Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Videos
Subscribe to D&R SoC News Alert
English
Mandarin
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Videos
Subscribe to D&R SoC News Alert
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller & PHY
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Design Platform
Asic & IP Design Center
IP-SoC Days
IP-SoC Days 2026
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC 2025
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
Browse Security
AES Encryption Core (96)
Cryptography (192)
Data Integrity - Error Correction (18)
Embedded Security Modules (19)
Hardware Accelerator (42)
MACsec, IPsec (35)
Post-Quantum Solutions (34)
PUF Based (20)
Random Number Generator (RNG) (17)
Root of Trust (22)
Security Platform (36)
Sensors & Monitors (9)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
540 IP
151
5.0
Hash Crypto Engine
The Hash Crypto Engine is flexible and optimized hash IP core compliant with FIPS 180-3 (HASH functions), FIPS 198 (HMAC function) and OSCCA (SM3). W...
152
5.0
KASUMI Crypto Engine
The KASUMI IP core is 3GPP confidentiality and integrity algorithms (UEA1/UIA1) stream cipher for telecommunication applications, requiring high perfo...
153
5.0
DCRP1A - 100% Secure Cryptographic System for RSA, Diffie-Hellman and ECC with AMBA AHB, AXI4 and APB
The CryptOne, a 100% secure cryptographic system, has been based on more than 20 years DCD’s market experience. Starting from 1999, Digital Core Desig...
154
5.0
Advanced Encryption Standard Module
The CC-AES-APB is a synthesisable Verilog model of a Advanced Encryption Standard module. The AES core can be efficiently implemented on FPGA and ASIC...
155
5.0
Advanced Encryption Standard Module
The CC-AES-AXI is a synthesisable Verilog model of a Advanced Encryption Standard module. The AES core can be efficiently implemented on FPGA and ASIC...
156
5.0
AES - DAES XTS - Cryptographic co-processor for lightweight cryptography
DAES XTS IP Core from Digital Core Design is a compact cryptographic co-processor designed to seamlessly implement the Rijndael encryption algorithm i...
157
5.0
AES-XTS Multi-Booster
The AES-XTS Multi-Booster crypto engine includes a generic & scalable implementation of the AES algorithm making the solution suitable for a wide rang...
158
5.0
SHA - DSHA2-256 - SHA IP Core with native SHA2-256 HMAC support
The DSHA2-256 is a universal solution which efficiently accelerates SHA2-256 hash function compliant with FIPS PUB 180-4. It computes message digest i...
159
5.0
SHA-384 and SHA-512 Secure Hash Crypto Engine
The SHA-384/512 is a high-throughput, and compact hardware implementation of the SHA-384 and the SHA-512 cryptographic hash functions provisioned by t...
160
5.0
The FortifyIQ Compact AES-SX AES Encryption Core with Robust SCA/FI Protection for Constrained Devices
FortifyIQ’s Compact AES IP Core is an ultra-lightweight hardware accelerator optimized for resource-constrained embedded systems that require secure e...
161
5.0
High Throughput Elliptic Curve Cryptography hardware acceleration Core
eSi-ECDSA-HT is a High Throughput (HT) Elliptic Curve Cryptography (ECC) hardware acceleration core, which supports EC Digital Signature Algorithm (EC...
162
5.0
Electro-Magnetic Fault Injection (EMFI) Detector analog anti-tamper add-on for Root of Trust and PUF
The agileEMSensor product is a latch based sensor designed to detect electromagnetic disturbances in critical circuits. It provides security and prote...
163
5.0
Elliptic Curve Digital Signature generation and verification
eSi-ECDSA is a hardware acceleration core for Elliptic Curve (EC) Digital Signature Algorithm modular arithmetic operations defined in IEEE1363 and ot...
164
5.0
Clock Attack Monitor analog anti-tamper add-on for Root of Trust and PUF
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
165
5.0
SNOW3G Crypto Engine
The SNOW3G IP core is 3GPP confidentiality and integrity algorithms (UEA2/UIA2) stream cipher for telecommunication applications, requiring high perfo...
166
5.0
Voltage Glitch Detector analog anti-tamper add-on for Root of Trust and PUF
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
167
5.0
FortifyIQ AES-SX-GCM-XTS Secure Core: High-Performance AES Encryption Core with GCM/XTS Support and Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES Encryption Core is a fast, encryption-only hardware accelerator built for systems that demand secure and authenticate...
168
5.0
FortifyIQ AES-XP-GCM-XTS Ultra-High-Performance Secure Core: High-Performance AES-GCM/XTS Core with Integrated SCA/FI Protection
FortifyIQ’s AES-GCM/XTS IP core delivers high-throughput encryption and decryption with support for both AES-GCM (for data in motion) and AES-XTS (for...
169
5.0
FortifyIQ AES-XP-GCM-XTS Ultra-High-Performance Secure Core: High-Performance AES-GCM/XTS Core with Integrated SCA/FI Protection
FortifyIQ’s AES-GCM/XTS IP core delivers high-throughput encryption and decryption with support for both AES-GCM (for data in motion) and AES-XTS (for...
170
5.0
FortifyIQ HMAC-SHA256/512 Secure Core: High-Performance SHA-2/HMAC Accelerator with Full SHA-2 Family Support and Low Latency SCA/FI Protection
FortifyIQ’s SHA-2/HMAC IP core delivers fast, hardware-accelerated hashing and message authentication, supporting SHA-2-224, 256, 384, and 512, as wel...
171
5.0
FortifyIQ AES-SX-full Secure Core: High-Performance AES Encryption/Decryption Core with Advanced SCA/FI Protection
FortifyIQ’s High-Performance AES IP core delivers fast, secure AES-128/256 encryption and decryption for systems requiring high throughput and certifi...
172
5.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Core with Proven SCA Protection for Constrained Devices (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra-Low-Power AES IP core is a compact encryption engine optimized for deeply embedded and battery-powered systems where minimizing ener...
173
5.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance, Ultra Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s High-Throughput, low-power consumption AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS ...
174
5.0
FortifyIQ AES-SX-ULP-full Secure Core: High-Performance/Ultra Low Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Ultra Low Power, High-Throughput AES IP core delivers AES-128/256 encryption-only with full support for ECB, CBC, CTR, GCM, and XTS modes,...
175
5.0
FortifyIQ AES-SX-ULP-full Secure Core: Ultra-Low-Power AES Encryption Core with Full Mode Support and Formally Proven SCA Protection (SCA/DPA/FIA resistant)
FortifyIQ’s Low-Energy AES IP core delivers AES-128/256 encryption-only with support for all major modes, including ECB, CBC, CTR, GCM, and XTS, while...
176
5.0
FortifyIQ AES-XP-GCM Ultra-High-Performance Secure Core: Ultra-High-Performance AES-GCM Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-GCM IP core delivers ultra-high-throughput authenticated encryption and decryption using a fully pipelined architecture, optimized for...
177
5.0
FortifyIQ AES-XP-GCM Ultra-High-Performance Secure Core: Ultra-High-Performance AES-GCM Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-GCM IP core delivers ultra-high-throughput authenticated encryption and decryption using a fully pipelined architecture, optimized for...
178
5.0
FortifyIQ AES-XP-XTS Ultra-High-Performance Secure Core: High-Performance AES-XTS Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-XTS IP core delivers high-throughput AES-128/256 encryption and decryption in XTS mode, optimized for data-at-rest protection in secur...
179
5.0
FortifyIQ AES-XP-XTS Ultra-High-Performance Secure Core: High-Performance AES-XTS Core with RAMBAM-Based SCA/FI Protection
FortifyIQ’s AES-XTS IP core delivers high-throughput AES-128/256 encryption and decryption in XTS mode, optimized for data-at-rest protection in secur...
180
5.0
FortifyIQ Balanced AES Core with Multi-Mode Support and Advanced SCA/FI Protection
FortifyIQ’s Balanced AES IP core is a compact yet capable cryptographic accelerator designed for embedded systems with moderate performance and resour...
181
5.0
FortifyIQ Compact Post-Quantum ML-DSA High-assurance, Hardened Cryptographic Signature SW Library for Resource-Constrained Devices (DPA/FIA/SCA resistant)
As classical digital signature algorithms face obsolescence in the quantum era, embedded systems require quantum-resistant alternatives that balance p...
182
5.0
FortifyIQ Compact RSA Signature Verification Accelerator for Constrained Devices (SCA, FIA resistant)
RSA signature verification is widely used in secure boot and code authentication, yet it can strain the limited computational resources of low-power e...
183
5.0
FortifyIQ ECC-ECDH-ECDSA Accelerator: Compact and Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
Resource-constrained devices often lack the area and power budget for secure elliptic curve operations, yet face serious risk from physical attacks li...
184
5.0
FortifyIQ ECC-ECDH-ECDSA RSA Accelerator: Secure ECC IP Core for Resource-Constrained Devices (SCA/DPA/FIA resistant)
In performance-sensitive systems where speed and responsiveness are critical, but area and power constraints are less extreme, FortifyIQ’s FIQ-PKA02B ...
185
5.0
FortifyIQ High-Performance Advanced DPA/SCA and Fault Injection Resistant AES SW library
The FortifyIQ software library provides ultra-strong protection against SCA, FIA, and cache attacks, achieving up to 900 Mbps on 3.4 GHz and 100 Mbps ...
186
5.0
FortifyIQ High-Performance Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s High-Performance Hybrid Cryptography IP core delivers accelerated support for both classical (RSA, ECC) and post-quantum (ML-KEM, ML-DSA) ...
187
5.0
FortifyIQ High-Security SHA-2/HMAC Core with Zero Side-Channel Leakage (SHA-224/256 Only) SCA/DPA/FIA resistant
FortifyIQ’s High-Security SHA-2/HMAC IP core delivers formally proven zero side-channel leakage for SHA-2-224 and SHA-2-256 hashing and HMAC, making i...
188
5.0
FortifyIQ High-Throughput AES Core with Advanced SCA/FI Protection for Performance-Critical Systems
FortifyIQ’s High-Performance AES IP core is a fast, silicon-proven cryptographic engine designed for systems with demanding encryption workloads. Buil...
189
5.0
FortifyIQ HMAC-SHA256 Secure Core: Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection
FortifyIQ’s High-Security SHA-2/HMAC IP core is engineered for applications where security is paramount, delivering mathematically proven zero side-ch...
190
5.0
FortifyIQ Hybrid Classical and Post-Quantum High-assurance (SCA/DPA/FIA resistant) Cryptography IP Core (ECC/RSA, ML-KEM, ML-DSA)
FortifyIQ’s Hybrid Cryptography IP core combines traditional asymmetric algorithms, such as RSA and ECC, with post-quantum standards including ML-KEM ...
191
5.0
FortifyIQ SCA/FI-Protected RSA Accelerator
FortifyIQ’s RSA Accelerator delivers high-performance modular exponentiation for RSA-based public key cryptography, while incorporating advanced prote...
192
5.0
FortifyIQ's Compact and Secure Post-Quantum ML-KEM Key Encapsulation SW Library for Resource-Constrained Devices (DPA/SCA/FIA resistant)
As classical asymmetric encryption and secure key establishment algorithms face obsolescence in the quantum era, embedded systems require quantum-resi...
193
5.0
FortifyIQ's Compact Crypto Box IP Core for Resource-Constrained Devices (AES, ECC/RSA etc.) SCA/FIA/DPA - resistant
FortifyIQ’s Crypto Box IP core is a compact, power-efficient cryptographic engine that combines essential asymmetric algorithms (RSA, ECC) with high-s...
194
5.0
FortifyIQ's Compact DPA/SCA and FIA Hardened Post-Quantum ML-KEM IP Core for Resource-Constrained Devices
As quantum computing threatens traditional public-key cryptography, resource-constrained devices must adopt quantum-resistant algorithms without compr...
195
5.0
FortifyIQ's Versatile Crypto Box IP Core with Robust SCA/FI Protections for Balanced Embedded Systems
FortifyIQ’s Crypto Box IP core is a high-efficiency cryptographic solution that combines RSA, ECC, AES, and a SHA-2/HMAC engine, all with advanced pro...
196
5.0
FortifyIQ's Versatile Crypto Box IP Core with Robust SCA/FI Protections for Balanced Embedded Systems
FortifyIQ’s Crypto Box IP core is a high-efficiency cryptographic solution that combines RSA, ECC, AES, and a SHA-2/HMAC engine, all with advanced pro...
197
5.0
Cryptographic Cores IP
Crypto Quantique’s Cryptographic Cores IP portfolio delivers secure, high-performance implementations of symmetric, asymmetric, and post-quantum algor...
198
5.0
Attack resistant ECC hardware acceleration core
eSi-ECC is a hardware acceleration core for Elliptic Curve (EC) modular arithmetic operations, which are commonly performed within EC cryptographic pr...
199
5.0
ZUC Crypto Engine
The ZUC IP core is 3GPP confidentiality and integrity algorithms (EEA3/EIA3) stream cipher for telecommunication applications, requiring high performa...
200
4.0
ECC with BCH Algorithm
The IntelliProp IPC-BL119A-ZM is a highly configurable IP core that provides a method of extending an information block with extra bits to guard again...
|
Previous
|
4
|
5
|
6
|
...
|
Next
|