Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Security Protocol Accelerators

Security Protocol Accelerators Semiconductor IP

Security Protocol Accelerators are crucial components within the realm of semiconductor IP, designed to boost the performance of security protocols in various applications. These accelerators play a pivotal role in enhancing the speed, efficiency, and reliability of data encryption and decryption processes, which are fundamental for secure communications and transactions across networks. By implementing specialized hardware for protocol acceleration, these semiconductor IPs offer significant improvements in processing speed compared to software-only solutions.

One of the primary uses of Security Protocol Accelerators is in network security devices, including routers, firewalls, and VPNs, where they ensure secure communication by accelerating tasks such as data encryption and IPsec processing. As data breaches and cyber threats continue to evolve, the demand for robust and efficient security solutions has never been higher. These accelerators enable the optimization of cryptographic operations, providing enterprises and individuals with the confidence that their sensitive data is well-protected during transmission.

In consumer electronics like smartphones, tablets, and smart home devices, security protocol accelerators are key to maintaining user privacy without compromising on performance. They ensure that devices can handle complex security tasks quickly, extending battery life and maintaining seamless user experiences. Whether it’s ensuring the security of cloud-based services or protecting communications over Wi-Fi and cellular networks, these semiconductor IPs are increasingly vital in an interconnected world.

Moreover, the rise of IoT devices and edge computing has expanded the need for security protocol accelerators. With the massive data exchange happening at the edge of networks, having efficient security IPs ensures not just the safety of the data but also compliance with regulatory standards. As companies continue to push for innovations in AI and machine learning, the integration of security protocol accelerators in their systems helps to safeguard intellectual property and sensitive algorithms, thereby maintaining a secure operational environment. Through leveraging these semiconductor IPs, creators can focus on innovation while relying on proven security foundations.

All semiconductor IP

Akida 2nd Generation

The second-generation Akida platform builds upon the foundation of its predecessor with enhanced computational capabilities and increased flexibility for a broader range of AI and machine learning applications. This version supports 8-bit weights and activations in addition to the flexible 4- and 1-bit operations, making it a versatile solution for high-performance AI tasks. Akida 2 introduces support for programmable activation functions and skip connections, further enhancing the efficiency of neural network operations. These capabilities are particularly advantageous for implementing sophisticated machine learning models that require complex, interconnected processing layers. The platform also features support for Spatio-Temporal and Temporal Event-Based Neural Networks, advancing its application in real-time, on-device AI scenarios. Built as a silicon-proven, fully digital neuromorphic solution, Akida 2 is designed to integrate seamlessly with various microcontrollers and application processors. Its highly configurable architecture offers post-silicon flexibility, making it an ideal choice for developers looking to tailor AI processing to specific application needs. Whether for low-latency video processing, real-time sensor data analysis, or interactive voice recognition, Akida 2 provides a robust platform for next-generation AI developments.

BrainChip
11 Categories
View Details

aiWare

The aiWare Neural Processing Unit (NPU) is an advanced hardware solution engineered for the automotive sector, highly regarded for its efficiency in neural network acceleration tailored for automated driving technologies. This NPU is designed to handle a broad scope of AI applications, including complex neural network models like CNNs and RNNs, offering scalability across diverse performance tiers from L2 to more demanding L4 systems. With its industry-leading efficiency, the aiWare hardware IP achieves up to 98% effectiveness over various automotive neural networks. It supports vast sensor configurations typical in automotive contexts, maintaining reliable performance under rigorous conditions validated by ISO 26262 ASIL B certification. aiWare is not only power-efficient but designed with a scalable architecture, providing up to 1024 TOPS, ensuring that it meets the demands of high-performance processing requirements. Furthermore, aiWare is meticulously crafted to facilitate integration into safety-critical environments, deploying high determinism in its operations. It minimizes external memory dependencies through an innovative dataflow approach, maximizing on-chip memory utilization and minimizing system power. Featuring extensive documentation for integration and customization, aiWare stands out as a crucial component for OEMs and Tier1s looking to optimize advanced driver-assist functionalities.

aiMotive
12 Categories
View Details

Polar ID Biometric Security System

The Polar ID Biometric Security System offers an advanced, secure face unlock capability for smartphones, utilizing groundbreaking meta-optics technology to capture the full polarization state of light. Unlike traditional biometric systems, Polar ID distinguishes the unique polarization signature of human facial features, which adds an additional security layer by detecting the presence of non-human elements like sophisticated 3D masks. This system eliminates the need for multiple complex optical modules, thus simplifying smartphone design while enhancing security. Designed to fit the most compact form factors, Polar ID uses a near-infrared polarization camera at 940nm paired with active illumination. This configuration ensures functionality across various lighting conditions, from bright outdoor environments to complete darkness, and operates effectively even when users wear sunglasses or face masks. Smartphone OEMs can integrate this secure and cost-effective solution onto a wide range of devices, surpassing traditional fingerprint sensors in reliability. Polar ID not only offers a higher resolution than existing solutions but does so at a reduced cost compared to structured light setups, democratizing access to secure biometric authentication across consumer devices. The system's efficiency and compactness are achieved through Metalenz's meta-optic innovations, offering consistent performance regardless of external impediments such as lighting changes.

Metalenz Inc.
13 Categories
View Details

Dynamic Neural Accelerator II Architecture

The Dynamic Neural Accelerator II (DNA-II) by EdgeCortix is a versatile and powerful neural network IP core tailored for edge AI applications. Featuring run-time reconfigurable interconnects, it achieves high parallelism and efficiency essential for convolutional and transformer networks. DNA-II can be integrated with a variety of host processors, rendering it adaptable for a wide range of edge-based solutions that demand efficient processing capabilities at the core of AI advancements. This architecture allows real-time reconfiguration of data paths between DNA engines, optimizing parallelism while reducing on-chip memory bandwidth via a patented reconfigurable datapath. The architecture significantly enhances utilization rates and ensures fast processing through model parallelism, making it suitable for mission-critical tasks where low power consumption is paramount. DNA-II serves as the technological backbone of the SAKURA-II AI Accelerator, enabling it to execute generative AI models proficiently. This innovative IP core is engineered to mesh effortlessly with the MERA software stack, optimizing neural network operations through effective scheduling and resource distribution, representing a paradigm shift in how neural network tasks are managed and executed in real-time.

EdgeCortix Inc.
AI Processor, Processor Core Dependent, Processor Core Independent, Security Protocol Accelerators, Vision Processor, Wireless Processor
View Details

Securyzr iSSP

Securyzr iSSP is an integrated Security Services Platform designed by Secure-IC to offer comprehensive lifecycle management of device security. It provides zero-touch security lifecycle services that encompass provisioning, firmware updates, security monitoring, and device identity management. The platform employs a cloud-based architecture, enabling real-time updates and management of security protocols across a fleet of devices. Securyzr iSSP supports Post-Quantum Cryptography standards, ensuring readiness for future cryptographic challenges. This platform integrates seamlessly into diverse system environments, facilitating the protection of sensitive data through robust secure boot processes and key isolation techniques. It structures security around a core Root-of-Trust component named Securyzr iSE neo, which offers anti-tampering protection and dual computation for enhanced security. The platform aligns with an organization's security goals by providing customizable protective measures that are scalable to various applications. Securyzr iSSP is designed to maintain high security levels without compromising system performance or efficiency. By leveraging the latest advancements in cryptography and security protocols, it ensures the resiliency of systems against both physical and remote threats. This platform aids organizations in navigating the increasingly complex landscape of digital security challenges, providing a robust foundation for their cybersecurity strategies.

Secure-IC
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

AES-XTS for Encryption of Storage Devices

The AES-XTS standard, as outlined by NIST and IEEE, provides a critical security layer for disk-level data encryption. Through its unique 'tweakable' cipher design, AES-XTS is particularly effective in securing data at rest on disk drives. Helion's AES-XTS solutions are tailored for applications ranging from single drives to extensive storage arrays, offering configurations that balance speed and hardware resource use. With throughput capacities exceeding 64 Gbps, these cores can support both high and low-speed storage applications. Benefiting from Helion's dedication to flexible and efficient designs, these cores ensure consistent data protection across various environments, making them suitable for use in both commercial and industrial sectors. They are available for implementation in leading FPGA and ASIC technologies, ensuring adaptability and integration ease.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Security Protocol Accelerators
View Details

AES-GCM for Authenticated Encryption

AES-GCM, or AES Galois Counter Mode, combines encryption with authentication to provide both data confidentiality and integrity. Originally developed for high-throughput applications, it can efficiently use pipelining and parallel processing to achieve exceptional speeds. Helion's AES-GCM solutions are tailored to meet diverse data rate requirements, ranging from several megabits to over 40 Gbps. The solutions are versatile across various technologies, offering unparalleled flexibility and performance. Beyond speed, Helion's AES-GCM cores are noted for their compact design, ensuring minimal resource utilization in both FPGA and ASIC implementations. Designed to fit scalable applications, these cores ensure robust data protection in high-demand environments, like networking and data storage.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Security Protocol Accelerators
View Details

eSi-Crypto

The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

HDCP Encryption-Decryption Engine

Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

L5-Direct GNSS Receiver

The L5-Direct GNSS Receiver by oneNav offers cutting-edge performance by exclusively leveraging L5-band signals for navigation. This receiver directly captures signals in the L5 band, bypassing traditional L1 signals, which are often susceptible to interference and jamming. Designed for modern GNSS applications, it provides unmatched accuracy and robustness in urban areas and other challenging environments. The L5-direct technology boasts innovative features such as an Application Specific Array Processor (ASAP), which ensures rapid location acquisition without sacrificing sensitivity. It supports over 70 satellite signals across multiple constellations, including GPS, Galileo, BeiDou, and QZSS. This capability guarantees reliable positioning, making it ideal for users who require accurate and tamper-resistant navigation data. One of the unique aspects of the L5-Direct GNSS Receiver is its low power consumption, thanks to its optimized processing efficiencies. It is crafted to cater to applications with stringent size and cost restrictions, such as wearables and IoT devices. Furthermore, the receiver offers a single RF chain design, simplifying integration and reducing system complexity. This innovation makes oneNav's solution a compelling choice for next-generation GNSS receivers in diverse technological contexts.

oneNav, Inc.
GLOBALFOUNDRIES, TSMC
22nm FD-SOI
ADPCM, AI Processor, Bluetooth, CAN, Ethernet, GPS, Processor Core Independent, Security Protocol Accelerators, Wireless Processor
View Details

