks such as data encryption and IPsec processing. As data breaches and cyber threats continue to evolve, the demand for robust and efficient security solutions has never been higher. These accelerators enable the optimization of cryptographic operations, providing enterprises and individuals with the confidence that their sensitive data is well-protected during transmission.

In consumer electronics like smartphones, tablets, and smart home devices, security protocol accelerators are key to maintaining user privacy without compromising on performance. They ensure that devices can handle complex security tasks quickly, extending battery life and maintaining seamless user experiences. Whether it’s ensuring the security of cloud-based services or protecting communications over Wi-Fi and cellular networks, these semiconductor IPs are increasingly vital in an interconnected world.

Moreover, the rise of IoT devices and edge computing has expanded the need for security protocol accelerators. With the massive data exchange happening at the edge of networks, having efficient security IPs ensures not just the safety of the data but also compliance with regulatory standards. As companies continue to push for innovations in AI and machine learning, the integration of security protocol accelerators in their systems helps to safeguard intellectual property and sensitive algorithms, thereby maintaining a secure operational environment. Through leveraging these semiconductor IPs, creators can focus on innovation while relying on proven security foundations.

All semiconductor IP

Akida 2nd Generation

The Akida 2nd Generation represents a leap forward in the realm of AI processing, enhancing upon its predecessor with greater flexibility and improved efficiency. This advanced neural processor core is tailored for modern applications demanding real-time response and ultra-low power consumption, making it ideal for compact and battery-operated devices. Akida 2nd Generation supports various programming configurations, including 8-, 4-, and 1-bit weights and activations, thus providing developers with the versatility to optimize performance versus power consumption to meet specific application needs. Its architecture is fully digital and silicon-proven, ensuring reliable deployment across diverse hardware setups. With features such as programmable activation functions and support for sophisticated neural network models, Akida 2nd Generation enables a broad spectrum of AI tasks. From object detection in cameras to sophisticated audio sensing, this iteration of the Akida processor is built to handle the most demanding edge applications while sustaining BrainChip's hallmark efficiency in processing power per watt.

BrainChip
11 Categories
View Details

aiWare

aiWare is a high-performance NPU designed to meet the rigorous demands of automotive AI inference, providing a scalable solution for ADAS and AD applications. This hardware IP core is engineered to handle a wide array of AI workloads, including the most advanced neural network structures like CNNs, LSTMs, and RNNs. By integrating cutting-edge efficiency and scalability, aiWare delivers industry-leading neural processing power tailored to automobile-grade specifications.\n\nThe NPU's architecture emphasizes hardware determinism and offers ISO 26262 ASIL-B certification, ensuring that aiWare meets stringent automotive safety standards. Its efficient design also supports up to 256 effective TOPS per core, and can scale to handle thousands of TOPS through multicore integration, minimizing power consumption effectively. The aiWare's system-level optimizations reduce reliance on external memory by leveraging local memory for data management, boosting performance efficiency across varied input data sizes and complexities.\n\naiWare’s development toolkit, aiWare Studio, is distinguished by its innovative ability to optimize neural network execution without the need for manual intervention by software engineers. This empowers ai engineers to focus on refining NNs for production, significantly accelerating iteration cycles. Coupled with aiMotive's aiDrive software suite, aiWare provides an integrated environment for creating highly efficient automotive AI applications, ensuring seamless integration and rapid deployment across multiple vehicle platforms.

aiMotive
12 Categories
View Details

Dynamic Neural Accelerator II Architecture

The Dynamic Neural Accelerator II (DNA-II) from EdgeCortix is an advanced neural network IP core tailored for high efficiency and parallelism at the edge. Incorporating a run-time reconfigurable interconnect system between compute units, DNA-II effectively manages both convolutional and transformer workloads. This architecture ensures scalable performance beginning with 1K MACs, suitable for a wide range of SoC implementations. EdgeCortix's patented architecture significantly optimizes data paths between DNA engines, enhancing parallelism while reducing on-chip memory usage. As a core component of the SAKURA-II platform, DNA-II supports state-of-the-art generative AI models with industry-leading energy efficiency. DNA-II's design acknowledges the typical inefficiencies in IP cores, improving compute utilization and power consumption metrics substantially. By adopting innovative reconfigurable datapath technologies, EdgeCortix sets a new benchmark for low-power, high-performance edge AI applications.

