Is this your business? Claim it to manage your IP and profile
The SHA-3 Crypto Engine is a high-performance hardware accelerator designed to handle cryptographic hashing functions efficiently. It fully complies with NIST's FIPS 202 standard and supports all standard SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions such as SHAKE-128 and SHAKE-256. This IP core is engineered to offer robust security measures, including protection against time-based side-channel attacks, and features automatic byte padding. Operating within a single clock domain, it has undergone thorough verification to ensure reliability. Its noteworthy versatility makes it suitable for diverse applications like message authentication codes, secure boot engines, TLS/SSL protocol engines, blockchain systems, and pseudo-random bit generation. The SHA-3 Crypto Engine provides a seamless integration into systems, with AMBA® AXI4-Stream support and a fully synchronous design, enabling compatibility with both FPGA and ASIC platforms. Moreover, its comprehensive deliverables include Verilog RTL source code, extensive testbenches, integration examples, and support resources.
The Keccak Hash Engine serves as a cornerstone for cryptographic functions, primarily recognized for its hashing capabilities. However, its utility extends significantly into domains requiring authenticated encryption and pseudo-random number generation. Built upon the innovative sponge construction and leveraging the Keccak-f cryptographic permutation, the Keccak Hash Engine provides unmatched configurability and adaptability. Its extensive standardization under 3GPP TS 35.231 for mobile telephony (TUAK) and NIST's FIPS 202 and SP 800-185, emphasizes its flexibility. The IP core is engineered to function within a single clock domain, allowing for seamless integration and extensive verification to meet industry standards. Its ability to support different output lengths and security levels positions it as a versatile tool across various applications. Keccak Hash's scope of application is diverse, encompassing hash functions, authenticated encryption, secure communication protocols, pseudo-random number generation, and blockchain technology. Its adaptability and robust construction make it an integral component in safeguarding digital data.
The KiviPQC-KEM is a groundbreaking IP core that offers cutting-edge post-quantum cryptographic capabilities. Designed to withstand quantum computer attacks, it supports all ML-KEM variants as standardized by NIST in FIPS 203, facilitating secure key encapsulation mechanisms. This IP core is intended to enable two parties to establish a shared secret key securely over public channels. KiviPQC-KEM's strength lies in its resource efficiency and minimal logic utilization, which enables cost-effective hardware acceleration. The standalone nature of the IP core ensures that it can be integrated into various SoC platforms for ASIC or FPGA implementation, maintaining flexibility in deployment while ensuring performance integrity. Applications for the KiviPQC-KEM are numerous, spanning quantum-resistant networks, secure public key infrastructures, and secure communications over protocols like MACsec, IPsec, TLS, and SSL. It's constructed to handle computationally intensive operations with robust protection against side-channel attacks, ensuring data remains secure from inception to execution.
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.