Design & Reuse
504 IP
451
0.0
Curve25519 Key Exchange & Digital Signatures
The Curve25519 Key Exchange & Digital Signatures from Xiphera is a very compact Intellectual Property (IP) core designed for efficient X25519 key exch...
452
0.0
Physical Unclonable Function (PUF)
The Physical Unclonable Function (PUF) is a fully integrated analog IP generating a stable number from random local process variations....
453
0.0
SHA-2 Hash Function (SHA-256) - Balanced variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 cryptographic hash function with extended support for HM...
454
0.0
SHA-2 Hash Function (SHA-256/512) - Compact variant
The SHA-2 IP from Xiphera is a versatile Intellectual Property (IP) core designed for SHA-256 and SHA-512 cryptographic hash functions with extended s...
455
0.0
RSA Signature Verification
The RSA Signature Verification from Xiphera is a very compact Intellectual Property (IP) core designed for RSA (RivestShamir-Adleman) signature verifi...
456
0.0
CYB-SM3 Cryptographic Hash Function
SM3 is a hash algorithm initially published by the Office of State Commercial Cryptography Administration (OSCCA) of SCA in 2010, then as a China indu...
457
0.0
CYB-SM4 Block Cipher Algorithm
SM4 (former name “SMS4”) is a cryptographic standard published by the Office of State Commercial Cryptography Administration (OSCCA) of SCA as an ...
458
0.0
SphinX - AES-XTS encryption/decryption IP
SphinX is designed to accommodate the speed, latency and throughput requirements of computer systems main memory. The IP implements the standard (NIST...
459
0.0
SecurCore_SC000
The Arm® SecurCore® SC000 processor is designed specifically for the highest-volume smartcard and embedded security applications. The SC000 combines...
460
0.0
SecurCore_SC300
The Arm® SecurCore® SC300 processor is designed specifically for high-performance smartcard and embedded security applications. The SC300 combines t...
461
0.0
CryptoCell-300 - Platform Security Solution for Devices with Strict Power and Area Constraints
The Arm CryptoCell-300 family of embedded security solutions serves high-efficiency systems with a small footprint and low power consumption. The Cryp...
462
0.0
10G/25G/40G/50G AES Encryption Core
The 10G/25G/40G/50G AES Encryption Core is a high performance and yet low footprint AES engine for 10G/s - 50G/s application. Typical applications are...
463
0.0
13 Different Cryptographic Hash Functions Core
These are 13 different cryptographic hash function originally submitted to NIST hash function competition which made upto round 2. All of these cores ...
464
0.0
Intrinsic ID Zign RNG: NIST-Certified Random Number Generator, software-only implementation
Zign™ RNG is an embedded software IP solution that enables device manufacturers and designers to add a random number generator to their products...
465
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
466
0.0
HIP 1000 - HCR_AES Crypto Core Family
The use of IP cores in ASIC, FGPA and system-on-chip (SoC) design has become a critical methodology as companies struggle to address the need for rapi...
467
0.0
Intrinsic ID QuiddiKey 300: First Ever PSA Certified Level 3 RoT Component IP
Digital trust is critical for the continued success of the IoT, so security, reliability, and privacy are top concerns. New legislations are driving i...
468
0.0
Intrinsic ID QuiddiKey 400 - Root of Trust Meeting Automotive Functional Safety Standards
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pot...
469
0.0
Secure IP a Robust Security Enclave
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
470
0.0
400G AES Encryption Core
The 400G AES Encryption Core is a high performance and yet low footprint AES engine for 400G/s application. Typical applications are providing bulk en...
471
0.0
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our hardware and software development...
472
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
473
0.0
Walnut DSA (TM) Fast, Future-Proof Digital Signature Algorithm Designed for Low-Resource Devices
WalnutDSA™ is a fast, small footprint, future-proof, public-key digital signature solution for low-resource devices–running on 8-, 16-, an...
474
0.0
Verimatrix WhiteBox
Verimatrix's WhiteBox enables you to build, control and trust your own software crypto-security. It does this in a pure software environment, with...
475
0.0
SHA-3 Secure Hash Crypto Engine
It is compliant with NIST's FIPS 202 standards. The core can provide all the fixed-length hashing functions provided as part of the SHA-3 standard...
476
0.0
Advanced Encryption Standard (AES) IP core 128/192/256
VISENGI’s Advanced Encryption Standard (AES) IP core provides AES-128, AES-192, and AES-256 encryption and decryption, as per FIPS-197, with a s...
477
0.0
SHA-1 Hashing Core
The ES1002 hash core fully implements the SHA-1 (Secure Hash Algorithm RFC 3174). The core can be used for data authentication in digital broadband, w...
478
0.0
MD5 Hashing Core
The es1005 hash fully implements the MD5 (Message Digest Algorithm RFC 1321). The core can be used for data authentication in digital broadband, wire...
479
0.0
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 co...
480
0.0
DES Core - Low-gate count Data Encryption Standard
ES1040 core implements Data Encryption Standard (DES) cipher algorithms in hardware. DES is a block cipher, works on blocks of 64 bits of data using 6...
481
0.0
AES Core
The es4001 AES core implements the Advanced Encryption Standard (Rijndael Algorithm FIPS 197) encoder and decoder. The core encrypts and decrypts in b...
482
0.0
HDCP 2.0 Encryption Suite
HDCP Suite consists of hardware and software components implementing the HDCP 2.0 protocol. The hardware components are fully synchronous and availabl...
483
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
484
0.0
IEC 61850/62351 Substation Automation Systems Cryptographic IP Core
IEC 61850/62351 Substation Automation Systems Cryptographic (SASCrypt) IP Core secures the strict real-time traffic used in the Substation Automation ...
485
0.0
SHA-1 IP Core fully verified with NIST test vectors
...
486
0.0
Sub-2.5G AES Encryption Core
The sub-2.5G AES Encryption Core is a special low footprint and low-power implementation of AES engine for application requiring less than 2.5G/s. Bec...
487
0.0
Advanced Encryption Standard (AES) Engine
ParaQum Technologies® advanced Encryption Standard (AES) engine is a highly configurable and multipurpose encryption/decryption engine. The AES en...
488
0.0
Zign 100 - Software implementation of SRAM PUF
The number of connected devices, machines, sensors, or simply things are linked with each other over open communication networks on the internet of th...
489
0.0
Geon Secure Execution Processor
Geon Secure Execution Processor delivers secure code execution by supporting two secure contexts. All code and data belonging to a secure context is c...
490
0.0
AES Encryption, 128-bit block cipher, which supports a choice of three key sizes (128,192 and 256-bits)
Eta Compute offers the only commercially available self-timed technology supporting dynamic voltage scaling that is insensitive to process variations,...
491
0.0
Post-quantum secure root of trust subsystem
PQPlatform-TrustSys provides a complete Root of Trust solution, providing architects with everything needed to secure systems during, and beyond post-...
492
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...
493
0.0
AES-GCM MACsec (IEEE 802.1AE) and FC-SP Cores
Implementation of the new LAN security standard 802.1ae (MACSec) requires the NIST standard AES cipher in the GCM mode for encryption and message auth...
494
0.0
P1619/802.1ae (MACSec) GCM/XEX/XTS-AES Core
General Description LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 us...
495
0.0
Combo P1619 / 802.1ae (MACSec) GCM-AES/LRW-AES Cores
LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 uses the LRW mode. Sin...
496
0.0
SecureOne anti-counterfeiting solution
BlueSemi's SecureOne™ is the anti-counterfeiting solution you need to protect your premier products from imitations. SecureOne™ is an ...
497
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
498
0.0
G.hn AES-CCM Core
Implementation of the new ITU G.9961 standard for home networking requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encrypti...
499
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design ...
500
0.0
ES-GCM/CCM/CCM*/EAX' Core
The GCE1-MP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard and encryption/authentication mode...