Company
design-reuse.com
D&R China
Blogs
Industry Articles
D&R Events
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Subscribe to D&R SoC News Alert
English
Mandarin
Register
Login
Menu
Home
Search IP Core
News
Blogs
Articles
D&R Events
Subscribe to D&R SoC News Alert
Register
Login
News
Center
Foundation IP
Analog IP
Interface IP
Interconnect IP
Memory Controller
Peripheral Controller
Wireless IP
Wireline IP
Processor IP
RISC-V
AI Core
Automotive IP
Security IP
IoT
Media IP
Avionics / Space IP
Verification IP
Verification Platform
Asic Design Center
IP-SoC Days
IP-SoC Days 2025
IP-SoC Days 2024
IP-SoC Days 2023
IP-SoC Days 2022
IP-SoC Days 2021
IP-SoC 2024
IP-SoC 2023
IP-SoC 2022
IP-SoC 2021
Browse Security
Cryptography (294)
Cryptography Cores (17)
Cryptography Software Library (1)
DRM Solution (1)
Embedded Security Modules (28)
Ethernet Security (10)
Platform Security (13)
PUF Based (11)
Security IP (36)
Security Platform (36)
Security Protocol Accelerators (3)
Security Subsystems (21)
Other (33)
AES (10)
DES (1)
MD5 (1)
Random Number Generator (1)
SHA (1)
Other (3)
You must be registered with the D&R website to view the full search results, including:
Complete datasheets for
IP Core
products
Contact information for
IP Core
suppliers
Please
log in
here to your account.
New user ?
Signup here
.
504 IP
401
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
402
0.0
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem. It performs the Ae mod M ca...
403
0.0
Secure 128-bit Advanced Encryption Standard (AES) coprocessor
The Secure AES Coprocessor encrypts and decrypts 128-bit data blocks by computing an AES algorithm with a 128, 192 or 256-bit key through a highly sec...
404
0.0
SHA-256 Secure Hash Function
The Alma Technologies SHA256 IP core is a high performance implementation of the SHA-256 Message Digest algorithm, a one-way hash function, compliant ...
405
0.0
Cryptographic library for Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities:- ECDSA key generation; - ECDSA signature and verificati...
406
0.0
TESIC-SE Secure Elements for IoT Devices
TESIC is our silicon-proven secure IP platform built around proprietary clockless microcontroller core. It allows us to shorten the design time of sec...
407
0.0
MD5 Message-Digest Algorithm
The MD5 core from Alma Technologies is a high-performance implementation of the MD5 Message-Digest algorithm, a one-way hash function, compliant to th...
408
0.0
SHA-1 Secure Hash Function
The SHA1 core from Alma Technologies is a high performance implementation of the SHA-1 (Secure Hash Algorithm 1) one-way cryptographic hash function, ...
409
0.0
AES Encrypt/Decrypt Core
The AES encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit bl...
410
0.0
Processor Core
The MD5 encryption IP core is a fully compliant hardware implementation of the Message Digest Algorithm MD5, suitable for a variety of applications. ...
411
0.0
SNOW-V Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...
412
0.0
Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode. DSHA2-384 bridge to APB, AHB, AXI bus, it is a universal solution...
413
0.0
AES 128/256 Encryption - Symmetric Security Range
The family of IPX-AES IP-Cores provides an efficient FPGA implementation of the Advanced Encryption Standard (AES). Its flexibility allows the combina...
414
0.0
HDCP Engine
The EIP-116 High-bandwidth Digital Content Protection Control Path module provides the required technology for implementing all the secure access, cry...
415
0.0
CryptoFirewall Transport Core
The CryptoFirewall Transport core is an independent hardware core within the SoC that provides complete key management and secure video decryption....
416
0.0
CryptoFirewall Verfier Core
Robust, anti-counterfeiting hardware core integrated into the SoC to provide authentication with the highest level of tamper resistance....
417
0.0
CryptoFirewall Consumable Core
The CryptoFirewall Consumable Core is a tamper-resistant security core that can be integrated into existing chips, or implemented as a discrete securi...
418
0.0
FIPS 140-2 certified cryptographic software module
SafeZone FIPS cryptographic module is a compact and portable cryptographic library validated by NIST (certificate 3661; https://csrc.nist.gov/Project...
419
0.0
Enterprise class SSL / TLS software library, in cross-platform C
Available SafeZone FIPS 140-2 Level 1 validate cryptography module. FIPS 140-2 Level 1 is the highest certifi cation available for a software module....
420
0.0
AES-ECB-CBC-CFB-CTR 1 Billion Trace DPA Resistant Crypto Accelerator
Rambus DPA Resistant AES-FBC Cryptographic Accelerator Cores offload compute intensive cryptographic algorithms in SoC’s CPU at 100x performance (wh...
421
0.0
Comira MACSec IP
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
422
0.0
Root of Trust Solutions
Providing a hardware-based foundation for security, Rambus offers a portfolio of robust Root of Trust solutions, ranging from richly featured military...
423
0.0
Integrated Secure Element (iSE) for industrial IoT, factory automation, and AI devices
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
424
0.0
Securyzrâ„¢ Intrusion Detection System (IDS)
Securyzrâ„¢ IDS is an Intrusion Detection System software module, embedded in the device to protect and part of the Secure-IC threat detection, analy...
425
0.0
MACsec - Balanced - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
426
0.0
Reconfigurable Parallel CRC Generator
Parallel CRC IP is reconfigurable high-speed CRC generator, flexible in terms of input data width and generating polynomial. With different data size...
427
0.0
Xiphera Hardware Security IP Solutions - Complete IP Overview
We protect your critical systems by designing security directly into hardware. At Xiphera, we specialise in designing cutting-edge, hardware-based s...
428
0.0
MACsec - High-speed - Security Protocol
MACsec is a point-to-point protocol located on layer two (Data Link) of the OSI model. Xiphera's comprehensive MACsec solution portfolio safeguards th...
429
0.0
tRoot V023 FS Hardware Secure Module, ASIL-B compliant (w/ ARC EM22FS)
The ASIL B compliant DesignWare® tRoot™ Hardware Secure Module (HSM) for Automotive augments its comprehensive root of trust security solution with...
430
0.0
Multipurpose Security Protocol Accelerator, ASIL B compliant
Complex system-on-chip (SoC) requirements can include security at the MAC layer, VPN layer, and application layer. The SynopsysSecurity Protocol Accel...
431
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
432
0.0
Synopsys PUF Hardware Premium with key wrap and certification support
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...
433
0.0
Synopsys PUF Hardware Base IP
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...
434
0.0
ASIL-B Ready PUF Hardware Base
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
435
0.0
ASIL-B Ready PUF Hardware Premium with key wrap and certification support
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
436
0.0
PUF Software Base
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
437
0.0
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
438
0.0
PUF FPGA-Xilinx Base
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
439
0.0
PUF FPGA-Xilinx Premium with key wrap
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
440
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
441
0.0
AES-GCM - High-speed variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
442
0.0
Curve25519 Key Exchange
The Curve25519 Key Exchange from Xiphera is a very compact Intellectual Property (IP) core designed for efficient key exchange using the X25519 protoc...
443
0.0
Agile ECC/RSA Public Key Accelerator with 128-bit ALU
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
444
0.0
Agile ECC/RSA Public Key Accelerator with 32-bit ALU
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
445
0.0
Agile Post Quantum Crypto (PQC) Public Key Accelerator - NIST algorithms
Public key cryptography requires complex mathematical operations on very large numbers (from 160 to 4096 bits, or more). The majority of embedded CPUs...
446
0.0
ASIL-B Compliant (select configurations) 1G-25G MACsec Security Module
Data security between Ethernet-connected devices is expanding due to multiple factors: exponential growth of data containing sensitive and private inf...
447
0.0
DVB S2/S Satellite Tuner SoC White Box IP
This satellite tuner is a direct-conversion (zero IF) receiver for digital TV Broadcasting. On the RF input, there is a variable gain, low-noise ampli...
448
0.0
Advanced Encryption Standard compliant with FIPS 197
AES bridge, a cryptographic coprocessor that complies with FIPS 197 Advanced Encryption Standard, employs the Rijndael encryption method to link APB, ...
449
0.0
Centralised Real Time Processor IP Core
We provide many configurations for our cryptographic solutions based on the requirements of the project. When compared to competing designs, the CR...
450
0.0
Post-Quantum Cryptography - PQC Key Encapsulation IP Core (ML-KEM)
The KiviPQC-KEM is an IP Core for ML-KEM Key Encapsulation that supports key generation, encapsulation, and decapsulation operations for all ML-KEM va...
|
Previous
|
9
|
10
|
11
|
Next
|