Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

Foresemi Microelectronics (Shenzhen) Co., Ltd

Foresemi is dedicated to the systematic development of cross-disciplinary technologies to establish “Silicon-to-Software” closed-loop capabilities in security, efficiency, and compliance. Based on the silicon-proven DesignHaven™ series of security and safety IPs (including international and Chinese cryptographic algorithms, TRNG, PUF, Error Correction Code (ECC) algorithms, CIM-based PQC algorithms, etc.), Foresemi’s innovative CryptCompiler® platform can automatically generate and optimize the hardware security subsystem IP and firmware security IP packages. With the CryptCompiler® platform, IP delivery time is significantly reduced from weeks to minutes, ensuring higher quality, smaller area, lower power consumption, and faster security application development. This accelerates the integration of security subsystems into SoC chips and the development of security-driven applications, reducing cost and shortening time-to-market (TTM). Read more

Get instant access to our world class semiconductor IP

Our IP is hosted on Silicon Hub, letting you download trial versions instantly. Browse our IP below, or find out more.

Log in to Silicon Hub to buy and sell semiconductor IP
5
IPs available

DesignHaven Security IP

Foresemi's DesignHaven™ security IP series is mainly used to protect hardware data security, including mainstream international and domestic cryptographic algorithm computing modules that meet major standards. The series supports cutting-edge technologies such as CryptRoT and PQC based on CIM, deployable in ASIC or FPGA. Foresemi offers both independent IP and subsystem-level solutions compatible with ARM or RISC-V CPU. Features include Public Key Cryptography, Symmetric cipher SCE, and True Random Number Generators.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Security Subsystems
View Details

TRNG - True Random Number Generator

TRNG (True Random Number Generator) includes random source, post-processing algorithm, failure detection, and random number health monitoring based on digital standard units, which is in line with the National Secret Level 1 & 2/NIST/AIS standards. The module supports a standard AMBA bus for quick integration into the SoC.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Security Protocol Accelerators
View Details

HASH - Hash Function Engine

HASH (Hash Function Engine) is used to calculate mainstream international and domestic hash functions (hash algorithms) and supports HMAC operation mode. HASH provides an optional physical attack protection design and can support module-specific DMA. The module supports a standard AMBA bus for quick integration into the SoC. This engine includes features such as dedicated high-speed DMA, interleaving context management, and physical attack protection against DPA and FI attacks. Supported algorithms include SHA1, SHA2, SHA3, SM3, HMAC, BLAKE, and Uncle 12/Uncle20 Poly1305.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Cryptography Cores
View Details

SCE - Symmetric Cipher Engine

SCE (Symmetric Cipher Engine) is used to calculate mainstream international & domestic symmetric cryptographic algorithms, and provides a variety of operation modes. SCE provides multiple versions such as ultra-low area, pipeline, and ultra-high-performance multi-core pipeline, and provides options for physical attack protection design, which can support module-specific DMA. SCE can be integrated into the SoC via a standard AMBA bus or into a data encryption path such as DDR, PCIe, CXL, and other high-speed interfaces.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Cryptography Cores
View Details

Public Key Cryptography PKA/PKE

The public key cryptography module is mainly used to calculate RSA and elliptic curve ECC, covering RSA1024–4096, SECP prime domain curve, SM2 curve, Brainpool curve, and 25519 curve. PKA (Public-Key Accelerator) is used to calculate complex modulo operations and point operations in public key cryptography, and the protocol part is assembled by the firmware. PKE (Public-Key Engine) not only includes the functions of PKA, but also hardens the operation of some protocols to maximize the computing power of the CPU. PKA/PKE is available in multiple versions, including ultra-low area and ultra-high performance, and provides options for physical attack protection design. The module supports a standard AMBA bus for quick integration into the SoC.

Foresemi Microelectronics (Shenzhen) Co., Ltd
All Foundries
All Process Nodes
Cryptography Cores
View Details

Latest News About Foresemi Microelectronics (Shenzhen) Co., Ltd

Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt