Is this your business? Claim it to manage your IP and profile
The SHA-3 Crypto Engine offers a robust hardware acceleration solution for cryptographic hashing functions. Its design prioritizes high throughput and efficient resource utilization, complying with NIST’s FIPS 202 standards. The core supports various SHA-3 hash functions including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, alongside Extendable Output Functions (XOF) like SHAKE-128 and SHAKE-256. This comprehensive support makes it a versatile tool for ensuring data integrity and authentication in a multitude of applications. A key feature of the SHA-3 Crypto Engine is its protection against timing-based side channel attacks, offering a secure cryptographic environment. Fully synchronous in design, it operates within a single clock domain, ensuring stability and reliability across different platforms. Its applications span various domains such as secure boot engines, IPsec and TLS/SSL protocol engines, and even blockchain technologies. The core has been extensively verified and includes features such as automatic byte padding, making it an adaptable solution across a wide range of applications. It’s designed to be implemented on both FPGAs and ASICs, ensuring flexibility and adaptability in various deployment scenarios.
The Keccak Hash Engine is a versatile IP core known for its role in guaranteeing data security through a variety of cryptographic operations. This core is not just limited to hashing functions but extends its capabilities to include authentication, encryption, and pseudo-random number generation. Fundamental to its design is the use of the sponge construction and the innovative Keccak-f cryptographic permutation. This IP core stands out for its flexibility, allowing for customization in hash output lengths and security levels. Standardized under widely recognized protocols like NIST's FIPS 202, the Keccak Hash Engine has undergone thorough scrutiny ensuring its robustness. The design is optimized for seamless integration into existing systems, operating efficiently within a single clock domain. The Keccak Hash Engine’s applications extend across various sectors, providing essential security functions for systems like blockchain, PRNG, and more. Its configurability means it can adapt to numerous scenarios, maintaining high security standards as required by different applications.
The KiviPQC-KEM is a post-quantum cryptographic IP core designed for the future of secure communications. It implements the ML-KEM Key Encapsulation Mechanism, which is a robust algorithm resistant to quantum computing attacks. This IP core is capable of executing key generation, encapsulation, and decapsulation operations as per the NIST FIPS 203 standard. Highly efficient in performance, the KiviPQC-KEM operates with minimal logic utilization making it cost-effective for clients. It offers high-level security by providing hardware acceleration for computationally demanding tasks, minimizing vulnerabilities and ensuring maximum protection in communications. Ideal for applications that prioritize quantum-resistance, the KiviPQC-KEM is suitable for securing network infrastructures, transport protocols like TLS and SSL, and electronic transactions. The architecture facilitates easy integration into a wide range of platforms, supporting both FPGA and ASIC implementations.
Learn about integrating robust encryption practices in SoC designs to safeguard data at all stages and shield your devices from cyber threats. Read more
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
No credit card or payment details required.
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.