EdgeCortix Inc.
AI Processor, Processor Core Dependent, Processor Core Independent, Security Processor, Security Protocol Accelerators, Vision Processor, Wireless Processor
View Details

Polar ID Biometric Security System

The Polar ID is an innovative biometric security system that elevates facial recognition technology through its use of sophisticated meta-optics. By capturing and analyzing the unique polarization signature of a face, Polar ID delivers a new standard in security. This system can detect spoofing attempts that incorporate 3D masks or other similar deceptive tactics, ensuring high security through accurate human authentication. Polar ID minimizes the complexity typically associated with face recognition systems by integrating essential optical functions into a single optic. Its compact design results in cost savings and reduces the space required for optical modules in devices like smartphones. Operating in near-infrared light, Polar ID can consistently deliver secure face unlock capabilities even under challenging lighting conditions, dramatically outperforming traditional systems that may fail in bright or dark environments. The platform does not rely on time-of-flight sensors or structured light projectors, which are costly and complex. Instead, Polar ID leverages the simplicity and efficiency of its single-shot identification process to deliver immediate authentication results. This makes it a potent tool for securing mobile transactions and providing safer user experiences in consumer technology.

Metalenz Inc.
14 Categories
View Details

L5-Direct GNSS Receiver

The L5-Direct GNSS Receiver by oneNav is a revolutionary solution built to leverage the advanced capabilities of L5-band satellite signals. Distinguishing itself by operating solely on the L5 frequency, this product delivers exceptional positioning accuracy and resilience, free from the interference commonly associated with legacy L1 signals. This advanced GNSS receiver is engineered to cater to a variety of professional applications that demand robust performance under challenging conditions, such as dense urban areas.\n\nLeveraging oneNav's proprietary Application Specific Array Processor (ASAP), the system provides best-in-class GPS signal acquisition and processing without compromising sensitivity or fix time. The use of an innovative single RF chain allows for optimal antenna placement, reducing the overall form factor and enabling integration into devices that require stringent size and cost constraints. This makes it an ideal choice for wearable and IoT device applications where space and energy consumptions are pivotal considerations.\n\nAdditionally, the L5-Direct GNSS Receiver incorporates machine learning algorithms to effectively mitigate multipath errors, offering unrivaled accuracy by distinguishing direct from reflected signals. The system is specifically designed to be energy efficient, offering extended operational life critical for applications such as smart wearables and asset tracking devices. Its resilience against GPS jamming and interference ensures it remains a reliable choice for mission-critical operations.

oneNav, Inc.
ADPCM, AI Processor, Bluetooth, CAN, Ethernet, GPS, Other, Processor Core Independent, Security Protocol Accelerators, Wireless Processor
View Details

Securyzr iSSP

The Securyzr iSSP is an integrated Security Services Platform that provides a comprehensive solution for managing the embedded security of devices throughout their lifecycle. It offers features like secure boot, firmware updates, and security monitoring. By leveraging these lifecycle management services, companies can ensure that device security is maintained continuously from deployment until the end of service. The platform stands out by enabling zero-touch security management, linking secure elements with cloud services effectively.

Secure-IC
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

AES-GCM for Authenticated Encryption

AES-GCM combines the Advanced Encryption Standard with the Galois/Counter Mode of operation to provide an authenticated encryption solution that ensures both confidentiality and data integrity. Helion's AES-GCM IP cores are optimized for high efficiency and are suitable for use in FPGAs and ASICs across various technical fields. AES-GCM is particularly advantageous for scenarios requiring high-speed data processing with robust security. It achieves this by encrypting data and producing an authentication tag simultaneously, which simplifies the process of securing data streams and verifying data authenticity. This dual function of encryption and integrity check within a single operation enhances performance, making it ideal for secure communication protocols, secure video streaming, and cloud storage solutions. The implementation by Helion is characterized by its adaptability and ease of integration, allowing seamless deployment into existing systems. The IP core supports various key sizes and offers substantial flexibility in operational parameters, ensuring it can be tailored to meet specific security needs while optimizing resource usage and maintaining power efficiency.

Helion Technology Limited
Cryptography Cores, Security Protocol Accelerators
View Details

Aeonic Integrated Droop Response System

The Aeonic Integrated Droop Response System sets a new standard in addressing voltage droop issues within integrated circuits through its advanced droop detection and response capabilities. It is uniquely engineered to provide rapid, fine-grained DVFS capabilities, allowing significant reductions in system power requirements. With multi-threshold detection features and support for remote/local droop detection, this system effectively facilitates monitoring and management of critical silicon health metrics. The robust observability and programmability features make it an indispensable asset for adapting to silicon aging and optimizing lifecycle analytics.

Movellus
All Foundries
All Process Nodes
Analog Subsystems, Clock Synthesizer, DC-DC Converter, DLL, Peripheral Controller, Platform Security, PLL, SDRAM Controller, Security Protocol Accelerators, Security Subsystems
View Details

AES-XTS for Encryption of Storage Devices

The AES-XTS mode offers a robust solution for encrypting data stored on hard drives and other storage devices. Designed specifically to address the security needs of data at rest, Helion's implementation ensures that the data remains confidential and protected against unauthorized access. AES-XTS employs a unique tweaking mechanism that prevents identical plaintext data blocks from producing identical ciphertext data blocks, effectively providing enhanced security for sensitive data storage. This mode is particularly suited for full disk encryption, ensuring that data is secure against physical attempts to extract or manipulate it. Helion's AES-XTS solution is optimized for both performance and power efficiency, making it ideal for integration in environments where data security is paramount without compromising system efficiency. The IP core supports various key lengths to meet specific cryptographic strength requirements, ensuring adaptability across different storage platforms and devices.

Helion Technology Limited
Cryptography Cores, Security Protocol Accelerators
View Details

eSi-Crypto

eSi-Crypto provides advanced encryption and authentication capabilities crucial for safeguarding modern electronic systems. The IP includes features such as True Random Number Generators (TRNGs), cryptographic processing, and Public Key Acceleration. By optimizing resource usage while ensuring high throughput, this technology aids in protecting device data against cyber threats.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

HDCP Encryption-Decryption Engine

Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

AES (standard modes) for Secure Encryption

AES, or Advanced Encryption Standard, is a cryptographic algorithm that stands as a cornerstone in secure data encryption. Helion's AES standard modes provide a range of configurations tailored to ensure data integrity and confidentiality across various applications. These modes are optimally designed for ASICs and FPGAs, promising high performance with low power consumption. The implementation of AES by Helion is distinguished by its flexibility and security, catering to industries that require stringent data protection. The IP core supports multiple AES modes, including ECB, CBC, CFB, OFB, and CTR, each with specific operational characteristics that address different security needs. The efficient design ensures reduced resource usage, which is particularly beneficial for cost-sensitive and resource-constrained environments. Helion's AES cores are compatible with global encryption standards and can be integrated seamlessly into existing frameworks. This adaptability makes them an ideal choice for applications such as secure communications, data storage encryption, and internet security protocols.

Helion Technology Limited
Cryptography Cores, Other, Security Protocol Accelerators
View Details

JPEG-LS Encoder

The JPEG-LS Encoder is an efficient, lossless image encoder designed specifically for FPGA platforms, implementing the ISO/IEC 14495-1 and ITU-T Rec. T.87 standards. This encoder boasts high efficiency and compresses images better than JPEG-2000 in numerous lossless scenarios without the need for auxiliary memory. With a latency of less than one line, it maintains rapid data processing speeds, making it exceptional for real-time applications. Tailored for adaptive image processing, the encoder supports image samples from 8 to 16 bits in various resolutions even reaching ultra high-definition levels. Its configurable design allows for dynamic adjustment of data word widths and image sizes, providing developers with flexibility akin to bespoke designs, optimizing for different operational needs. With its scalable architecture, the JPEG-LS Encoder ensures minimal resource usage while allowing for high throughput, easily integrating into complex systems. Its support for multiple interfaces, including FIFO I/O and Avalon Streaming with back-pressure, makes it versatile enough for various system architectures, augmenting the capabilities of any video or imaging processing platform.

Parretto B.V.
Image Conversion, JPEG, JPEG 2000, Security Protocol Accelerators
View Details

QDID PUF

The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is designed as a versatile and high-performance hardware accelerator for cryptographic hashing tasks. It supports all SHA-3 hash functions including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512 along with extendable output functions like SHAKE-128 and SHAKE-256. Its design ensures robust security, featuring full protection against timing-based side channel attacks, and includes automatic byte padding for convenience. Operating efficiently in a single clock domain, this engine is extensively verified to maintain data integrity across numerous applications, including blockchain, financial systems, and secure boot engines.

KiviCore GmbH
11 Categories
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

Suite-Q HW

Suite-Q HW is a comprehensive system-on-chip (SoC) design crafted to provide a complete suite of standardized cryptographic operations essential for securing communication protocols. Targeting both high-end servers and low-end embedded systems, this design leverages the same hardware accelerators but differs in processor core choices and connectivity solutions to cater to varied application needs. By offloading symmetric and asymmetric cryptographic operations, Suite-Q HW enhances execution efficiency while integrating features such as the NIST 800-90-compliant True Random Number Generator. Classical and post-quantum public key cryptographic support is provided, encompassing a range of protocols such as ECDSA, Ed25519, and Curve25519, alongside emerging post-quantum methodologies like isogeny-based and lattice-based cryptography. Furthermore, it supports hash-based signature protocols including XMSS and LMS, and integrates the Advanced Encryption Standard for versatile encryption needs. This SoC design is crafted to simplify integration into SoC and FPGA architectures while offering various performance grades to balance silicon footprint and overall performance. Beyond its seamless integration capability, Suite-Q HW demonstrates substantial power reductions compared to software implementations, making it a suitable choice for power-sensitive applications. Comprehensive validation tests, including known answer test vectors and simulation scripts, ensure reliability and integration efficiency.

PQSecure Technologies, LLC
TSMC
7nm LPP, 14nm, 22nm FD-SOI, 28nm SLP
14 Categories
View Details

MACsec

Comcores' MACsec solution addresses the needs for secure communication on Ethernet links by implementing the IEEE 802.1AE standard for MAC Security. It provides comprehensive protection against eavesdropping and manipulation, making it suitable for applications demanding high security over public and private networks. Built to support various data rates, the MACsec IP core integrates robust cryptographic suites like AES-GCM to encrypt and authenticate network traffic. Its deployment ensures data confidentiality and integrity, fostering a secure environment for transmitting sensitive information such as in military communication systems and data centers.

Comcores
Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Digital Systems and Security Solutions

VeriSyno's digital systems and security solutions offer robust frameworks optimized for high-speed data processing and secure communication. Their portfolio includes various digital IPs for network and connectivity, embedded system design, and secure data transactions to meet the growing demands for data integrity and protection in digital applications. Designed with resilience and customization in mind, these solutions serve to enhance not only the security but also the efficiency of digital transformations.

VeriSyno Microelectronics Co., Ltd.
Cryptography Cores, Embedded Memories, Embedded Security Modules, NVM Express, Security Protocol Accelerators, Security Subsystems, V-by-One
View Details

PUFrt

PUFrt represents the pinnacle of hardware-based security, generating a unique and unclonable UID and key directly inside the chip. This security IP is fortified with features like OTP secure storage, TRNG, and a robust anti-tamper shell, forming a strong Root of Trust. Ideal for different environments, it can be seamlessly integrated with various security systems, including Crypto Engines and HSM modules, ensuring protection for IoT devices, automotive platforms, and edge AI applications.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

NeoPUF

NeoPUF stands out in the realm of semiconductor security by redefining the parameters of protection with its superior capability to generate random numbers. This IP, characterized by extraordinary speed, is engineered to enhance the robustness of next-generation secure chips substantially. NeoPUF's architecture is meticulously designed to deliver hardware-based security that ensures data remains protected from unauthorized access. What sets NeoPUF apart is its innovative approach to integrating security at the chip level, providing an unparalleled foundation of trust. It integrates seamlessly into a broad spectrum of applications, ensuring that data integrity is maintained throughout the lifecycle of semiconductor products. NeoPUF's versatility makes it a preferred choice for sectors where data security is of paramount importance, such as banking and government communications. This IP serves as a critical component in the design of secure systems, providing the necessary infrastructure for safe data exchange and transaction authentication. By delivering multi-layered security mechanisms, NeoPUF safeguards sensitive information against emerging threats, thereby future-proofing semiconductor devices.

eMemory Technology Inc.
TSMC
All Process Nodes
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Secure Protocol Engines

The Secure Protocol Engines by Secure-IC are designed to offload and enhance network and security processing tasks within an SoC environment. These high-performance IP blocks ensure efficient management of cryptographic operations and facilitate secure data exchanges across networks. By integrating these engines, developers can achieve improved throughput and reduced latency in their security implementations, which is critical for maintaining the performance and safety of connected devices. These engines support standard protocols, ensuring compatibility with a wide range of applications.

Secure-IC
14 Categories
View Details

MERA Compiler and Framework

The MERA Compiler and Software Framework by EdgeCortix is designed to streamline AI model deployment across various platforms, simplifying the transition of pre-trained models to functional applications. By offering a robust set of tools for model calibration and quantization, MERA ensures that models run optimally on the Dynamic Neural Accelerator (DNA) architecture. MERA's integration capabilities extend across leading processors such as AMD, Intel, Arm, and RISC-V, providing flexibility and ease of use. It supports a range of machine learning frameworks like TensorFlow Lite and ONNX, making it easier for developers to adapt to this platform. The framework is especially suited for edge AI tasks where quick adaptation and efficiency are necessary. Apart from model portability, MERA stands out with its ease of integration, supporting popular neural network models, including those from Hugging Face. Its open-source front end ensures community involvement and adaptability, encouraging industry-wide collaboration and innovation in AI deployment strategies.

EdgeCortix Inc.
AI Processor, AMBA AHB / APB/ AXI, Coprocessor, Gen-Z, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

CANsec Controller Core

The CANsec Controller Core is crafted to cater to the emerging needs of secure in-vehicle communication systems. Adding a layer of security to the traditional Controller Area Network (CAN), this core incorporates advanced encryption and decryption capabilities, ensuring data is transmitted securely within the vehicle's network. With a rising number of electronic control units (ECUs) in vehicles, safeguarding the integrity and confidentiality of data is paramount, and CANsec excels in this domain. Emphasizing robust security protocols, the CANsec Controller Core is pivotal in protecting automotive systems from unauthorized access and cyber threats. It integrates seamlessly with existing CAN systems, allowing for an enhanced security overlay that does not compromise the network's performance or reliability. By ensuring the confidentiality and authenticity of the messages exchanged, this core addresses critical concerns in automotive cybersecurity, reinforcing trust in vehicular network communications. The versatile nature of CANsec allows it to be embedded in various ECUs, ensuring comprehensive protection across the network. As automakers increasingly rely on interconnected systems, this core supports the secure deployment of advanced features and services, enhancing consumer confidence in the safety and reliability of electronic vehicle systems.

Fraunhofer Institute for Photonic Microsystems (IPMS)
HHGrace, Samsung
14nm FinFET, 55nm
CAN, CAN XL, CAN-FD, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Flash Controller, Security Protocol Accelerators, Temperature Sensor
View Details

OTP Technology

Chuangfeixin Technologies' OTP (One-Time Programmable) solutions provide a unique approach to secure data storage. Once programmed, the data within these OTP devices is immutable, providing a robust layer of security ideal for protecting intellectual property and sensitive information within integrated circuits or logic gates. These solutions are particularly advantageous in embedded applications, where they can safeguard firmware and configuration data against unauthorized access or alteration. The company offers versatile OTP products compatible with various CMOS processes, ensuring easy integration without additional processing steps, thus reducing development costs. The long data retention of over 100 years under extreme conditions further underscores the reliability of these OTP modules in demanding applications.

Chuangfeixin Technologies
Embedded Memories, Embedded Security Modules, NAND Flash, Security Protocol Accelerators, Standard cell
View Details

Aeonic Insight

Aeonic Insight is designed to give unparalleled on-die telemetry capabilities for actionable insights within SoCs. Its sensors are ideal for high-demand environments such as data centers and automotive systems, offering extensive observability and programmability. The product's advanced telemetry enhances the visibility into power grids and clock health, enabling teams to make wiser design decisions and integrate effortlessly with third-party silicon analytics platforms. Aeonic Insight helps optimize power usage and system reliability through detailed silicon lifecycle analytics, ensuring efficiency across various processing nodes.

Movellus
All Foundries
All Process Nodes
AMBA AHB / APB/ AXI, Clock Generator, DLL, PLL, Security Protocol Accelerators, Sensor
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

MACSec

CoMira Solutions offers a Media Access Control Security (MACSec) solution adhering to IEEE standards aimed at safeguarding communication within 802.1 LAN environments. MACSec ensures data confidentiality and integrity, preventing unauthorized access and disruptions. It employs advanced encryption standards and supports flexible traffic management through various port configurations. The MACSec IP's time-division multiplexed architecture aligns seamlessly with CoMira's UMAC, ensuring synchronous operation despite differing link speeds. This implementation includes FIPS-compliant encryption methods such as GCM-AES-128 and GCM-AES-256, supporting robust security needs. Furthermore, CoMira's MACSec supports multiple secure channels and security associations per port, adding layers of protection to client systems. The configurability of Secure Channels and the ability to strip security tags enhances its adaptability in varied networking scenarios, reflecting CoMira's commitment to delivering tailor-fit security solutions.

