Is this your business? Claim it to manage your IP and profile
The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing functions, featuring high throughput and area efficiency. Compliant with NIST's FIPS 202 standard, it supports the full suite of SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512. The engine also handles extendable output functions (XOF) like SHAKE-128 and SHAKE-256. Designed for security-critical applications, it offers full protection against timing-based side-channel attacks and operates within a single clock domain. This IP core is ideal for tasks requiring data integrity and secure authentication, such as blockchain, IPsec, and e-commerce. The SHA-3 IP core excels in various applications, from cryptographic hashing for Message Authentication Codes (MAC) and secure boot engines to encrypted data storage solutions and financial transaction systems. Its synchronous design and extensive verification make it highly reliable for maintaining data integrity across diverse protocols including TLS/SSL. Designed to integrate seamlessly into any FPGA or ASIC, it ensures maximal security and performance. Noteworthy features include automatic byte padding and an AMBA AXI4-Stream interface, facilitating easy implementation. With its proven resource efficiency, it serves a multitude of industries seeking robust cryptographic solutions. The SHA-3 engine is versatile enough for numerous security applications, maintaining performance efficiency even under demanding conditions.
The Keccak Hash Engine IP Core serves as a flexible and versatile cryptographic function suitable for a variety of applications beyond hashing, including encryption, authentication, and pseudo-random number generation (PRNG). The core uses the innovative sponge construction, particularly the Keccak-f cryptographic permutation, providing excellent security and adaptability. Standardized by NIST and utilized in 3GPP TS 35.231 for mobile telephony, Keccak is adaptable to different output lengths and security levels, making it ideal for diverse industrial applications like blockchain and secure communications. Its design simplifies integration and coding practices, featuring a single clock domain for seamless deployment. The IP core ensures flexibility and robust security, allowing easy configuration to meet specific security requirements. It is extensively verified for secure use in various protocols, offering consistent and reliable performance in maintaining data integrity and encryption tasks.
The KiviPQC-KEM is a cutting-edge cryptographic IP Core tailored for post-quantum security requirements, offering robustness against quantum attacks. It supports ML-KEM Key Encapsulation, enabling secure key exchanges over public channels, fully compliant with NIST's FIPS 203 standards. This IP Core provides essential hardware acceleration for ML-KEM operations, optimizing key generation, encapsulation, and decapsulation processes. Designed to ensure minimal logical footprint, it operates with high efficiency and flexibility, integrating seamlessly into existing ASIC and FPGA systems without compromising performance. KiviPQC-KEM's features make it indispensable for developing quantum-resistant networks, enhancing public key infrastructures, and securing electronic transactions. The core is particularly noted for its cost-efficiency and resource optimization, presenting a versatile solution for future-proofing embedded systems against evolving cryptographic threats.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.