AES (standard modes) for Secure Encryption

The Advanced Encryption Standard (AES) provides robust encryption for data security applications. Originally chosen by the National Institute of Standards and Technology (NIST) in the late 1990s, AES became the standard for encryption, replacing the older DES system. Helion Technology was at the forefront of this shift, offering a variety of AES IP cores suitable for ASIC and FPGA technologies. Helion's range of AES solutions can address different application needs from minimal area to high-speed data processing. This allows customization and scalability to fit specific encryption requirements. AES includes multiple operational modes, such as CBC, CTR, OFB, and more, enabling users to choose based on throughput and security priorities. With core offerings that cover ultra-low gate count applications to high throughput scenarios, Helion's AES cores are designed to fit seamlessly into a wide range of systems. Furthermore, by embracing process nodes from leading foundry groups, these cores ensure efficient implementation in diverse commercial settings.

Helion Technology Limited
TSMC
90nm, 130nm, 180nm
Cryptography Cores, Other, Security Protocol Accelerators
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library provided by PQSecure, crafted to enhance the security capabilities of devices through efficient cryptographic processing. Available in portable C code and optimized assembly variations, Suite-Q SW caters to a wide array of processors, including both general-purpose and embedded CPUs. This software library is engineered to optimize code size, stack usage, and overall performance, allowing it to operate effectively even on memory-limited devices. It provides a comprehensive set of cryptographic functions including secure hashing, encryption, and digital signatures, designed to meet the demands of diverse security scenarios. The software solution is an ideal choice for developers seeking ease of integration, support for hardware offload, and customization for specific needs. Its plug-and-play architecture makes it straightforward to deploy across different platforms, providing a robust defense against modern security threats for IoT devices, mobile applications, and more.

PQSecure Technologies, LLC
10 Categories
View Details

Suite-Q HW

Suite-Q HW is an integrated system-on-chip (SoC) solution by PQSecure designed to encapsulate complete cryptographic functionalities within a compact and efficient package. It targets both high-end servers and low-end embedded systems, offering a unified architecture that employs the same hardware accelerators across its different implementations. The hardware system integrates multiple cryptographic operations, including symmetric and asymmetric algorithms, within a streamlined chip design. This allows for a comprehensive offloading of cryptographic tasks, freeing up the main processor for other critical operations, and ensures rapid execution and enhanced performance. Additionally, Suite-Q HW's flexibility in configurations aids in balancing performance with silicon footprint, making it suitable for a diverse range of applications. Further, the solution is equipped with anti-tamper technologies and design features to resist side-channel attacks, a critical consideration in environments where secure operations are non-negotiable. Whether used in data-sensitive financial systems or IoT devices with limited computational resources, Suite-Q HW promises dependable security with optimal efficiency.

PQSecure Technologies, LLC
13 Categories
View Details

JPEG-LS Encoder

The JPEG-LS Encoder by Parretto B.V. is a lossless image compression solution for FPGA applications, renowned for its adherence to the JPEG-LS standard. This encoder excels in lossless scenarios, outperforming the JPEG-2000 in resource efficiency while requiring neither external memory nor complicated setup, resulting in lower latency. This IP-core is perfect for applications where high-quality, lossless image compression is essential, catering to image depths from 8 to 16 bits. It processes one pixel per clock cycle, ensuring smooth and efficient compression workflows. With configurable output data width and the ability to manage ultra-high-definition image sizes, it's a versatile choice for a variety of imaging needs. Typically used in applications requiring pristine image fidelity, the JPEG-LS Encoder supports pixel and data FIFO interfaces alongside Avalon streaming for data handling flexibility. Developers can trust its performance for critical tasks where low-latency and high-quality compression are paramount, making it a foundational tool in modern image processing systems.

Parretto B.V.
Image Conversion, JPEG, JPEG 2000, Security Protocol Accelerators
View Details

NeoPUF

NeoPUF sets a high standard in semiconductor security by offering exceptionally fast random number generation capabilities that reach speeds up to 100 times faster than conventional methods. It is a versatile hardware security IP that forms the backbone of secure chips designed to combat evolving digital threats. NeoPUF's unique design offers an intrinsic level of security that harnesses the physical characteristics of silicon to create a naturally unclonable identifier for each chip. Used extensively in fields where security is paramount, NeoPUF helps ensure the integrity and confidentiality of data throughout the lifecycle of semiconductor devices. It's critically important in sectors such as IoT, automotive, and enterprise computing, where the cost of a security breach is high. The integration of NeoPUF provides a secure basis for implementing complex encryption keys and enhances the trustworthiness of digital transactions. By employing cutting-edge cryptographic measures, NeoPUF is considered a suitable foundation for future-proofing semiconductor systems against the anticipated quantum computing threats. It forms part of a comprehensive security solution, offering hardware-based security features that significantly enhance the reliability and safety of modern electronic devices.

eMemory Technology Inc.
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QDID PUF

The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine from KiviCore offers an efficient and secure solution for cryptographic hashing, specifically designed to perform high-speed data integrity verification and authentication. Compliant with NIST's FIPS 202 standard, this IP core facilitates extensions such as SHAKE-128 and SHAKE-256 for customizable output lengths. Aimed at securing transactions and communications in today's networks, the core provides high throughput and resilient operations against timing-based side channel attacks. Its compact design fits both ASIC and FPGA environments while maintaining robust security assurance. Extensively verified and characterized for multiple high-performance scenarios, the SHA-3 core finds application in SSL and IPsec protocols, secure boot systems, blockchain processing, and other domains requiring trustable encryption. Its AMBA AXI4 interface allows for straightforward hardware integration alongside a comprehensive suite of software resources and support documentation.