CoMira Solutions
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

PhantomBlu - Tactical Communications

PhantomBlu by Blu Wireless is engineered for defense applications, focusing on delivering high-speed, secure, and reliable tactical communications. This mmWave networking solution is designed to be independent of conventional fibre optic or cabled networks, granting greater flexibility and range. With the capability to easily integrate with both legacy platforms and upcoming technological assets, PhantomBlu ensures interoperability and robust connectivity in demanding environments. The mmWave technology used in PhantomBlu allows for multi-gigabit data transmission over significant distances, catering to the dynamic needs of military operations. It can be configured to function as a PCP (hub) or STA (client), enhancing its adaptability in tactical scenarios. This flexibility is vital for mission-critical communications, ensuring data-rich, secure connections even in highly contested environments. By employing low Probability of Detection (LPD) and Low Probability of Interception (LPI) techniques, PhantomBlu provides stealthy communication capabilities, significantly reducing the risks of detection and interference by adversaries. This advanced technology strengthens the defense sector's communication arsenal, providing reliable gigabit connectivity that supports strategic and operational superiority on the battlefield.

Blu Wireless Technology Ltd.
24 Categories
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium PHSM by CrossBar is designed to secure digital assets with state-of-the-art multi-party computation technology. It provides a critical layer of security for devices by enabling MPC computations on a secure element. This integration ensures enhanced safeguarding of digital keys and assets, fostering trust in decentralized system setups. Key innovations of the Cramium include its zero-knowledge proof mechanism, which ensures that cryptographic keys are never fully reconstructed at any point, significantly reducing the risk of asset compromise. The device supports FIDO2 authentication, providing secure, phishing-resistant login capability over multiple accounts without compromising usability. Offering a robust infrastructure for the protection of digital assets, the PHSM aids in managing crypto assets securely even in scenarios of potential device loss. With modular architecture, it is tailored to fit diverse security policies and risk models, extending personalized key management and thresholds over a network of users and devices.

CrossBar Inc.
Cryptography Software Library, Embedded Security Modules, NVM Express, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AES Crypto

Dillon Engineering’s AES Crypto core offers robust data security through advanced encryption and decryption capabilities. Compliant with the FIPS 197 standard, it supports multiple cryptographic modes, allowing dynamic key changes without affecting throughput. Highly parameterized, it adapts to various performance and area requirements, making it suitable for diverse applications requiring stringent data security protocols. The core’s flexibility ensures it accommodates FPGA and ASIC technologies seamlessly, providing secure data processes across platforms.

Dillon Engineering, Inc.
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Securyzr Key Management System

The Securyzr Key Management System is a robust infrastructure for managing cryptographic keys efficiently across various applications and devices. This system provides essential functions such as key generation, storage, distribution, and lifecycle management, all while maintaining high security standards. It supports integration into existing systems, enabling seamless and secure management of cryptographic assets, which is vital for maintaining overall cybersecurity and integrity in device communication.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Low Power Security Engine

The Low Power Security Engine is a compact yet complete solution designed to safeguard resource-constrained embedded devices by providing low-power, high-efficiency security services. It supports ECDHE (Elliptic-curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm), enabling robust cryptographic operations and secure data handling. This security engine is engineered to resist timing and side channel attacks, which are critical for maintaining data integrity and confidentiality. Optimized for power and area, it suits embedded systems requiring enhanced security features without compromising on resource usage. Applications extend from smart sensors and embedded SIMs to secure RFID systems, underscoring its versatility in IoT applications. Its AMBA standard interface ensures smooth integration into various platforms, making it a reliable addition to secure IoT deployments.

Low Power Futures
All Foundries
All Process Nodes
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Other, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Security Protocol Accelerators

Security Protocol Accelerators from Synopsys are designed to provide enhanced data protection for a variety of applications. These accelerators focus on ensuring that security protocols are executed efficiently and effectively, integrating robust cryptographic processing and data encryption features. This capability is essential for maintaining the integrity and confidentiality of data across digital networks. Synopsys Security Protocol Accelerators offer compatibility with various security standards, ensuring that they can be deployed in a multitude of environments, from enterprise systems to consumer devices. Their architecture is finely tuned to optimize performance without sacrificing security, providing high-speed processing while minimizing the power footprint. By enabling fast and secure data transfer, these accelerators support applications in sensitive fields where data protection is critical, such as financial services, healthcare, and secure communications. Synopsys provides these accelerators as part of its commitment to delivering comprehensive security solutions that address the growing need for data security in a connected world.

Synopsys, Inc.
Content Protection Software, Cryptography Cores, Security Protocol Accelerators
View Details

Stellar Packet Classification Platform

Stellar Packet Classification Platform is tailored for high-efficiency search and sorting operations across networked systems using ACL and LPM rules. Designed to handle complex rule sets with ultra-fast lookup speeds, this platform is engineered for environments where rapid data processing and high reliability are critical. It adapts seamlessly for varied applications like firewalls, IPV4/6 routing, and Anti-DDoS systems, delivering consistent high performance even in demanding scenarios.

Peraso Inc.
TSMC
28nm
17 Categories
View Details

ReRAM Secure Keys

CrossBar's ReRAM Secure Keys offer advanced security for cryptographic key storage by leveraging its inherent resistance to tampering and its non-volatile nature. This technology is strategically designed to fortify security protocols within systems requiring stringent data protection standards. The secure key storage leverages ReRAM's unique structure to impede unauthorized extraction, ensuring cryptographic keys are held with utmost confidentiality. Its robust security features make it a critical component for applications in financial transactions, secure communications, and the protection of personal and corporate data. Manufacturers can integrate these ReRAM Secure Keys seamlessly into a variety of devices, offering scalability and flexibility alongside top-tier security. This solution not only enhances device security but also provides a resilient defense against potential cyber threats.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, NAND Flash, Other, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PUFhsm

PUFhsm provides a sophisticated hardware security module solution tailored for automotive chips and advanced applications. Acting as an Embedded Security Enclave, it isolates vital security operations from the main system. The module integrates a processor, cryptographic engines, and software to manage secure boot, deployment, key management, and secure monitoring. With EVITA-Full compliance, PUFhsm promises robust protection against complex threats and optimizes system efficiency for rapid market deployment.

PUFsecurity
Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems, Wireless Processor
View Details

Integrated Secure Element

Secure-IC's Integrated Secure Element (iSE) serves as a trusted platform embedded within the main SoC, offering vital security services like secure boot, key isolation, and anti-tampering protection. It is designed to serve as the cornerstone of a secured environment by providing a fundamental root of trust. The iSE enhances security by ensuring that sensitive operations are shielded from potential threats, making it an integral component for safeguarding sensitive data and ensuring the integrity of connected systems.

Secure-IC
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

PUFcc

PUFcc stands as an advanced cryptography engine, combining the latest digital and analog crypto algorithms to provide a complete security coprocessor solution. It includes hardware for key generation, storage, and a comprehensive crypto engine, all built upon the hardware Root of Trust established by the PUFrt solution. PUFcc supports a vast array of cryptographic operations, providing secure boot, OTA, TLS, and key management capabilities across various IoT contexts.

PUFsecurity
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Spec-TRACER

Spec-TRACER is a requirements lifecycle management tool crafted for FPGA and ASIC designs. It simplifies the capture, management, analysis, traceability, and reporting of requirements, supporting robust lifecycle management from inception to completion. This tool ensures that design specifications are met, facilitating compliance and reducing the potential for development errors.

Aldec, Inc.
Embedded Security Modules, Ethernet, Other, Security Protocol Accelerators
View Details

ALINT-PRO

ALINT-PRO is a specialized RTL design verification solution, designed to minimize issues in your RTL code. It addresses mismatches in RTL and post-synthesis simulation, enhances code portability, and ensures code is optimized for synthesis. ALINT-PRO facilitates a smoother path through the various stages of design with its comprehensive analysis capabilities.

Aldec, Inc.
CPU, Embedded Security Modules, Ethernet, Processor Cores, Security Protocol Accelerators
View Details

HMAC–SHA256 Accelerator

The HMAC–SHA256 Accelerator from Chevin Technology is engineered to provide scalable cryptographic processing power for FPGAs and other silicon devices. Focusing on secure data encryption and hashing, this accelerator ensures high-performance mathematical computations that protect sensitive information across industries. This accelerator serves as a critical component for security-conscious applications, offering extensive protection against data breaches and ensuring the confidentiality and authenticity of information. By employing hardware-based cryptography, it yields enhanced performance with reduced latency compared to software-only solutions. Ideal for applications in fields such as finance, telecommunications, and military operations, the HMAC–SHA256 Accelerator underlines Chevin Technology's commitment to delivering powerful, effective cryptographic solutions. This accelerator is designed with seamless integration in mind, supporting a vast array of silicon platforms.

Chevin Technology
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Keccak Hash Engine

The Keccak Hash Engine provides a flexible and efficient platform for implementing cryptographic functions such as hashing, authentication, and encryption. Based on the revolutionary sponge construction, Keccak is known for its configurability and wide range of applications, from pseudo-random number generation to blockchain solutions. Standardized both in NIST's FIPS 202 and 3GPP TS 35.231, this engine has undergone extensive validation and analysis. Keccak's ability to adapt to various security levels and output lengths makes it a robust choice for developers focusing on high-security digital applications.

KiviCore GmbH
11 Categories
View Details

QRoot Lite

QRoot Lite is a lightweight and configurable root-of-trust IP tailored for resource-constrained microcontrollers and IoT devices. The solution provides comprehensive security features such as secure boot, device attestation, and sealed storage, all in alignment with the TCG MARS specification. Designed to minimize silicon footprint, QRoot Lite integrates seamlessly via standard industry interfaces, ensuring a rapid and cost-effective implementation conducive to meeting regulatory compliance standards. This IP is ideal for integrating secure elements in low-power and cost-sensitive environments, offering a secure solution for modern connected devices.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Agile Secure Element

The Agile Secure Element IP is a versatile security enclave designed for straightforward integration into SoCs, providing essential elements for secure operations. This customizable IP includes a secure processor, cryptographic engines, and mechanisms for key storage and trusted execution, tailored to fit a wide range of system architectures. It supports a variety of cryptographic standards, including symmetric and asymmetric algorithms, while offering configuration options for post-quantum cryptography. Its modularity and compliance-readiness position it as an optimal solution for enhancing the security posture of complex multi-core systems and embedded applications.

Crypto Quantique
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key

The iShield Key stands out as a universal security tool designed to enhance both digital and physical access controls for users. Integrating seamlessly into existing IT infrastructures, this device facilitates secured logins and system accesses, ensuring that both online accounts and physical premises remain protected. The iShield Key is built to provide dual authentication capabilities, combining USB and NFC technologies to support a variety of security protocols and standards. What sets the iShield Key apart is its hybrid functionality, enabling it to function effectively in diverse operational environments, ranging from company networks to secure printing solutions and beyond. Its robust build and advanced security features have made it a favorable choice for both individuals and organizations looking to bolster their security infrastructure. Additionally, this security solution offers a streamlined, plug-and-play approach, which simplifies integration into existing systems and supports a wide array of devices. Swissbit's focus on ease of use and adaptability ensures that the iShield Key can meet the varying needs of different industries, all while maintaining high levels of security assurance.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

ChevinID™ Silicon Security Solution

The ChevinID™ Silicon Security Solution is designed to enhance the security framework within FPGA and ASIC projects, providing robust protection against cyber threats and unauthorized access. Chevin Technology has crafted this solution to ensure silicon product integrity through comprehensive authentication and verification processes. This makes it essential for sensitive applications where data security is paramount. ChevinID™ delivers a layered security approach, integrating seamlessly with silicon supply chains to protect against risks such as hacking, cloning, and insertion of malicious code. By safeguarding each stage of the silicon lifecycle, from design through to deployment, this solution fortifies the reliability and security of silicon products. Industries that benefit from ChevinID™ include those involved in defense, healthcare, and industrial processing, where maintaining integrity and security of sensitive information is crucial. This solution enhances the overall security infrastructure, supporting Chevin Technology's mission to deliver cutting-edge protection technologies for silicon-based designs.

Chevin Technology
Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield HSM

The iShield HSM is a high-performance hardware security module designed to store security keys and enable device authentication. With a unique plug-and-play capability, it allows system integrators to complement existing AWS IoT Greengrass devices with enhanced security features. This approach makes it an ideal solution for systems requiring robust authentication without exposing sensitive keys in software layers. This module offers a secure vault for private keys and certificates, pivotal in maintaining data security across connected devices. It provides users with a straightforward yet reliable method to enhance the security framework of their IT environments by incorporating hardware-backed security measures. Swissbit has tailored the iShield HSM for seamless integration into pre-existing hardware designs, adding a layer of security without necessitating extensive system overhauls. With its focus on delivering reliable security solutions, iShield HSM finds its use across various applications, from IoT devices to in-field machinery that demands rigorous data protection mechanisms. System designers and IT professionals often choose this module to secure communications and safeguard sensitive data against breaches.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

KiviPQC-KEM

KiviPQC-KEM is designed to empower secure communication in an era of quantum threats by leveraging the ML-KEM algorithm. This IP core facilitates key generation, encapsulation, and decapsulation operations essential for establishing shared secret keys over untrusted channels. As part of KiviCore's post-quantum cryptographic initiatives, it complies with NIST's FIPS 203 standards, ensuring robust resistance against quantum computing threats. It is available in "Fast" and "Tiny" variants, allowing developers to fine-tune security implementation based on available resources and required processing speed.

KiviCore GmbH
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt