Design & Reuse
540 IP
401
0.0
SHA-2 Hash Function (SHA-384) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-384 cryptographic hash function with extended support for HM...
402
0.0
SHA-2 Hash Function (SHA-512) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-512 cryptographic hash function with extended support for HM...
403
0.0
SHA-256 Secure Hash Function
The Alma Technologies SHA256 IP core is a high performance implementation of the SHA-256 Message Digest algorithm, a one-way hash function, compliant ...
404
0.0
SHA-3 Hash Function - Compact variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
405
0.0
SHA-3 Hash Function - High-speed variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
406
0.0
SHA-3 Secure Hash Crypto Engine
It is compliant with NIST's FIPS 202 standards. The core can provide all the fixed-length hashing functions provided as part of the SHA-3 standard...
407
0.0
ChaCha20 Crypto Accelerator
The EIP-13 ChaCha engine implements the ChaCha20 algorithm, as specified by [ChaCha]. The accelerators include I/O registers and an encryption/decrypt...
408
0.0
ChaCha20 DPA Resistant Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
409
0.0
ChaCha20-Poly1305 - Balanced variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
410
0.0
ChaCha20-Poly1305 - High-speed variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
411
0.0
Whirlpool Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
412
0.0
High capacity post-quantum cryptography processor
PQPerform-Inferno is a scalable hardware solution engineered for high-performance post-quantum cryptography. It is capable of delivering over one mill...
413
0.0
High capacity post-quantum cryptography processor
PQPerform-Flex is a high-performance post-quantum cryptography solution featuring an integrated RISC-V processor as part of its hardware/software co-d...
414
0.0
Silicon Security Solution
ChevinID™ was designed by Chevin Technology using patented method (GB2609026) to add a further layer of protection to your Silicon supply chain by ide...
415
0.0
Xiphera Hardware Security IP Solutions - Complete IP Overview
We protect your critical systems by designing security directly into hardware. At Xiphera, we specialise in designing cutting-edge, hardware-based s...
416
0.0
FIPS 140-2 certified cryptographic software module
SafeZone FIPS cryptographic module is a compact and portable cryptographic library validated by NIST (certificate 3661; https://csrc.nist.gov/Project...
417
0.0
FIPS Security Toolkit for OpenSSL
The Rambus FIPS Security Toolkit (formerly from Inside Secure) is a complete cryptographic security solution for IoT providing the tools required to s...
418
0.0
Circuit Camouflage Technology
Rambus Circuit Camouflage Technology (formerly Inside Secure), also known as SecureMedia Library (SML), is an anti-reverse engineering and anti-clonin...
419
0.0
FireCode FEC
Zero latency, asynchronous, low power , low gate count FireCode FEC. It detects and corrects 11 bits of burst errors in 2112 bits of received codew...
420
0.0
AISAFE KAUAI, True Random Number Generation Solutions Product Line
The Analogue Insight Safe Digital Noise Source is a high performance, low area, low power physical noise source with digitization suitable for use in ...
421
0.0
AISAFE NIHOA SHA3-224, SHA3-256, SHA3-384, SHA3-512
The Analogue Insight Safe FIPS 202 IP Core provides a complete set of NIST FIPS 202 sponge construction algorithms in a high performance synthesizable...
422
0.0
AISAFE NIHOA SHAKE-128, SHAKE-128 (unrolled),SHAKE-256, SHAKE-256 (unrolled)
The Analogue Insight Safe FIPS 202 IP Core provides a complete set of NIST FIPS 202 sponge construction algorithms in a high performance synthesizable...
423
0.0
NIST P-224/P-256/P-384/P521 ECDH and ECDSA
The NIST P-224/P-256/P-384/P-521 ECDH and ECDSA can be used for elliptic curve key generation, computation of Diffie-Hellman shared secrets as well as...
424
0.0
ML-KEM Key Encapsulation PQC Security IP Core
The KiviPQC™-KEM IP core is a hardware accelerator for post-quantum cryptographic operations. It implements the Module Lattice-based Key Encapsulation...
425
0.0
Elliptic Curve Cryptography IP
Our ECC IP Core is a state-of-the-art solution that gives your systems access to the capabilities of elliptic curve encryption. Developed with perf...
426
0.0
Elliptic Curve Digital Signature Algorithm
Modern public-key cryptography is built on elliptic curves, which are essential to reliable key agreement methods and safe digital signatures. As t...
427
0.0
Elliptic Curve Digital Verification Algorithm
CryptOne's abilities encompass not just supporting several elliptic curves but also the highly recognized Elliptic Curve Digital Verification Algorith...
428
0.0
Bloodhound Wi-Fi Packet Sniffer/Injector for Network Characterization, Surveillance, and Law Enforcement
In 2017 and beyond, analysts, agencies, and security experts are all in agreement that threats to public safety, critical infrastructure, and data wil...
429
0.0
Ultra Ethernet TSS Complete Layer with rates up to 1.6Tbps
The UET-TSS-IP-369 (EIP-369) is an inline, high-performance, multi-channel packet engine that provides the complete TSS layer, bypass/drop and basic c...
430
0.0
Ultra Ethernet TSS Transform Engine with rates up to 1.6Tbps
The UET-TSS-IP-69 (EIP-69) is a high-performance, multi-channel transform engine that provides the complete TSS packet transformation (including KDF a...
431
0.0
Ultra-secure PQC-first Root of Trust Subsystem
PQPlatform-TrustSys is a versatile security solution designed for the post-quantum era. It provides a scalable Root of Trust that blends next-generati...
432
0.0
SM3 Crypto Accelerator
The EIP-52 SM3 Engine implements the SM3 hash algorithm. The accelerators include I/O registers, hash calculation cores, message padding logic, and da...
433
0.0
SM4 Crypto Accelerator
The EIP-12 SM4 Engine implements the SM4 cipher block algorithm. The accelerator includes I/O registers, encryption and decryption cores. Designed for...
434
0.0
SM4 symmetric block cipher GB/T 32907-2016, and ISO/IEC 18033-3:2010/Amd 1:2021
The SM4 IP core implements a custom hardware accelerator for the SM4 symmetric block cipher, specified in Chinese national standard GB/T 32907-2016, a...
435
0.0
SM4-XTS Crypto Accelerator
The EIP-312 – SM4-XTS Accelerator is specifically suited for next generation processors deployed in networking and storage appliances and SSD controll...
436
0.0
HMAC
HMAC IP Core...
437
0.0
HMAC Accelerator with SHA-3, SHA-2, SHA-1
The EIP-59 is the IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algorithms like MD5 (RFC1231),...
438
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design that...
439
0.0
HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
Rambus DPA Resistant HMAC-SHA-2 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through attacks when ...
440
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
441
0.0
HMAC-SHA256 Accelerator
Chevin Technology’s HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes. Message authe...
442
0.0
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, SSL, TLS and DTLS pro...
443
0.0
SNOW Crypto Accelerator
The EIP-46 cipher accelerators implement the specification of the 3GPP Confidentiality and Integrity Algorithms as specified by 3GPP and ETSI. Desig...
444
0.0
SNOW-V Security Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...
445
0.0
Integrated Secure Element (iSE) for high-end devices with HW isolated secure processing
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
446
0.0
Integrated Secure Element (iSE) for industrial IoT, factory automation, and AI devices
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
447
0.0
INTEGRATED SECURE ELEMENT FOR CHIPLET
Chiplets are a key innovation in semiconductor design, representing a modular approach to building complex systems. Instead of creating a single, mono...
448
0.0
Integrity and Data Encryption (IDE) Security Module IP for CXL 3.0
The Compute Express Link (CXL) interface protocol enables low-latency data communication between system-on-chip (SoC) and general-purpose accelerators...
449
0.0
Enterprise class SSL / TLS software library, in cross-platform C
Available SafeZone FIPS 140-2 Level 1 validate cryptography module. FIPS 140-2 Level 1 is the highest certifi cation available for a software module....
450
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...