Design & Reuse
12 IP
1
100.0
RT-130 Compact Root of Trust for IoT, IoT servers, gateways, edge devices
Rambus Hardware Root of Trust RT-130 is a state-machine-based hardware security core offering security by design. It protects against a wide range of ...
2
100.0
RT-131 Compact Root of Trust for IoT, IoT servers, gateways, edge devices for China market
Rambus Hardware Root of Trust RT-131 is a state-machine-based hardware security core offering security by design. It protects against a wide range of ...
3
100.0
RT-140 Compact Root of Trust for IoT, IIoT and cloud-connected devices, sensors, gateways
Rambus Hardware Root of Trust RT-140 is a state-machine-based hardware security core offering security by design. It protects against a wide range of ...
4
100.0
RT-260 Compact Root of Trust for IoT with DPA, IIoT and cloud-connected devices, sensors, gateways
Rambus Hardware Root of Trust RT-260 is a state-machine-based hardware security core offering security by design. It protects against a wide range of ...
5
0.0
Mbed TLS
The Mbed TLS library provides a set of cryptographic components that you can use and compile separately, and include or exclude?using a single configu...
6
0.0
NeoPUF - an ideal security solution for IoT
NeoPUF is a hardware security technology based on the physical unclonable variations occurring in silicon manufacturing process. The underlying benefi...
7
0.0
Zign 200 - Software implementation of SRAM PUF with symmetric cryptography
The number of devices, machines, or sensors linked over open communication networks on the internet of things (IoT) has exploded. Every device represe...
8
0.0
Zign 300 - Software implementation of SRAM PUF with symmetric & asymmetric cryptography + PKI
Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with...
9
0.0
Robust Embedded Security Solutions for Industrial Applications
One of the most critical requirements for industrial IoT applications is to provide security for devices that must be controlled remotely. For example...
10
0.0
Provisioning Platform
Mobile and IoT devices, including systems handing protected data and involved in content distribution and protection require that embedded security fe...
11
0.0
Cryptographic IP Cores for IoT
The Intrinsix Cryptographic Subsystem IP Cores for IoT provide a complete security solution for your IoT ASICs and SOCs. The solution is silicon-prov...
12
0.0
PSA Certified
PSA Certified offers a framework for securing connected devices, from analysis through to security assessment and certification. The framework provide...