KiviCore GmbH
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Digital Systems and Security Solutions

VeriSyno's Digital Systems and Security Solutions encompass a comprehensive set of offerings tailored to address the needs of secure data processing environments. These solutions feature a range of digital IP cores that can enhance the operational capabilities of processors, memory controllers, and communication interfaces. By leveraging these digital assets, VeriSyno aims to provide robust and efficient systems that prioritize security and performance. Designed to integrate seamlessly with existing hardware, these solutions are particularly critical in applications prone to demand high security, such as financial transactions and sensitive data processing. The security IPs ensure that data integrity and confidentiality are upheld, leveraging sophisticated encryption and protection mechanisms. Moreover, VeriSyno is agile in customizing its IP solutions to fit different process nodes and technological requirements, aiding in both rapid deployment and scalability of digital systems. This makes their offerings especially attractive to clients requiring high-end security implementations without compromising on performance or reliability.

VeriSyno Microelectronics Co., Ltd.
Cryptography Cores, Embedded Memories, Embedded Security Modules, NVM Express, Security Protocol Accelerators, Security Subsystems, V-by-One
View Details

Secure Protocol Engines

Secure Protocol Engines by Secure-IC focus on enhancing security and network processing efficiency for System-on-Chip (SoC) designs. These high-performance IP blocks are engineered to handle intensive security tasks, offloading critical processes from the main CPU to improve overall system efficiency. Designed for seamless integration, these modules cater to various applications requiring stringent security standards. By leveraging cryptographic acceleration, Secure Protocol Engines facilitate rapid processing of secure communications, allowing SoCs to maintain fast response times even under high-demand conditions. The engines provide robust support for a broad range of security protocols and cryptographic functions, ensuring data integrity and confidentiality across communication channels. This ensures that devices remain secure from unauthorized access and data breaches, particularly in environments prone to cyber threats. Secure Protocol Engines are integral to designing resilient systems that need to process large volumes of secure transactions, such as in financial systems or highly regulated industrial applications. Their architecture allows for scalability and adaptability, making them suitable for both existing systems and new developments in the security technology domain.

Secure-IC
AMBA AHB / APB/ AXI, CXL, DSP Core, Embedded Security Modules, Error Correction/Detection, Ethernet, I2C, IEEE1588, PCI, RapidIO, Security Protocol Accelerators, USB, V-by-One
View Details

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

CANsec Controller Core

The CANsec Controller Core is an advanced security solution specifically tailored for the Controller Area Network (CAN) bus protocols commonly used in automotive applications. This core enhances the integrity and confidentiality of CAN network communications through robust encryption mechanisms, safeguarding against potential cyber threats. Designed for high compatibility, the CANsec Controller integrates smoothly into existing CAN infrastructures without the need for extensive reconfiguration. This adaptability allows automotive manufacturers to retrofit older models with contemporary security standards, thereby extending the lifecycle and safety of vehicles across all market segments. With its high-speed encryption and decryption processes, the CANsec Controller ensures real-time communications are not compromised. This efficiency is crucial in maintaining the latency constraints necessary for vehicle operations, especially as industries move towards more autonomous functionalities. The core's ability to secure internal communications helps manufacturers address growing cybersecurity concerns in today's connected vehicle landscape, ensuring secure data exchange within vehicular networks.

Fraunhofer Institute for Photonic Microsystems (IPMS)
CAN, CAN XL, CAN-FD, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Temperature Sensor
View Details

MACsec

Comcores' MACsec solution addresses the needs for secure communication on Ethernet links by implementing the IEEE 802.1AE standard for MAC Security. It provides comprehensive protection against eavesdropping and manipulation, making it suitable for applications demanding high security over public and private networks. Built to support various data rates, the MACsec IP core integrates robust cryptographic suites like AES-GCM to encrypt and authenticate network traffic. Its deployment ensures data confidentiality and integrity, fostering a secure environment for transmitting sensitive information such as in military communication systems and data centers.

Comcores
Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

MERA Compiler and Framework

EdgeCortix’s MERA Compiler and Software Framework serves as a comprehensive platform for deploying neural network models across various systems. It facilitates AI inference by combining the Dynamic Neural Accelerator (DNA) technology, offering tools like APIs, a code generator, and runtime capabilities essential for implementing pre-trained deep neural networks. The framework is engineered to tackle innovative generative AI applications, accommodating a spectrum of leading processors, such as AMD, Intel, Arm, and RISC-V, ensuring speedy integration into existing infrastructures. MERA stands out by supporting an array of ML frameworks, including TensorFlow Lite and ONNX, and offering native interfaces for Python and C++ to customize AI workflows. It simplifies the development and deployment process with post-training model calibration and quantization. The inclusion of Apache TVM and MLIR adds flexibility, allowing developers to advance from modeling to deployment with ease. The framework is integral to the company's suite of offerings as it optimizes neural network computation, resource allocation, and execution order, all within a runtime reconfigurable architecture. The MERA platform thus grants software developers the ability to focus on AI model refinement without getting entangled with hardware intricacies, dramatically reducing latency and boosting throughput efficiency.

EdgeCortix Inc.
AI Processor, AMBA AHB / APB/ AXI, Coprocessor, Gen-Z, Processor Core Independent, Security Protocol Accelerators, Vision Processor
View Details

OTP Technology

Chuangfeixin Technologies' OTP (One-Time Programmable) solutions provide a unique approach to secure data storage. Once programmed, the data within these OTP devices is immutable, providing a robust layer of security ideal for protecting intellectual property and sensitive information within integrated circuits or logic gates. These solutions are particularly advantageous in embedded applications, where they can safeguard firmware and configuration data against unauthorized access or alteration. The company offers versatile OTP products compatible with various CMOS processes, ensuring easy integration without additional processing steps, thus reducing development costs. The long data retention of over 100 years under extreme conditions further underscores the reliability of these OTP modules in demanding applications.

Chuangfeixin Technologies
Embedded Memories, Embedded Security Modules, NAND Flash, Security Protocol Accelerators, Standard cell
View Details

PhantomBlu - Tactical Communications

PhantomBlu by Blu Wireless represents a cutting-edge advancement in tactical defense communications. This mmWave technology solution is expertly constructed to deliver stealthy, gigabit-level connectivity on the move, supporting high-speed tactical operations. PhantomBlu's low SWAP (Size, Weight, and Power) tactical solutions, configurable as PCP (hub) or STA (client), align with dynamic defense needs by providing dependable communications at range. The system capitalizes on spectrum availability and equipment flexibility, offering interoperability for both legacy systems and future assets without dependence on traditional networks. This capability makes PhantomBlu an invaluable tool for military forces requiring swift, secure, and adaptable communications to maintain operational efficacy in complex environments. The PhantomBlu system plays a pivotal role in transforming how modern military operations are conducted by seamlessly integrating with existing communications bases and enhancing mission-based applications. The flexibility of the configurable options supports high-performance execution, ensuring that military communication networks are responsive and robust in the face of evolving tactical demands.

Blu Wireless Technology Ltd.
24 Categories
View Details

Security Protocol Accelerator

The Security Protocol Accelerator by PQSecure is engineered to enhance the execution of various cryptographic protocols by offloading complex computation tasks from the main CPU, thereby accelerating the overall process. This specialized hardware component streamlines cryptographic operations such as encryption, decryption, and key exchanges, delivering faster and more reliable security processes. Designed to support a wide array of cryptographic protocols, including both symmetric and asymmetric types, the Security Protocol Accelerator is pivotal for organizations aiming to integrate high-speed security measures without compromising performance. It can be seamlessly integrated into existing network infrastructures, providing a scalable solution for enhancing secure communications in real-time applications. By implementing this accelerator, enterprises can expect significant improvements in handling secure transactions, reducing latency, and achieving lower power consumption compared to software-only implementations. This is particularly beneficial for environments with demanding processing requirements, such as data centers and cloud computing platforms, where efficient performance is crucial.

PQSecure Technologies, LLC
AMBA AHB / APB/ AXI, Cryptography Cores, Embedded Security Modules, I/O Library, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Cryptographic Core

PQSecure offers cryptographic cores that serve as the backbone for secure data transmission and encryption processes. These cores are designed to perform a range of cryptographic functions, including symmetric and asymmetric encryption, which are critical for secure communications in a quantum-safe world. The design of these cores focuses on flexibility and efficiency, allowing them to be tailored to meet the specific needs of varied applications and environments. These cores are built to support multiple standards and cryptographic algorithms, accommodating both classical and post-quantum encryption methods. This adaptability ensures they can maintain security in the face of evolving computational threats. The Cryptographic Core is also optimized for integration into existing systems, providing seamless compatibility across a range of platforms from lightweight embedded devices to robust server environments. Additionally, the Cryptographic Core is crafted with hardware security measures to mitigate risks such as unauthorized access and data tampering. With its robust design and comprehensive feature set, the core is a vital component for any system requiring high assurance in security, especially in sectors where data integrity is paramount, including finance, government, and healthcare.

PQSecure Technologies, LLC
10 Categories
View Details

MACSec

CoMira Solutions offers a Media Access Control Security (MACSec) solution adhering to IEEE standards aimed at safeguarding communication within 802.1 LAN environments. MACSec ensures data confidentiality and integrity, preventing unauthorized access and disruptions. It employs advanced encryption standards and supports flexible traffic management through various port configurations. The MACSec IP's time-division multiplexed architecture aligns seamlessly with CoMira's UMAC, ensuring synchronous operation despite differing link speeds. This implementation includes FIPS-compliant encryption methods such as GCM-AES-128 and GCM-AES-256, supporting robust security needs. Furthermore, CoMira's MACSec supports multiple secure channels and security associations per port, adding layers of protection to client systems. The configurability of Secure Channels and the ability to strip security tags enhances its adaptability in varied networking scenarios, reflecting CoMira's commitment to delivering tailor-fit security solutions.

CoMira Solutions
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is an integrated security solution that enhances digital asset security through its advanced ReRAM technology. Built with the capability for Multi-Party Computation (MPC), the Cramium PHSM provides robust key protection by eliminating the need for key reconstruction, thus reducing vulnerability to attacks. Utilizing FIDO2 authentication, the module is designed with an offline-by-default architecture, ensuring high assurance levels in protecting sensitive data. This protection is particularly crucial for applications operating within decentralized systems where security is paramount. Combining innovative memory and cryptographic technology, the Cramium PHSM is crafted to meet varying compliance needs, making it ideal for industries such as finance, healthcare, and information technology. The module enhances tamper resistance for cryptographic operations, ensuring secure storage and operation of sensitive information within protected environments. One of its unique features is the ability to offer robust authentication without relying on external network connectivity, effectively insulating assets from unauthorized access. Cramium PHSM exemplifies CrossBar's commitment to developing secure solutions for complex challenges presented by modern computational demands. Its modular design enables easy customization and integration, catering to specific industry requirements and assuring enterprises of enhanced cryptographic functionalities. The module not only safeguards digital secrets but also introduces an improved fault-tolerant element that minimizes risk from potential breaches or exploits.

CrossBar Inc.
Cryptography Software Library, Embedded Security Modules, NVM Express, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiCrypt

FortiCrypt offers a robust and secure cryptographic framework specifically designed to thwart side-channel and fault injection attacks. This suite of cryptographic IP includes advanced protection mechanisms that ensure both high security and performance across various platforms. The IP core is meticulously engineered to deliver ultra-low power consumption, making it ideal for battery-operated and IoT devices. The FortiCrypt product line is versatile, supporting a wide array of cryptographic algorithms, including both classical and post-quantum variations. It integrates seamlessly with existing systems, requiring minimal integration overhead, and is validated to withstand real-world attacks. Its high bandwidth capacity, achieved through multi-pipeline architecture, makes FortiCrypt suitable for high-performance applications, ensuring rapid data throughput without compromising security. Furthermore, FortiCrypt's compliance with the highest industry standards, such as FIPS 140-3 and SESIP, assures its usage in applications requiring stringent security measures. Whether used for secure communication, data protection, or hardware defense, FortiCrypt establishes a fortress against unauthorized access and data breaches, demonstrating unparalleled resilience and efficiency.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

AES Crypto

The AES Crypto core from Dillon Engineering offers robust encryption capabilities tailored for secure communications and data protection. Designed to implement the Advanced Encryption Standard (AES), this core is perfect for safeguarding sensitive information across various digital platforms. Known for its reliability and security, the AES core ensures that encryption operations are performed with high efficiency and minimal latency. With a strong focus on protection, the AES Crypto core integrates advanced cryptographic algorithms that provide a secure environment suitable for financial transactions, secure data storage, and confidential communication. The core's architecture supports various key lengths and modes of operation, accommodating the diverse security needs of users. Committed to maintaining data integrity and confidentiality, this core balances performance with heightened security measures. Able to fit into a range of systems, it provides robust solutions that meet stringent industry standards, making it a preferred choice for applications that require uncompromised data protection.

Dillon Engineering, Inc.
Tower Jazz, X-Fab
10nm, 110nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators
View Details

FortiPKA-RISC-V

FortiPKA-RISC-V is a powerful public key algorithm coprocessor designed to enhance cryptographic operations through streamlined modular multiplication techniques. This IP core offers robust protection against side-channel and fault injection attacks, ensuring high performance by eliminating Montgomery domain transformations. Engineered to maximize efficiency, FortiPKA-RISC-V supports a variety of cryptographic protocols, making it suitable for applications demanding high-speed data processing with minimal latency. Its architecture ensures seamless integration into systems requiring secure key exchanges and digital signature verifications, showcasing versatility across different computational platforms. Additionally, this coprocessor is built with a focus on reducing hardware footprint, making it ideal for space and power-conscious applications such as embedded systems and mobile devices. By aligning with industry-standard cryptographic requirements, FortiPKA-RISC-V provides an effective solution for environments requiring elevated security without compromising on computational speed or area efficiency.

FortifyIQ
11 Categories
View Details

Low Power Security Engine

The Low Power Security Engine offers a compact yet comprehensive solution for securing IoT devices. This hardware acceleration engine provides efficient processing capabilities for encryption, hash computations, and cryptographic operations like elliptic curve scalar multiplication. Engineered for minimal power usage and to withstand side-channel and timing attacks, it features built-in support for protocols such as ECDHE and ECDSA, ensuring that devices remain secure against sophisticated threats while optimizing performance in constrained environments.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Other, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr Key Management System

The Securyzr Key Management System by Secure-IC is designed to provide robust management and protection of cryptographic keys within a wide array of systems. This system ensures that sensitive keys are securely generated, stored, and distributed, preventing unauthorized access and misuse while maintaining data confidentiality and integrity. Incorporating a variety of security mechanisms, the Securyzr Key Management System supports end-to-end encryption protocols and enables secure communication between devices. It is particularly beneficial for applications that demand high security, such as financial services, healthcare, and critical infrastructure. The system ensures compliance with international security standards, facilitating smooth implementation into existing IT infrastructures. The solution's flexibility allows for scalable deployment across different networks and systems, ensuring an adaptable approach to key management. By integrating this system, organizations can simplify the process of securing their keys, reduce the risk of breaches, and enhance their overall cyber defense posture. Enhanced features like lifecycle management and audit abilities make it a valuable tool for maintaining high security standards over time.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Stellar Packet Classification Platform

Designed for ultra-high search performance, the Stellar Packet Classification Platform plays a crucial role in FPGA environments where the sorting and management of network traffic is required. It uses intricate access control lists (ACL) and longest prefix match (LPM) methodologies to execute complex rule-based searches. This platform supports workloads of hundreds of millions of lookups per second, with key capabilities ranging from 25Gbps to over 1Tbps. This high-speed search functionality is enhanced by support for extensive rule sets and live updates, ensuring the platform remains adaptive to real-time data and network demands. The technology's ability to handle up to 480b keys further underlines its suitability for network-intensive solutions. Its applications span a wide sphere, from 5G infrastructure and BNG setups to firewall and anti-DDoS systems. For environments needing robust IPv4/v6 address lookups and efficient routing, the Stelllar Platform provides a comprehensive solution for maintaining high reliability and security within modern data-intensive contexts.

Peraso Inc.
15 Categories
View Details

ONNC Compiler

The ONNC Compiler is a robust compilation tool designed for optimizing AI models, particularly neural networks, for efficient deployment on hardware accelerators. This compiler is capable of translating high-level AI models into optimized code that makes the best use of the underlying silicon architecture, ensuring reduced power consumption and increased processing performance. One of the key features of the ONNC Compiler is its support for a wide array of neural network models and architectures, facilitating versatile applications across different AI domains. It provides developers with flexibility and control over the compilation process, allowing for optimizations that align closely with specific hardware capabilities and constraints. The ONNC Compiler is integrated into Skymizer's suite of tools to support seamless deployment of AI solutions, reducing the complexity and time associated with bringing AI models from development stages to fully functioning applications. This integration ensures high efficiency and scalability, making it an essential tool for enterprises looking to maximize their AI hardware investments.

Skymizer
10 Categories
View Details

Security Protocol Accelerators

Synopsys' Security Protocol Accelerators are designed to enhance the security of data transmission by accelerating encryption and decryption processes across networks. These accelerators are optimized to handle complex cryptographic algorithms efficiently, ensuring secure data transfer in applications such as enterprise networks, cloud services, and secure storage. By integrating these accelerators, systems can achieve robust security protocols without compromising on speed or performance.

Synopsys, Inc.
Content Protection Software, Cryptography Cores, Security Protocol Accelerators
View Details

ReRAM Secure Keys

ReRAM Secure Keys from CrossBar deliver an innovative solution for secure computing, utilizing the unique properties of resistive random-access memory (ReRAM) to generate physically unclonable function (PUF) keys. These keys offer robust security, providing a high degree of randomness and stability essential for safeguarding modern electronic devices. CrossBar's secure keys adapt smoothly into existing semiconductor processes, particularly where traditional embedded flash memory solutions falter at smaller node sizes. Designed to withstand varied environmental conditions, ReRAM-based PUF keys resist tampering and sidestep the vulnerabilities associated with other traditional memory systems. They do not suffer from RF interference, providing an enhanced layer of security crucial for applications in automotive, data center, and industrial sectors. These secure keys reflect the powerful integration potential of ReRAM technology, ensuring data integrity under a wide range of operational environments. By leveraging the predictable characteristics of ReRAM, CrossBar ensures that these keys protect sensitive information against unauthorized extraction and mimicry. The secure key technology bolsters cryptographic processes, instilling confidence in secure boot and trusted platform modules. This innovative application of ReRAM underscores its versatility, enabling a new era of security measures in computational and smart device ecosystems.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Other, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Geon Secure Execution Processor

The Geon Secure Execution Processor is a sophisticated security solution designed to offer cryptographic protection for sensitive data. Built on the proven BA22 architecture, this processor delivers superior processing efficiency, achieving 1.79 DMIPS/MHz and operating at speeds exceeding 450 MHz in 65 nm technology. Its design ensures cryptographic isolation of data, which is crucial for maintaining security across diverse applications. This processor is verified at the system level, making it suitable for various security demands. It incorporates multiple secure elements to protect against unauthorized access while maintaining optimal performance metrics. The Geon processor is an integral part of Beyond Semiconductor's robust security offerings, reflecting the company's commitment to providing comprehensive security solutions tailored to modern technological demands. By seamlessly integrating cryptographic safeguards, the Geon processor stands out as an indispensable asset for systems requiring a high level of data security and integrity. Its ability to function efficiently under demanding conditions makes it a preferable choice for developers aiming to protect their systems against evolving cyber threats.

Beyond Semiconductor
TSMC
65nm
CPU, Cryptography Cores, Embedded Security Modules, Processor Cores, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

Integrated Secure Element

The Integrated Secure Element (iSE) from Secure-IC serves as a comprehensive Root of Trust within System-on-Chip (SoC) architectures, delivering a fundamental layer of security. Embedded directly into the primary chip, the iSE facilitates essential security services such as secure boot, key management, and anti-tamper protection, providing a resilient shield against potential vulnerabilities. This technology is vital for ensuring that digital devices remain protected against both physical and digital intrusions. By isolating and protecting security-critical processes and information, the iSE helps maintain the integrity and confidentiality of data. It is highly valued in industries like automotive, IoT, and consumer electronics, where safeguarding data integrity and operational reliability is crucial. As cyber threats evolve, the iSE evolves with them, incorporating the latest encryption standards and defensive techniques. Its flexibility and robust architecture allow it to be deployed across various applications, making it a cornerstone of secure system design. Companies leverage the iSE to adhere to stringent security standards and maintain compliance with global security certifications.

Secure-IC
Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Side-channel Attack Resistance

Side-channel Attack Resistance technology by FortifyIQ focuses on defending cryptographic systems against unauthorized data breaches through physical observation. This protection suite is essential for devices targeted by side-channel metrics like power usage, electromagnetic emissions, or timing discrepancies, ensuring that sensitive data remains secure from spillover attacks. Developed with a keen understanding of modern attack vectors, this technology employs advanced countermeasures crafted from algorithmic optimizations and hardware-level enhancements. Each design component is thoroughly tested to close any vulnerabilities, protecting cryptographic keys and operations even under intense scrutiny from external attackers. FortifyIQ's Side-channel Attack Resistance solutions are a staple for environments with stringent security requirements, such as government, financial institutions, and defense sectors. By integrating these defenses, manufacturers can prevent leakage of critical information during cryptographic processes, maintaining a high level of trustworthiness and cyber resilience.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Secure Hash Function Core

The SHA-3 Secure Hash Function Core is a fundamental building block for cryptographic operations, conforming to the latest security standards, including FIPS 180-4 and FIPS 202. This core supports a comprehensive range of standard functions such as SHA3-224, SHA3-256, SHA3-384, SHA3-512, and the extendable-output functions SHAKE-128 and SHAKE-256. It operates efficiently with up to 48 Mbit/MHz throughput and uses a minimal gate area of just 28,000, providing a compact yet powerful solution for embedding in security-critical applications. The flexibility in its design ensures it can be effectively incorporated into a variety of systems, offering high performance without excessive resource usage. The SHA-3 core represents a secure solution for developers needing robust cryptographic integrity within their systems, balancing high-speed processing with compactness and economic use of silicon real estate.

Beyond Semiconductor
TSMC
130nm
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

FortiMac

The FortiMac suite provides advanced cryptographic solutions specifically designed for rigorous protection against differential power analysis and fault injection attacks. This IP core specializes in HMAC SHA2-based applications, offering state-of-the-art security features that ensure both reliability and compactness. FortiMac's strength lies in its use of algorithmic defenses that are resistant to advanced side-channel attacks. The IP is highly adaptable, suitable for integration in both new and existing security systems. By minimizing power usage and gate count, FortiMac is an optimal choice for devices with stringent power and area constraints, delivering efficient performance without sacrificing security integrity. This product supports all major SHA2 hash functions, providing flexibility for developers and ensuring comprehensive protection for various cryptographic operations. Additionally, the IP is crafted to align with the highest security certifications, making it a trusted choice for secure communication and data integrity in sensitive sectors such as finance, telecommunications, and defense.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

HMAC–SHA256 Accelerator

The HMAC–SHA256 Accelerator offered by Chevin Technology is a hardware-optimized solution crucial for operations requiring high-level cryptographic security. It ensures the integrity and authenticity of data through hashing and message authentication, proving essential in secure communications and data protection solutions. Designed for environments with stringent security requirements, this accelerator efficiently processes HMAC and SHA256 calculations, drastically reducing the computational burden on software implementations. Its robust design allows for continuous operation under high loads, making it ideal for cloud services, secure financial applications, and highly regulated industries needing strong data authentication measures. This cryptographic tool is easily integrated into existing hardware setups, promoting scalability and security without compromising on performance. The integration of such security features onto FPGAs reduces risks associated with digital transformation while enhancing the overall security posture of businesses implementing these solutions.

Chevin Technology
Cryptography Cores, Security Protocol Accelerators
View Details

Agile Secure Element

The Agile Secure Element IP is a versatile security enclave designed for straightforward integration into SoCs, providing essential elements for secure operations. This customizable IP includes a secure processor, cryptographic engines, and mechanisms for key storage and trusted execution, tailored to fit a wide range of system architectures. It supports a variety of cryptographic standards, including symmetric and asymmetric algorithms, while offering configuration options for post-quantum cryptography. Its modularity and compliance-readiness position it as an optimal solution for enhancing the security posture of complex multi-core systems and embedded applications.

Crypto Quantique
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QRoot Lite

QRoot Lite is a lightweight and configurable root-of-trust IP tailored for resource-constrained microcontrollers and IoT devices. The solution provides comprehensive security features such as secure boot, device attestation, and sealed storage, all in alignment with the TCG MARS specification. Designed to minimize silicon footprint, QRoot Lite integrates seamlessly via standard industry interfaces, ensuring a rapid and cost-effective implementation conducive to meeting regulatory compliance standards. This IP is ideal for integrating secure elements in low-power and cost-sensitive environments, offering a secure solution for modern connected devices.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

iShield Key

The iShield Key is a versatile security solution designed to offer both digital and physical access control in one device. It simplifies authentication processes for IT systems, buildings, or secure printing solutions by integrating seamlessly into everyday workflows. The device supports features such as website, application, and online service security, making it an all-encompassing security key.

Swissbit AG
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt