Find IP Sell IP AI Assistant Chip Talk Chip Videos About Us
Log In

All IPs > Security IP > Cryptography Cores

Cryptography Cores: Advanced Security IP Solutions

In today's interconnected world, the importance of secure communication and data protection cannot be overstated. Cryptography cores are a crucial subset of semiconductor IPs designed to provide foundational security solutions across a variety of electronic systems. At their core, these IPs implement complex algorithms that ensure the confidentiality, integrity, and authenticity of data being processed and exchanged.

The cryptography cores available in this category offer a diverse range of features tailored to different security needs. From symmetric-key algorithms like AES to asymmetric-key systems such as RSA and ECC, these cores ensure that systems can securely encrypt and decrypt information, protecting it from unauthorized access and tampering. By embedding these cryptographic functions directly into hardware, it becomes possible to achieve faster processing speeds and higher levels of security compared to software implementations.

These semiconductor IPs are widely used in applications where data security is paramount. This includes, but is not limited to, industries such as finance, telecommunications, and healthcare. Devices utilizing cryptography cores can range from secure payment systems, ensuring safe financial transactions, to mobile devices for secure communications, to medical devices that safeguard sensitive health information. Additionally, with the rise of the Internet of Things (IoT), cryptography cores are increasingly crucial in providing secure connections for a myriad of smart devices.

By integrating cryptography cores into your designs, you not only improve security but also future-proof your products against many potential vulnerabilities. As security threats continue to evolve, having robust cryptography solutions is essential for maintaining trust and reliability in your products and services. Whether you're developing a new application or enhancing an existing one, our category of cryptography cores offers the semiconductor IP solutions you need to meet today's stringent security demands.

All semiconductor IP

Akida IP

The Akida IP is a groundbreaking neural processor designed to emulate the cognitive functions of the human brain within a compact and energy-efficient architecture. This processor is specifically built for edge computing applications, providing real-time AI processing for vision, audio, and sensor fusion tasks. The scalable neural fabric, ranging from 1 to 128 nodes, features on-chip learning capabilities, allowing devices to adapt and learn from new data with minimal external inputs, enhancing privacy and security by keeping data processing localized. Akida's unique design supports 4-, 2-, and 1-bit weight and activation operations, maximizing computational efficiency while minimizing power consumption. This flexibility in configuration, combined with a fully digital neuromorphic implementation, ensures a cost-effective and predictable design process. Akida is also equipped with event-based acceleration, drastically reducing the demands on the host CPU by facilitating efficient data handling and processing directly within the sensor network. Additionally, Akida's on-chip learning supports incremental learning techniques like one-shot and few-shot learning, making it ideal for applications that require quick adaptation to new data. These features collectively support a broad spectrum of intelligent computing tasks, including object detection and signal processing, all performed at the edge, thus eliminating the need for constant cloud connectivity.

BrainChip
AI Processor, Audio Processor, Coprocessor, CPU, Cryptography Cores, GPU, Input/Output Controller, IoT Processor, Platform Security, Processor Core Independent, Vision Processor
View Details

TRNG/AES/DES/3DES/HASH/SHA/RSA

Overview: Cybersecurity IPs offer a range of essential security features to protect your digital assets and sensitive information. From True Random Number Generators (TRNG) to advanced encryption algorithms like AES, DES, 3DES, and cryptographic hash functions like SHA, as well as RSA for secure key exchange and digital signatures, the IPs provide a comprehensive suite of tools to safeguard your data. Key Features:  True Random Number Generator (TRNG): Generates unpredictable and unbiased random numbers for cryptographic applications.  Advanced Encryption Standard (AES): Provides robust encryption with symmetric key algorithms for securing data.  Data Encryption Standard (DES) and Triple DES (3DES): Implement legacy encryption algorithms for data protection.  Hash Functions: Includes secure cryptographic hash functions like SHA (Secure Hash Algorithm) for data integrity verification.  RSA: Enables secure key exchange, encryption, and digital signatures for secure communication. These cybersecurity IPs are designed to meet the stringent security requirements of modern applications, ensuring the confidentiality, integrity, and authenticity of your data.

Plurko Technologies
All Foundries
All Process Nodes
Cryptography Cores
View Details

aiWare

The aiWare NPU (Neural Processing Unit) by aiMotive is a high-performance hardware solution tailored specifically for automotive AI applications. It is engineered to accelerate inference tasks for autonomous driving systems, ensuring excellent performance across a variety of neural network workloads. aiWare delivers significant flexibility and efficiency, capable of scaling from basic Level 2 applications to complex multi-sensor Level 3+ systems. Achieving up to 98% efficiency, aiWare's design focuses on minimizing power utilization while maximizing core performance. It supports a broad spectrum of neural network architectures, including convolutional neural networks, transformers, and recurrent networks, making it suitable for diverse AI tasks in the automotive sphere. The NPU's architecture allows for minimal external memory access, thanks to its highly efficient dataflow design that capitalizes on on-chip memory caching. With a robust toolkit known as aiWare Studio, engineers can efficiently optimize neural networks without in-depth knowledge of low-level programming, streamlining development and integration efforts. The aiWare hardware is also compatible with V2X communication and advanced driver assistance systems, adapting to various operational needs with great dexterity. Its comprehensive support for automotive safety standards further cements its reputation as a reliable choice for integrating artificial intelligence into next-generation vehicles.

aiMotive
11 Categories
View Details

Polar ID Biometric Security System

Polar ID from Metalenz offers a cutting-edge face unlock solution, using advanced meta-optic technology to provide secure, high-resolution facial recognition capabilities. It captures the unique "polarization signature" of a human face, making it resistant to both 2D photos and sophisticated 3D masks. Polar ID operates efficiently in a variety of lighting conditions, from bright daylight to dark environments, ensuring its utility extends across all smartphone models without sacrificing security or user experience. This technology replaces complex structured light modules, incorporating a single near-infrared polarization camera and active illumination source. It significantly reduces costs and footprint, supporting a broad adoption across hundreds of millions of mobile devices. With its low price point and high performance, Polar ID elevates smartphone security, offering robust protection for digital transactions and identity verification. By enabling this on an embedded platform with compatibility for Qualcomm's Snapdragon processors, Metalenz ensures widespread applicability. The key advantage of Polar ID is its affordability and ease of integration, as it eliminates the need for larger, more intrusive notches in phone designs. Its sophisticated polarization sensing means secure authentication is possible even if the user wears sunglasses or masks. Polar ID sets a new benchmark in smartphone security by delivering convenience and enhanced protection, marking it as the first polarization sensor available for smartphones.

Metalenz Inc.
13 Categories
View Details

Securyzr iSSP

Securyzr iSSP is an integrated Security Services Platform designed by Secure-IC to offer comprehensive lifecycle management of device security. It provides zero-touch security lifecycle services that encompass provisioning, firmware updates, security monitoring, and device identity management. The platform employs a cloud-based architecture, enabling real-time updates and management of security protocols across a fleet of devices. Securyzr iSSP supports Post-Quantum Cryptography standards, ensuring readiness for future cryptographic challenges. This platform integrates seamlessly into diverse system environments, facilitating the protection of sensitive data through robust secure boot processes and key isolation techniques. It structures security around a core Root-of-Trust component named Securyzr iSE neo, which offers anti-tampering protection and dual computation for enhanced security. The platform aligns with an organization's security goals by providing customizable protective measures that are scalable to various applications. Securyzr iSSP is designed to maintain high security levels without compromising system performance or efficiency. By leveraging the latest advancements in cryptography and security protocols, it ensures the resiliency of systems against both physical and remote threats. This platform aids organizations in navigating the increasingly complex landscape of digital security challenges, providing a robust foundation for their cybersecurity strategies.

Secure-IC
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

PQSDK

Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments

Premium Vendor
PQShield
Cryptography Cores, Cryptography Software Library
View Details

AES-XTS for Encryption of Storage Devices

The AES-XTS standard, as outlined by NIST and IEEE, provides a critical security layer for disk-level data encryption. Through its unique 'tweakable' cipher design, AES-XTS is particularly effective in securing data at rest on disk drives. Helion's AES-XTS solutions are tailored for applications ranging from single drives to extensive storage arrays, offering configurations that balance speed and hardware resource use. With throughput capacities exceeding 64 Gbps, these cores can support both high and low-speed storage applications. Benefiting from Helion's dedication to flexible and efficient designs, these cores ensure consistent data protection across various environments, making them suitable for use in both commercial and industrial sectors. They are available for implementation in leading FPGA and ASIC technologies, ensuring adaptability and integration ease.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Security Protocol Accelerators
View Details

PQPerform Lattice

Up to 1M KeyEnc/sec with improved power efficiency PQPerform-Lattice is a powerful hardware-based product designed for high throughput, high-performance, and high speed. It adds post-quantum cryptography for applications that typically handle a large number of transactions, such as high-capacity network hardware applications and secure key management HSMs. Optimizable for secure boot, as well as other use-cases, PQPerform-Lattice supports FIPS 204 ML-DSA for quantum-secure digital signature verification, as well as FIPS 203 ML-KEM for quantum key exchange. PQPerform-Lattice supports AXI4, PCIe, and is deployable in multiple instances, making it a powerful solution for existing systems and infrastructure requirements.

Premium Vendor
PQShield
GLOBALFOUNDRIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

SHA Hashing for Secure Data Verification

Secure Hash Algorithms (SHA) play a critical role in data integrity and security. The SHA family, including SHA-1, SHA-2, and the widely used SHA-256, provides a method for verifying data through unique hash values that represent original content. Helion Technology designs high-performance and resource-efficient hash cores that cater to both high-speed and low-power applications. Hash functions are integral in digital signatures, message authentication, and integrity verification, ensuring that transmitted or stored data remains unchanged and secure. By aligning the hashing capabilities with robust FPGA and ASIC technologies, Helion offers solutions that enhance data security without imposing hefty resource demands. These cores are engineered for low area and power consumption, making them ideal for compact and energy-sensitive applications.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Cryptography Software Library
View Details

PQPlatform CoPro

FIPS 140-3 CAVP-compliant, compact PQC hardware acceleration for subsystems PQPlatform-CoPro combines hash-based and lattice-based post-quantum cryptography that can be added to an existing security subsystem. It can be optimized for minimum area, maintaining high-performance, and is designed to be run by an existing CPU using PQShield-supplied firmware, meaning it involves low integration effort and flexible configurations to support a wide variety of use cases, including quantum-safe secure boot. Solutions are available for hardware acceleration of SHA-3, SHAKE, ML-KEM, ML-DSA, alongside traditional cryptography. In addition, PQPlatform-CoPro can be configured with side-channel protection. PQPlatform-CoPro is covered by multiple PQShield implementation patents.

Premium Vendor
PQShield
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

QUIC Protocol Core

The QUIC Protocol Core by Design Gateway is a high-speed, low-latency communication core designed to optimize network traffic in environments prone to congestion. It offers exceptional performance benefits over traditional protocols, leveraging the latest technology in secure and reliable data transmission.\n\nThis core is engineered to support high-speed environments, enhancing data throughput while reducing the likelihood of packet loss. It is particularly effective in networks with high congestion, where maintaining a seamless and efficient flow of data is critical. The QUIC Protocol Core's design focuses on minimizing latency, providing faster data exchange and enhancing overall network performance.\n\nIntegrating this protocol core into existing network infrastructure supports secure, encrypted data communication, vital for maintaining data integrity across various network environments. Its high-performance capabilities reduce overhead and improve application response times, making it indispensable for modern, high-speed data networks.\n\nBy incorporating the QUIC Protocol Core, businesses can optimize their network capabilities, ensuring secure, efficient, and reliable communications that are crucial for today's technology-driven communication systems.

Design Gateway Co., Ltd.
AI Processor, ATM / Utopia, Cryptography Cores, Error Correction/Detection, Ethernet, RapidIO, Security Protocol Accelerators, USB, V-by-One
View Details

RISC-V CPU IP NA Class

Specially engineered for the automotive industry, the NA Class IP by Nuclei complies with the stringent ISO26262 functional safety standards. This processor is crafted to handle complex automotive applications, offering flexibility and rigorous safety protocols necessary for mission-critical transportation technologies. Incorporating a range of functional safety features, the NA Class IP is equipped to ensure not only performance but also reliability and safety in high-stakes vehicular environments.

Nuclei System Technology
AI Processor, CAN-FD, CPU, Cryptography Cores, FlexRay, Microcontroller, Platform Security, Processor Core Dependent, Processor Cores, Security Processor, Vision Processor
View Details

AES-GCM for Authenticated Encryption

AES-GCM, or AES Galois Counter Mode, combines encryption with authentication to provide both data confidentiality and integrity. Originally developed for high-throughput applications, it can efficiently use pipelining and parallel processing to achieve exceptional speeds. Helion's AES-GCM solutions are tailored to meet diverse data rate requirements, ranging from several megabits to over 40 Gbps. The solutions are versatile across various technologies, offering unparalleled flexibility and performance. Beyond speed, Helion's AES-GCM cores are noted for their compact design, ensuring minimal resource utilization in both FPGA and ASIC implementations. Designed to fit scalable applications, these cores ensure robust data protection in high-demand environments, like networking and data storage.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Security Protocol Accelerators
View Details

PQPlatform Lattice

FIPS 140-3 CAVP-compliant, compact lattice-based hardware PQC engine PQPlatform-Lattice is a compact FIPS 140-3 CAVP-compliant, PQC engine that adds post-quantum support for hardware components and embedded devices, using lattice-based cryptographic algorithms such as ML-KEM (FIPS 203) for post-quantum key exchange, and ML-DSA (FIPS 204) – post-quantum digital signature verification. It provides secure acceleration of lattice-based PQC alongside support for traditional cryptography. Its use cases include strong user authentication, protecting hardware keys, and small-footprint, configurable side-channel protection. PQPlatform-Lattice is designed for minimal area as well as maximum compatibility and can be deployed with optional firmware-backed side-channel countermeasures. It is covered by multiple PQShield implementation patents.

Premium Vendor
PQShield
GLOBALFOUNDRIES
12nm
Cryptography Cores, Embedded Security Modules
View Details

eSi-Crypto

The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

HDCP Encryption-Decryption Engine

Trilinear Technologies' HDCP Encryption-Decryption Engine is a sophisticated solution designed to safeguard digital content as it traverses various transmission channels. This engine is compliant with the HDCP standards 1.4 and 2.3, offering robust protection mechanisms to ensure that digital media investments are secure from unauthorized access and piracy. The engine’s hardware acceleration capabilities represent a crucial advantage, significantly reducing the load on the system processor while maintaining real-time encryption and decryption functions. This not only enhances performance but also extends the operational life of the hardware involved, making it suitable for high-demand media applications across sectors such as broadcast, entertainment, and corporate environments. Trilinear’s HDCP Encryption-Decryption Engine ensures compatibility with a wide array of consumer and professional-grade video equipment, providing seamless protection without interference in media quality or transmission speed. Its flexible integration options allow it to be smoothly incorporated into existing infrastructures, whether in standalone media devices or complex SoC architectures. Supported by comprehensive software resources, the HDCP Encryption-Decryption Engine provides an all-encompassing solution that includes necessary software stacks for managing device authentication and link maintenance. Its ability to safeguard high-definition content effectively makes it an invaluable asset for entities focused on secure content delivery and rights management.

Trilinear Technologies
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

PQPlatform Hash

FIPS 140-3 CAVP compliant ultra-fast, compact, and power efficient secure hash acceleration PQPlatform-Hash is a power side-channel accelerator, supporting a wide range of Hash-Based Signature Schemes (HBSS). PQPlatform-Hash deploys tried-and-tested HBSS including quantum-safe LMS and XMSS (not hybrid). It provides acceleration of HBSS in embedded devices, especially where high throughput is required, or resource constraints necessitate minimal additional area. For example, PQPlatform-Hash is a solution for secure first-stage boot loading with hash-based signature schemes. HBSS offer different trade-offs of memory/area to lattice-based schemes, and as a result, PQPlatform-Hash is ideally suited for smaller key sizes, larger signature sizes, and processing times for key generation, signature generation and verification.

Premium Vendor
PQShield
Cryptography Cores, Platform Security
View Details

RISC-V CPU IP NS Class

The NS Class is Nuclei's crucial offering for applications prioritizing security and fintech solutions. This RISC-V CPU IP securely manages IoT environments with its highly customizable and secure architecture. Equipped to support advanced security protocols and functional safety features, the NS Class is particularly suited for payment systems and other fintech applications, ensuring robust protection and reliable operations. Its design follows the RISC-V standards and is accompanied by customizable configuration options tailored to meet specific security requirements.

Nuclei System Technology
CPU, Cryptography Cores, Embedded Security Modules, Microcontroller, Platform Security, Processor Cores, Security Processor, Security Subsystems, Vision Processor
View Details

FPGA Lock Core

The FPGA Lock Core is an innovative FPGA solution designed to secure FPGAs and hardware against unauthorized access and counterfeiting, leveraging a Microchip ATSHA204A crypto authentication IC. It reads a unique ID, generates a 256-bit challenge, and uses secure hashing to verify the hardware's authenticity, ensuring hardware integrity in sensitive applications like military and medical fields. This solution allows hardware protection against IP theft by enforcing authentication and disables FPGA functionality if unauthorized access is detected. The core utilizes minimal logic resources and one FPGA pin, communicating through a bidirectional open drain link. The clarity of this system is enhanced by providing the core in VHDL, allowing users to thoroughly understand its functionality, supported by example designs on Cyclone10 and Artix 7 boards, catering to both Intel and Xilinx FPGA platforms. Complementing this security measure is the Key Writer Core, which allows programming of custom secret keys into the ATSHA204A in situ on assembled boards, ensuring a seamless integration with the FPGA Lock system. Available for various FPGA platforms, the Efinix version, distributed with TRS Star, expands its applicability, with webinars and user guides offering in-depth implementation insights.

Nial Stewart Developments Ltd.
TSMC
28nm, 32nm
Cryptography Cores, Embedded Security Modules, Receiver/Transmitter, Security Protocol Accelerators
View Details

RISC-V Hardware-Assisted Verification

The RISC-V Hardware-Assisted Verification by Bluespec is a high-performance platform designed for swift and precise verification of RISC-V cores. It supports testing at both the core level (ISA) and system level, accommodating RTOS and Linux-based environments. This solution can verify standard ISA extensions, custom ISA extensions, and integrated accelerators, making it a versatile tool for various verification needs. One of the standout features of this platform is its scalability and accessibility via the AWS cloud, which ensures that resources can be tapped into as needed, enabling efficient verification anytime, anywhere. Such scalability is crucial for teams that require the flexibility to test various designs without being confined to local server limitations. With an emphasis on broad compatibility, the RISC-V Hardware-Assisted Verification platform is ideal for those involved in developing RISC-V based systems. It assists developers in ensuring their designs are accurate and reliable before deployment, reducing errors and speeding up time-to-market.

Bluespec
AMBA AHB / APB/ AXI, Coprocessor, CPU, Cryptography Cores, Input/Output Controller, Peripheral Controller
View Details

AES (standard modes) for Secure Encryption

The Advanced Encryption Standard (AES) provides robust encryption for data security applications. Originally chosen by the National Institute of Standards and Technology (NIST) in the late 1990s, AES became the standard for encryption, replacing the older DES system. Helion Technology was at the forefront of this shift, offering a variety of AES IP cores suitable for ASIC and FPGA technologies. Helion's range of AES solutions can address different application needs from minimal area to high-speed data processing. This allows customization and scalability to fit specific encryption requirements. AES includes multiple operational modes, such as CBC, CTR, OFB, and more, enabling users to choose based on throughput and security priorities. With core offerings that cover ultra-low gate count applications to high throughput scenarios, Helion's AES cores are designed to fit seamlessly into a wide range of systems. Furthermore, by embracing process nodes from leading foundry groups, these cores ensure efficient implementation in diverse commercial settings.

Helion Technology Limited
TSMC
90nm, 130nm, 180nm
Cryptography Cores, Other, Security Protocol Accelerators
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library designed to offer flexibility in code size, performance, and memory usage, making it an essential tool for developers working on resource-limited devices. Engineered for high adaptability, this software package provides a robust framework for implementing secure cryptographic operations across diverse platforms, including 8-bit to 64-bit processors. The library is meticulously crafted to support various configuration options that balance speed with memory efficiency, ensuring it meets custom specifications while preserving system integrity. Portable C code and high-speed, hand-optimized assembly variants are available to provide the ideal blend of compatibility and performance required in modern applications. Key features of Suite-Q SW include seamless integration as plug-in modules, support for a wide range of hardware offloads, and extensive compatibility with general-purpose and embedded CPUs. Validated through rigorous testing and performance measurements, it provides a reliable basis for secure software development, ensuring rapid deployment with minimized risk. As such, Suite-Q SW remains an indispensable part of PQSecure's comprehensive cryptographic offerings, perfect for adapting to the ever-changing landscape of digital security.

PQSecure Technologies, LLC
10 Categories
View Details

AON1020

Belonging to the AONSens™ Neural Network series, the AON1020 is crafted for both voice and audio recognition alongside other sensor applications. Recognized for its hectic performance in minimal power environments, AON1020's AI processing engine is available in Verilog RTL, making it accessible for use in ASIC and FPGA technologies. Engineered for scenarios like human activity detection through sensor applications, this IP provides always-on multi-wake-word detection and on-device voice command recognition. Its features ensure adaptability even in environments characterized by noise, offering stable performance irrespective of user or environmental changes. The AON1020's robust architecture accommodates sensor fusion applications, enhancing its capability in multi-sensor environments where it can decipher activities like running or walking. This offers developers potent solutions in expanding markets such as smart home automation and industrial IoT applications.

AONDevices, Inc.
AI Processor, CPU, Cryptography Cores, Sensor
View Details

RISC-V CPU IP NI Class

The NI Class RISC-V CPU IP caters to communication, video processing, and AI applications, providing a balanced architecture for intensive data handling and processing capabilities. With a focus on high efficiency and flexibility, this processor supports advanced data crunching and networking applications, ensuring that systems run smoothly and efficiently even when managing complex algorithms. The NI Class upholds Nuclei's commitment to providing versatile solutions in the evolving tech landscape.

Nuclei System Technology
3GPP-LTE, AI Processor, CPU, Cryptography Cores, Microcontroller, Processor Core Dependent, Processor Cores, Security Processor, Vision Processor
View Details

Suite-Q HW

Suite-Q HW is a robust system-on-chip (SoC) solution that envelops all the necessary cryptography required for secure protocols within compact and efficient hardware. Targeted at both high-end servers and low-end embedded systems, this solution emphasizes the dual benefits of scalability and adaptability. Suite-Q HW efficiently offloads demanding symmetric and asymmetric cryptographic processes by leveraging specialized accelerators, offering enhanced execution speeds that cater to different application requirements. A key component of its utility lies in its support for a wide array of cryptographic operations. This includes classical public key methods, such as ECDSA and ECDH, alongside emerging post-quantum techniques within isogeny and lattice frameworks. The hardware is further augmented by secure hash algorithms and diverse AES encryption modes, delivering comprehensive protection across a variable security landscape. Incorporating optional Differential Power Analysis (DPA) countermeasures and validated security standards, Suite-Q HW ensures security for sensitive data against contemporary and emerging threats. It facilitates integration with existing development flows across SoCs and FPGAs, optimizing power and silicon footprint according to specific needs. Furthermore, the hardware package provides comprehensive resources for integration, from testbench data to simulation scripts, enhancing its adaptability and effectiveness in today's digital security paradigm.

PQSecure Technologies, LLC
13 Categories
View Details

AES Core

The AES Core by Algotronix is a sophisticated solution tailored for securing data using advanced encryption methods. This core supports various encryption modes such as ECB, CBC, CTR, CFB, OFB, CCM, GCM, and XTS, which cater to a wide array of applications requiring different levels and methods of data protection. The flexibility in supported modes allows for tailored implementations in different security-critical environments. This encryption core is known for its deployment among prominent defense electronics organizations, and it has been operational within several NATO member states, testifying to its high-level security assurance and operational readiness in sensitive global contexts. Offered typically in source code form, the AES Core ensures that users can perform thorough security audits and tailor enhancements specific to their security policies and infrastructural needs. This capability positions Algotronix's offering as an optimal choice for organizations prioritizing stringent security postures.

Algotronix Ltd.
Cryptography Cores
View Details

DolphinWare IPs

DolphinWare IPs is a versatile portfolio of intellectual property solutions that enable efficient SoC design. This collection includes various control logic components such as FIFO, arbiter, and arithmetic components like math operators and converters. In addition, the logic components span counters, registers, and multiplexers, providing essential functionalities for diverse industrial applications. The IPs in this lineup are meticulously designed to ensure data integrity, supported by robust verification IPs for AXI4, APB, SD4.0, and more. This comprehensive suite meets the stringent demands of modern electronic designs, facilitating seamless integration into existing design paradigms. Beyond their broad functionality, DolphinWare’s offerings are fundamental to applications requiring specific control logic and data integrity solutions, making them indispensable for enterprises looking to modernize or expand their product offerings while ensuring compliance with industry standards.

Dolphin Technology
TSMC
28nm, 32/28nm
Building Blocks, Coprocessor, Cryptography Cores, Receiver/Transmitter
View Details

2048B ECC Error Correction for High-Density NAND

Featuring G15, this IP is optimized for 2KB correction blocks, suitable for NAND devices with larger page sizes, such as 8KB. The design is aligned with methods seen in the G14X, but it extends its reach with longer codewords for comprehensive coverage of high-density NAND. The design supports a wide array of block sizes and configurational setups, making it highly adaptable to varying design needs. Additional error correction capabilities can be integrated based on client requirements, reinforcing its bespoke delivery.

Cyclic Design
Cryptography Cores, DDR, Error Correction/Detection, Flash Controller, NVM Express, Processor Core Independent, SDRAM Controller
View Details

Cyclone V FPGA with Integrated PQC Processor

The Cyclone V FPGA with Integrated PQC Processor by ResQuant is a specialized product that comes pre-equipped with a comprehensive NIST PQC cryptography suite. This FPGA is tailored for applications requiring a robust proof-of-concept for quantum-safe implementations. It ensures seamless integration into existing systems, providing a practical platform for testing and deployment in quantum-secure environments. This product is available at a competitive price and represents an ideal starting point for entities looking to explore and adopt quantum-resilient technologies. Its configuration allows for straightforward implementation in diverse hardware infrastructures while offering a reliable option for organizations aiming to stay ahead in the evolving cyber security landscape. By incorporating the latest in cryptographic standards and ensuring vendor independence, the Cyclone V FPGA with Integrated PQC Processor by ResQuant effectively bridges current hardware technologies and future-proof security needs. It supports industry-wide applications, from IoT and ICT to automotive and military sectors, underscoring ResQuant's versatility in hardware security solutions.

ResQuant
All Foundries
All Process Nodes
13 Categories
View Details

AndeSoft SW Stack

AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.

Andes Technology
CPU, Cryptography Cores, Cryptography Software Library
View Details

NeoPUF

NeoPUF is revolutionizing hardware security by providing up to 100 times faster random number generation. This advanced security technology plays a critical role in safeguarding semiconductor devices against emerging threats. It incorporates a hardware-based random number generator which powers the development of the next generation of secure chips, ensuring robust protection from unauthorized access. Positioned as a critical component in the development of secure semiconductors, NeoPUF integrates seamlessly into existing systems, offering a quantum-resilient solution. This capability is vital in defense against potential quantum-era threats, providing security that remains effective even as technology landscapes shift. NeoPUF supports operations across diverse applications, particularly in sensitive environments where data integrity is paramount. As part of PUFsecurity's comprehensive lineup, NeoPUF not only enhances secure storage options but also facilitates reliable identification and anti-cloning features. It is a key enabler of trusted computing across numerous industries, underlining its importance in the modern era where security is indispensable.

eMemory Technology Inc.
TSMC
16nm FFC/FF+
Cryptography Cores, Embedded Memories, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QDID PUF

The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

DSHA2-512

The DSHA2-512 core specializes in the SHA2-512 hashing algorithm, providing a highly efficient means to process hashing functions in data-intensive environments. It is designed to comply with FIPS PUB 180-4 standards, ensuring that it meets established guidelines for secure hashing operations necessary in a variety of industry settings. With interfaces that include APB, AHB, and AXI, the DSHA2-512 exhibits broad compatibility with existing digital infrastructures, enabling it to be deployed across a wide array of technology solutions. This core is ideal for sectors where ensuring data integrity and authenticity is critical, such as finance, governmental, and secure communications sectors. Its enhanced technical capabilities mean that the DSHA2-512 core supports extensive data processing requirements while maintaining the security integrity of hashes, making it an essential component for applications that demand reliable hash computation and data security.

Premium Vendor
DCD-SEMI
Cryptography Cores, Platform Security
View Details

Alcora V-by-One HS Daughter Card

The Alcora V-by-One HS Daughter Card by Parretto B.V. is designed to facilitate high-speed video data transmission with minimal wire insulation. Featuring V-by-One HS technology, it provides seamless connectivity for large video content transfer over fewer cables, supporting high-definition resolutions efficiently. Alcora's focus on V-by-One HS technology makes it suitable for applications where reduced cable clutter and high data transfer rates are necessary. It becomes an excellent choice for display applications that demand clean setups while transmitting vast amounts of data. By integrating this daughter card, system designers can achieve a streamlined architecture that supports robust video transmission without the associated clutter, keeping systems neat and efficient. Its compatible interface ensures it integrates well with existing video systems, offering scalable and future-proof solutions.

Parretto B.V.
AMBA AHB / APB/ AXI, Analog Filter, ATM / Utopia, Audio Interfaces, Cryptography Cores, Cryptography Software Library, LCD Controller, V-by-One, VESA, VGA
View Details

PQPlatform SubSys

Fully autonomous, FIPS 140-3 CAVP compliant PQC subsystem PQPlatform-SubSys is a cryptographic subsystem, designed to provide offloaded cryptographic services with minimal integration effort and full autonomy from an existing security subsystem, as well as configurable side-channel protection. These services include post-quantum signature generation, verification, and secure key establishment. It’s built with optimal performance in mind, as well as crypto agility with its provision of traditional, PQ/T hybrid and fully post-quantum algorithms. PQPlatform-SubSys uses its built-in RISC-V CPU independently from the surrounding system, allowing cryptographic services to be offloaded efficiently from the system processor.

Premium Vendor
PQShield
Samsung
12nm
Cryptography Cores, Embedded Security Modules
View Details

Digital Systems and Security Solutions

VeriSyno Microelectronics offers Digital Systems and Security Solutions designed to enhance the robustness and efficiency of modern digital applications. This comprehensive suite includes IPs for PSRAM interfaces, network protocols like vMAC, and security mechanisms, addressing the critical needs for secure and efficient digital communications. The digital solutions are engineered to meet stringent security protocols, ensuring data integrity and protection in various applications. VeriSyno's expertise in digital system design enables the development of reliable solutions that integrate seamlessly into existing infrastructures, enhancing both system performance and security. These solutions are suitable for a broad spectrum of digital applications, including consumer electronics, automotive, and industrial systems, where efficient data handling and security are paramount. With ongoing innovation, VeriSyno maintains its competitive edge by adapting to emerging industry requirements and introducing forward-thinking digital solutions.

VeriSyno Microelectronics Co., Ltd.
Cryptography Cores, Embedded Memories, Embedded Security Modules, NVM Express, Security Protocol Accelerators, Security Subsystems, V-by-One
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AIoT Platform

SEMIFIVE’s AIoT Platform targets smart environmental ecosystems, offering convergence of AI capabilities with IoT frameworks. This platform enhances connectivity and intelligence in next-generation smart devices and facilities, integrating edge computing and AI capabilities to enable intelligent data processing and real-time action. The AIoT platform is equipped with multi-core processing capabilities, providing energy-efficient solutions suited for edge environments. This facilitates distributed AI computations right where data is generated, significantly improving response times and reducing backhaul costs compared to traditional centralized models. Designed to support a wide range of devices and systems, the platform allows developers to build solutions that are scalable and adaptable to various IoT applications. It provides comprehensive hardware-software co-design solutions, simplifying the development process for applications like smart homes, industrial IoT systems, and intelligent transportation networks.

SEMIFIVE
Samsung
5nm, 12nm, 14nm
14 Categories
View Details

512B ECC Error Correction for NAND

The G13/G13X series is tailored for 512B correction blocks, particularly used in NAND setups with 2KB to 4KB page sizes. While both variants are crafted to manage the demands of SLC NAND transitions to finer geometries, the G13X allows for correction of a higher number of errors. Designed to fit seamlessly into existing controller architectures, it enables extensions of current hardware and software capabilities without extensive new investments. It offers area optimization through parameter adjustments and supports a range of channel configurations for broad applicability.

Cyclic Design
Cryptography Cores, DDR, Error Correction/Detection, Flash Controller, NVM Express, Processor Core Independent, SDRAM Controller
View Details

AES Encrypt/Decrypt 128/192/256

The AES Encrypt/Decrypt IP provided by Secantec offers a highly secure solution for data encryption and decryption, supporting 128, 192, and 256-bit key lengths. Adhering to the Advanced Encryption Standard (AES), this IP ensures that data confidentiality is maintained across various platforms and applications. With its comprehensive encryption capability, this IP is pivotal in protecting sensitive data against unauthorized access, making it indispensable in secure communication systems, data storage solutions, and more. It provides a robust security framework that can be implemented efficiently within existing infrastructures. By leveraging the versatility of AES algorithms, the IP can be seamlessly integrated into a wide range of environments, from high-performance computing systems to portable devices requiring secure data channels. Its design ensures minimal latency and resource overhead, delivering a swift and reliable encryption mechanism.

Secantec, Inc.
Cryptography Cores
View Details

CANsec Controller Core

The CANsec Controller Core is engineered to provide enhanced security features for automotive CAN networks. Traditional CAN networks are not inherently secure, posing challenges in protecting against unauthorized access and data tampering. This controller core integrates security protocols directly into the CAN framework, offering an encryption-enabled solution tailored for modern automotive needs. This controller core implements standardized security measures, ensuring confidentiality, integrity, and authenticity of CAN messages. By incorporating advanced cryptographic algorithms, the CANsec Controller Core meets stringent security requirements without compromising the performance that automotive applications demand. Its design focuses on minimizing resource consumption while providing robust security enhancements. Ideal for vehicles requiring secure communication between various electronic control units (ECUs), the core upholds the automotive industry’s increasing emphasis on cybersecurity. The CANsec Controller Core is versatile in its implementation, suitable for both new vehicle architectures and as an upgrade to existing systems, making it a vital component of future-proof automotive design.

Fraunhofer Institute for Photonic Microsystems (IPMS)
CAN, CAN XL, CAN-FD, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Temperature Sensor
View Details

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM as FTP/OTP Memory

Tailored for applications requiring secure non-volatile memory, CrossBar's ReRAM as FTP/OTP Memory offers a refined solution for few-time programmable (FTP) and one-time programmable (OTP) needs. Leveraging the intrinsic properties of ReRAM technology, these applications benefit from reduced write requirements and minimized area without compromising security or performance. This ReRAM variant integrates effectively within standard CMOS processes, providing adaptability whether used independently or embedded within more complex systems. Its non-volatility and high density make it a preferred choice for secure applications where cost-efficient data integrity is essential. The technology supports diverse applications across numerous sectors including automotive, medical, and industrial systems, where quick response times and reliability are critical. The FTP/OTP ReRAM enables provisioning for physical unclonable functions (PUF), further enhancing its security capabilities. Such an implementation provides resistance to invasive attacks and maintains data integrity even under adverse conditions. These features position ReRAM as a powerful tool for managing sensitive data operations and broad pursuits in modern digital infrastructures.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Flash Controller, HBM, I/O Library, Mobile DDR Controller, Mobile SDR Controller, NAND Flash
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

AES Encryption Core

Ocean Logic's AES Encryption Core represents a robust and reliable solution for securing data across numerous platforms. Renowned for its certification and extensive validation in silicon on both FPGA and ASIC, this IP core has established credibility and trust among a diversified customer base. The AES core has seen nearly 60 successful implementations, underlining its reliability in providing robust data security. This encryption core complies with stringent security standards, ensuring data integrity and confidentiality. It is subject to Australia's Export Control regulations, qualifying it for international deployment across numerous key markets worldwide. Such widespread recognition indicates its versatility and adaptability to meet various encryption needs. For businesses and organizations prioritizing data security, Ocean Logic's AES Encryption Core offers a proven, high-performance solution. Its design facilitates seamless integration into existing systems, providing a comprehensive encryption capability while maintaining operational efficiency. The IP core stands as an ideal choice for companies looking to fortify their security measures with a trusted, efficient, and scalable encryption architecture.

Ocean Logic Pty Ltd
All Foundries
All Process Nodes
Cryptography Cores
View Details

IPSEC Core

The IPSEC Core by Algotronix is designed to secure IP communications by providing robust encryption and authentication mechanisms. Essential for ensuring data confidentiality and integrity over IP networks, this core is suitable for embedding into network devices and systems aimed at safeguarding data against potential interception or tampering. Catering to a broad range of IP-based communication systems, the IPSEC Core offers flexibility and reliability, making it a preferred choice for developers focusing on secure data exchange methods. The ease of integration allows for its deployment in both new and existing network architectures, underpinning secure transmissions across increasingly complex digital environments. Its wide acceptance and deployment in secure communications underscore the IPSEC Core's effectiveness in delivering critical security features, thus supporting enterprises in protecting sensitive data across diverse network topologies.

Algotronix Ltd.
AMBA AHB / APB/ AXI, Cryptography Cores, Ethernet, RapidIO
View Details

PhantomBlu - Tactical Communications

PhantomBlu is a sophisticated mmWave communication solution specifically designed for the defense sector, empowering military operations with robust, high-performance connectivity. Leveraging advanced mmWave technology, it supports tactical connections between land, sea, and air platforms, enabling seamless IP networking over a secure, anti-jam resistant mesh network. PhantomBlu’s design is optimized for rapid deployment and versatile use across various challenging military and defense environments. The PhantomBlu system offers unprecedented connectivity and integration capabilities, supporting high-bandwidth, low-latency communications essential for defense operations. It features LPI (Low Probability of Interception) and LPD (Low Probability of Detection), ensuring stealth and operational security. Its adaptive networking solutions significantly enhance situational awareness and interoperability amongst varied defense assets, assuring seamless transfer of C4ISR data. Whether deployed across large terrains or in mobile units, PhantomBlu's resilience and scalability ensure that defense teams operate with confidence. Its advanced capabilities are critical in mitigating risks and enhancing strategic emission, making it an invaluable asset for modern military communications needs.

Blu Wireless Technology Ltd.
Intel Foundry, Samsung
28nm, 65nm
24 Categories
View Details

Cryptographic Core

PQSecure's Cryptographic Core serves as a comprehensive solution for implementing standardized cryptographic algorithms within system-on-chip (SoC) designs. This product is tailored for diverse applications, ranging from high-end servers to low-end embedded systems, ensuring broad compatibility. It effectively offloads both symmetric and asymmetric cryptographic operations, boosting execution efficiency. The core includes hardware accelerators capable of performing various cryptographic functions, such as true random number generation and classical public key cryptographic algorithms like ECDSA and ECDH. Incorporating next-generation post-quantum cryptographic methods, this core tackles the imminent threats posed by quantum computing. By supporting isogeny-based, lattice-based, and code-based cryptographies, it prepares systems for the quantum evolution. Furthermore, this Cryptographic Core supports secure hashing algorithms and a variety of advanced encryption standards, ensuring robust protection across different security levels recommended by standardization bodies. As an embodiment of both agility and security, it integrates seamlessly into various SoC and FPGA architectures, providing substantial power reductions compared to traditional software implementations. Designed with future-proofing in mind, PQSecure's Cryptographic Core features optional side-channel protection mechanisms validated by standard techniques, delivering DPA countermeasures without significant overhead. It boasts a comprehensive suite of verification tools, including test benches and simulation scripts, making integration into existing systems both easy and efficient. With customizable performance profiles, the Cryptographic Core is engineered to meet the demanding security requirements of tomorrow's digital environments.

PQSecure Technologies, LLC
9 Categories
View Details

DAES

The DAES is a sophisticated cryptographic co-processor IP designed to implement the Rijndael encryption algorithm, which forms the basis of the Advanced Encryption Standard (AES). By supporting key sizes of both 128 and 256 bits, this core provides robust encryption capabilities through various cipher modes including ECB, CBC, CFB, OFB, and CTR, ensuring diverse applications can leverage these functionalities for enhanced data security. The DAES core is equipped with an internal key expansion module, allowing it to manage encryption and decryption operations efficiently. It offers seamless integration into APB, AHB, and AXI buses, enabling it to be easily incorporated into a wide variety of digital solutions where encryption is paramount. This IP core is adaptable, providing developers with a reliable and scalable solution to safeguard sensitive data across multiple platforms and environments. The DAES benefits sectors that heavily rely on encryption for secure transactions and communications, making it a valuable asset in industries like finance, government, and telecommunications.

Premium Vendor
DCD-SEMI
Cryptography Cores, Security Subsystems
View Details
Load more
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt