Design & Reuse
492 IP
451
0.0
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem. It performs the Ae mod M ca...
452
0.0
RSA Signature Verification
The RSA Signature Verification from Xiphera is a very compact Intellectual Property (IP) core designed for RSA (RivestShamir-Adleman) signature verifi...
453
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-28 is a range of Public Key Accelerators operating as co-processors to offload Public Key operations from the Host processor....
454
0.0
RSA-ECC Public Key Accelerator Engine
The EIP-150 is an integrated module combining the Public Key Acceleration module, True Random Generator, interrupt controller and a standard bus inter...
455
0.0
RSA-ECC Public Key Accelerator Engine DPA Resistant, 8K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
456
0.0
RSA-ECC Public Key Accelerator Engine, 2K ops/sec, DPA Resistant
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
457
0.0
RSA-ECC Public Key Accelerator Engine, 50K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
458
0.0
RSA-ECC Public Key Accelerator Engine, 750K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
459
0.0
RSA-ECC Public Key Accelerator Engine, 8K ops/sec, DPA & Fault Injection Resistant
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through side channel and fault injection attacks ...
460
0.0
Ascon
Xiphera's Ascon symmetric encryption IP cores provide robust security for a wide range of applications. It is, as a lightweight encryption algorithm, ...
461
0.0
ASCON Authenticated Encryption & Hashing Engine
The ASCON-F IP core is a compact, high-throughput hardware engine implementing the lightweight authenticated encryption with associated data (AEAD) an...
462
0.0
eSi-Crypto
EnSilica provide a comprehensive range of encryption and authentication IP for ASIC and FPGA targets with low resource usage and high throughput. An e...
463
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
464
0.0
ASIL B Ready PCIe 5.0 Integrity and Data Encryption (IDE) Security IP
PCI Express is a ubiquitous interface for a wide variety of applications, from connecting accelerators and peripheral devices to data center servers t...
465
0.0
ASIL-B Compliant (select configurations) 1G-25G MACsec Security Module
Data security between Ethernet-connected devices is expanding due to multiple factors: exponential growth of data containing sensitive and private inf...
466
0.0
ASIL-B Ready PUF Hardware Base
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
467
0.0
ASIL-B Ready PUF Hardware Premium with key wrap and certification support
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pote...
468
0.0
RT-121 Compact Root of Trust for IoT and IIoT, sensors and gateways for China market
Rambus Hardware Root of Trust RT-120 is a state-machine-based hardware security core offering security by design. It protects against a wide range of ...
469
0.0
RT-630-FPGA Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
Rambus Hardware Root of Trust RT-630-FPGA is a fully-programmable hardware security core offering security by design. It protects against a wide range...
470
0.0
RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
Rambus Hardware Root of Trust RT-660-FPGA is a fully-programmable hardware security core offering security by design. It protects against a wide range...
471
0.0
STAR Memory System ECC IP
Synopsys SLM STAR ECC 6 IP is a stand-alone product used to mitigate against soft errors in memories with the goal of improving in-field reliability...
472
0.0
QuarkLink - software-based IoT security platform
QuarkLink is our software-based IoT security platform that securely connects IoT devices to server-hosted apps on-premises or in the cloud. QuarkLink ...
473
0.0
Sub-2.5G AES Encryption Core
The sub-2.5G AES Encryption Core is a special low footprint and low-power implementation of AES engine for application requiring less than 2.5G/s. Bec...
474
0.0
Public Key Accelerator Farm Engine
The EIP-154 PKI Farm engine, offers autonoumus processing of Public Key Operations. Due to its scalable architecture, it provides high-performance acc...
475
0.0
ZUC Crypto Accelerator
The EIP-48 is an efficient hardware implementation of the ZUC algorithm. Besides the basic ZUC stream cipher, the EIP-48 fully implements the 3GPP Con...
476
0.0
PUF FPGA-X Premium with key wrapping
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
477
0.0
PUF FPGA-Xilinx Base
FPGAs are widely used in mission-critical environments with specific processing needs. Motivations for copying or altering sensitive data or valuable ...
478
0.0
PUF Software Base
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
479
0.0
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on the Internet of Thin...
480
0.0
QuiddiKey 100 - Small Footprint PUF IP to Create, Wrap and Manage Keys
The number of connected devices, machines or sensors that are linked with each other over open communication networks on the internet of things (IoT) ...
481
0.0
Suite-Q (TM) HW cryptographic solution
Suite-Q™ HW is a complete system-on-chip (SoC) design features all standardized cryptography needed for secure protocols in a small and efficien...
482
0.0
Multi-Protocol Crypto Engine
The EIP-97 is a Cryptographic Engine designed to offload the Host processor to improve the speed of IPsec ESP, IPsec AH, SRTP, SSL, TLS, DTLS and MACs...
483
0.0
Multi-Protocol Crypto Packet Engine, Low Power, Bus Attached
The EIP-93 is a Multi-Protocol Engine. The EIP-93 is designed to off-load the host processor to improve the speed of protocol operations and reduce po...
484
0.0
Multipurpose Security Protocol Accelerator, ASIL B compliant
Complex system-on-chip (SoC) requirements can include security at the MAC layer, VPN layer, and application layer. The SynopsysSecurity Protocol Accel...
485
0.0
Curve25519 Key Exchange
The Curve25519 Key Exchange from Xiphera is a very compact Intellectual Property (IP) core designed for efficient key exchange using the X25519 protoc...
486
0.0
Curve25519 Key Exchange & Digital Signatures
The Curve25519 Key Exchange & Digital Signatures from Xiphera is a very compact Intellectual Property (IP) core designed for efficient X25519 key exch...
487
0.0
Authenticated Encryption & Decryption AES-GCM128
The Alma Technologies AES-GCM128 IP Core implements the GCM-AES authenticated encryption and decryption, as specified in the NIST SP800-38D recommenda...
488
0.0
DVB S2/S Satellite Tuner SoC White Box IP
This satellite tuner is a direct-conversion (zero IF) receiver for digital TV Broadcasting. On the RF input, there is a variable gain, low-noise ampli...
489
0.0
CYB-SM3 Cryptographic Hash Function
SM3 is a hash algorithm initially published by the Office of State Commercial Cryptography Administration (OSCCA) of SCA in 2010, then as a China indu...
490
0.0
CYB-SM4 Block Cipher Algorithm
SM4 (former name “SMS4”) is a cryptographic standard published by the Office of State Commercial Cryptography Administration (OSCCA) of SCA as an indu...
491
0.0
Synopsys PUF Hardware Base IP
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...
492
0.0
Synopsys PUF Hardware Premium with key wrap and certification support
Device identities and cryptographic root keys are at the foundation of every security system. With the explosion of the IoT, new and scalable ways are...