Is this your business? Claim it to manage your IP and profile
The SHA-3 Crypto Engine is a robust hardware accelerator specifically designed for cryptographic hashing functions. It presents a balance of high throughput and area efficiency and aligns with the FIPS 202 standards set by NIST. This engine supports all SHA-3 hash functions, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, as well as SHAKE-128 and SHAKE-256. Built to mitigate security vulnerabilities, it provides comprehensive defense against time-based side-channel attacks, ensuring data integrity. Operating within a single clock domain, the SHA-3 Crypto Engine is adequately verified, boasting automatic byte padding and effortless integration into existing systems. Its versatility spans numerous applications ranging from Message Authentication Codes (MACs) to protocol engines like IPsec and TLS/SSL, alongside secure boot engines and encrypted data storage solutions. Through integrating this engine, clients can guarantee the integrity and security of financial transactions, e-commerce platforms, and even blockchain applications. Delivered in System Verilog RTL with supportive testbenches and integration examples, the SHA-3 Crypto Engine offers straightforward deployment while maintaining compliance with industry standards. Its resource utilization spans a variety of FPGA families such as AMD Spartan, Kintex-7, and AMD Zynq MPSoC, presenting adaptability and efficiency across diverse platforms.
The Keccak Hash Engine is renowned for its adaptability and capability, primarily recognized as a cryptographic hash function. Its core structure is based on a unique sponge construction featuring the Keccak-f cryptographic permutation, allowing for extensive customization in output length and security strength. This flexibility has secured its adoption in mobile telephony standards like 3GPP TS 35.231 and NIST standards, namely FIPS 202 and SP 800-185. Capable of executing hash functions and providing support for authentication, encryption, and pseudo-random number generation, the Keccak Hash Engine is a versatile asset in various cryptographic applications. Its design rests on simplicity and ease of integration, coupled with a single clock domain to ensure seamless deployment and operation across platforms. Due to its extensively verified code, the Keccak Hash Engine is dependable for applications demanding high security levels, like blockchain, random number generation, and authentication protocols. Available in System Verilog RTL, it is suitable for diverse industrial applications that demand robust cryptographic functions adaptable to evolving security needs.
The KiviPQC-KEM is an advanced cryptographic solution developed for the post-quantum era, designed to support all ML-KEM variants standardized under NIST's FIPS 203. This IP core performs key operations necessary for key generation, encapsulation, and decapsulation, ensuring robust defenses against quantum computer attacks. The engine is a central asset in post-quantum cryptography, facilitating secure secret key establishment over public channels. Targeted for integration within ASIC and FPGA systems, the KiviPQC-KEM distinguishes itself with its minimalistic logic utilization and efficient resource management. It incorporates hardware acceleration to bolster performance during computationally intense tasks, bridging the gap between security needs and computational capabilities. KiviPQC-KEM is encapsulated as a standalone unit, allowing easy integration without extensive resources. Applications for this core cover a broad spectrum of secure communications, from quantum-resistant networks to electronic transactions. It also features seamless compatibility with network security protocols like MACsec, IPsec, and transport protocols such as TLS and SSL. The KiviPQC-KEM is delivered with comprehensive supporting documentation and source codes, ensuring that it meets the needs of developers seeking robust, quantum-safe solutions.
Learn about integrating robust encryption practices in SoC designs to safeguard data at all stages and shield your devices from cyber threats. Read more
Join the world's most advanced semiconductor IP marketplace!
It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!
Join the world's most advanced AI-powered semiconductor IP marketplace!
It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!
Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!
To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.