Find IP Sell IP AI Assistant Chip Talk About Us
Log In

All IPs > Security IP > Platform Security

Platform Security Semiconductor IP Solutions

In today's digital world, the importance of platform security cannot be overstated. Platform security semiconductor IPs are essential for protecting electronic systems from an increasing array of threats. These IPs play a critical role in ensuring that systems remain secure by safeguarding data, communications, and applications from unauthorized access or malicious attacks.

Platform security IPs include a variety of solutions such as encryption engines, secure boot mechanisms, and trusted execution environments. These technologies work in harmony to validate the authenticity of hardware and software components, providing a comprehensive security framework for electronic devices. By integrating these security measures at a fundamental level, semiconductor IPs ensure that systems are resilient to tampering and meet stringent security standards.

The applications of platform security semiconductor IPs span across a multitude of industries. From consumer electronics like smartphones and smart home devices to critical infrastructure systems and automotive applications, robust security is imperative. These IPs are designed to address the security needs of both edge devices and cloud-based platforms, preserving the integrity and confidentiality of sensitive data as it is processed and transmitted.

In our Silicon Hub, you will find a diverse array of platform security semiconductor IPs tailored to meet varied security requirements. Whether you're looking to protect consumer devices or safeguard enterprise data centers, our cutting-edge IP solutions provide the reliability and flexibility needed to counteract evolving security threats. Explore our category to enhance your products with state-of-the-art security technologies.

All semiconductor IP
31
IPs available

Akida Neural Processor IP

The Akida Neural Processor is a sophisticated AI processing unit designed to handle complex neural network tasks with unmatched precision and efficiency. Utilizing an event-based processing model, Akida exploits data sparsity to minimize operations and hence decrease power usage significantly while enhancing throughput. This processor is built around a mesh network interconnect, with each node equipped with configurable Neural Network Engines that can handle convolutional and fully connected neural networks. With these capabilities, Akida can process data at the edge, maintaining high-speed, low-latency responses ideal for real-time applications. Akida maintains seamless functionality in diverse use cases, from predictive maintenance to streaming analytics in sensors. By supporting on-chip learning and providing strong privacy controls, this processor ensures data security by reducing cloud data exchanges, making it a trusted component for sensitive applications.

Brainchip
1406 Views
TSMC
32nm
AI Processor, Digital Video Broadcast, Platform Security, Vision Processor
View Details

Secure Enclave (Hardmacro)

Overview: The Secure Enclave IPs are Common Criteria (CC) EAL5+PP0084/PP0117 and EAL5+PP0117 certification-ready Secure Enclaves, respectively. They are available as hard macros for seamless integration into SoCs. These Secure Enclave IPs provide the highest level of security for an SoC, incorporating patented design techniques and countermeasures against side-channel and perturbation attacks to ensure robust security while minimizing power consumption. Key Features:  Cryptographic Hardware Accelerators: Efficiently support standard cryptography and security operations to increase throughput while adhering to power constraints and security requirements.  BootROM and Secondary Boot Loader: Manage the certified life cycle of the Secure Enclave, enforcing and assuring security from manufacturing to deployment.  Proprietary IP: Based on proprietary IP that is free of 3rd party rights and royalties. Benefits: The Secure Enclave IPs offer robust security measures, efficient cryptographic support, and secure life cycle management, making them ideal for applications that require the highest levels of security and reliability. Applications: The Secure Enclave IP is versatile and suitable for a wide range of applications, including but not limited to:  Secured and Certified iSIM & iUICC  EMVco Payment  Hardware Cryptocurrency Wallets  FIDO2 Web Authentication  V2X HSM Protocols  Smart Car Access  Secured Boot  Secure OTA Firmware Updates  Secure Debug  Any design requiring a Secure Enclave, Secure Element, or Hardware Root of Trust protected against side-channel and perturbation fault attacks. Compliance and Support: The Secure Enclave is compliant with and ready for CC EAL5+ and EMVCo certification. It is delivered with an SDK and pre-certified CryptoLibrary and secure Boot Loader for seamless integration and enhanced security.

Plurko Technologies
136 Views
All Foundries
All Process Nodes
Platform Security
View Details

Spec-TRACER

Spec-TRACER is a robust requirements lifecycle management platform tailored for FPGA and ASIC projects. Focusing on facilitating seamless requirements capture, management, and traceability, it ensures that every stage of the design process is aligned with the initial specifications. Its analytical features further enable a comprehensive evaluation of design progress, promoting efficiency and thoroughness throughout the development lifecycle.

Aldec, Inc.
98 Views
AMBA AHB / APB/ AXI, CPU, Platform Security, Processor Cores, RapidIO
View Details

Akida IP

Akida IP stands as an advanced neuromorphic processor, emulating brain-like processing to efficiently handle sensor inputs at acquisition points. This digital processor offers superior performance, precision, and significant reductions in power usage. By facilitating localized AI/ML tasks, it decreases latency and enhances data privacy. Akida IP is built to infer and learn at the edge, offering highly customizable, event-based neural processing. The architecture of Akida IP is scalable and compact, supporting an extensive mesh network connection of up to 256 nodes. Each node includes four Neural Network Layer Engines (NPEs), configurable for convolutional and fully connected processes. By leveraging data sparsity, Akida optimizes operation reduction, making it a cost-effective solution for various edge AI applications. Including MetaTF support for model simulations, Akida IP brings a fully synthesizable RTL IP package compatible with standard EDA tools, emphasizing ease of integration and deployment. This enables developers to swiftly design, develop, and implement custom AI solutions with robust security and privacy protection.

Brainchip
93 Views
TSMC
28nm
AI Processor, Cryptography Cores, IoT Processor, Platform Security, Vision Processor
View Details

PUFrt

PUFrt serves as a foundational hardware root of trust, featuring advanced key generation and storage capabilities inherent to the chip. It integrates a true random number generator (TRNG) and hardcore anti-tamper protections. With a built-in secure OTP, PUFrt provides unrivaled security for sensitive data, ensuring encryption and decryption processes are secured at the hardware level. This IP is adept at securing the semiconductor supply chain, countering the risks of reverse engineering and ensuring device authenticity through its robust identification systems. PUFrt features extensive customization options and interfaces for integration across diverse architectures, aiming to minimize user effort in embedding security functions within complex systems.

PUFsecurity
82 Views
Samsung, TSMC
12nm, 28nm
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Aeonic Integrated Droop Response System

The Aeonic Integrated Droop Response System is designed to enhance droop and DVFS response for integrated circuits. It includes multi-threshold droop detection and fast adaptation times, ensuring power savings and optimal system performance. This technology provides extensive observability and integrates standard interfaces like APB & JTAG, aiding silicon health management by delivering data-driven insights for lifecycle analytics.

Movellus
74 Views
Analog Subsystems, Clock Synthesizer, DC-DC Converter, Platform Security, SDRAM Controller
View Details

PLIC

The Platform-Level Interrupt Controller (PLIC) from Roa Logic is a fully configurable and parameterized component, ensuring complete compliance with RISC-V standards. It's designed to manage and streamline the handling of numerous interrupts in a system, offering the flexibility demanded by diverse application needs. This PLIC is ideal for deployments where robust interrupt management is crucial.

Roa Logic BV
70 Views
Arbiter, Embedded Security Modules, IEEE1588, Interrupt Controller, Platform Security
View Details

eSi-Crypto

The eSi-Crypto suite from EnSilica encompasses a comprehensive range of cryptographic IPs targeted for ASIC and FPGA designs. This suite features low resource consumption and high throughput, crucial for secure and efficient cryptographic solutions. A key component is a robust True Random Number Generator (TRNG) compliant with NIST 800-22, available only as a hard macro. This IP provides essential cryptographic functions such as encryption, decryption, and authentication using algorithms like AES, RSA, ECC/ECDSA, and many more. Designed to cater to the evolving threat of quantum computing, this IP supports post-quantum cryptographic algorithms to future-proof data security. These cryptographic tools are integrated as standalone IPs or come with AMBA AHB/AXI bus interfaces, enabling seamless incorporation into a wide range of customized or standardized security applications across industries.

EnSilica
66 Views
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

Post-Quantum Cryptography IP

The Post-Quantum Cryptography (PQC) IP from Secure-IC offers solutions resilient against quantum computing threats. The PQC IP includes a hybrid hardware-software model that enables scalable security across various applications. It forms part of Secure-IC's forward-looking approach to cybersecurity that emphasizes both hardware accelerators and software libraries, which execute key generation and encapsulation with protection against side-channel attacks. This kind of versatility in cryptography makes it an excellent choice for next-generation secure communication platforms.

Secure-IC
66 Views
3GPP-5G, Cryptography Cores, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiMac

FortiMac provides a reliable HMAC SHA2 IP core solution with advanced resistance against DPA and FIA, utilizing a minimal number of digital gates for an efficient security measure. Its underlying protection is built on the Threshold Implementation strategy, which offers formidable resistance against SCA and FI attacks. This IP stands out as the sole market component offering pure software solutions with robust algorithmic safeguards. FortiMac effectively supports various SHA schemes and ensures SCA and FIA protection on multiple processor architectures, making it adaptable for a range of applications including secure communications and automotive systems.

FortifyIQ
63 Views
Cryptography Cores, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiPKA-RISC-V

FortiPKA-RISC-V is a specialized public key accelerator that enhances the performance of complex cryptographic operations while ensuring protection against SCA and FIA threats. Designed for embedded systems and IoT devices, this IP employs modular multiplication and eliminates the need for Montgomery domain transformations, thereby streamlining operations and optimizing area usage. It offers an extensive support for a variety of cryptographic algorithms, including RSA and ECC, providing a comprehensive cryptographic capability suitable for a range of security-intense applications. This product is engineered to enhance data protection while improving system performance, crucial for compliance with demanding industry standards.

FortifyIQ
62 Views
AMBA AHB / APB/ AXI, Coprocessor, Cryptography Cores, Platform Security, Security Protocol Accelerators, Vision Processor
View Details

Securyzr iSSP

Securyzr Integrated Security Services Platform (iSSP) is a comprehensive lifecycle management solution. This platform allows Secure-IC's clients to monitor, manage, and secure their embedded devices throughout their operational lifecycle. It enables provisioning, firmware updates, security monitoring, and device identity management with high ease and trustworthiness. This solution facilitates zero-touch lifecycle services, significantly enhancing the security posture of device fleets in dynamic environments, thus demanding minimal interruption in ongoing operations.

Secure-IC
62 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

AES Encryption for RFID applications

The AES Encryption for RFID applications is engineered to provide robust security for data in RFID communications. Utilizing Advanced Encryption Standard (AES) techniques, it offers a secure and efficient mechanism for protecting sensitive information transmitted in RFID systems. This encryption solution is ideal for applications where data integrity and confidentiality are paramount, protecting against unauthorized access and ensuring secure wireless transactions.

RADLogic Pty Ltd
59 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

PQPlatform CoPro

Post-Quantum Cryptography Processor PQPlatform-CoPro (PQP-HW-COP) adds PQShield’s state-of-the-art post-quantum cryptography (PQC) to your security sub-system, with optional side-channel countermeasures (SCA). PQPlatform-CoPro can be optimized for minimum area as part of an existing security sub-system. PQPlatform-CoPro is designed to be run by an existing CPU in your security system, using PQShield’s supplied firmware.

PQShield
55 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

NVM Defender

NVM Defender is Texplained's pioneering hardware module designed to safeguard integrated circuits from common invasive attacks aimed at extracting non-volatile memory. The module provides a robust solution against the copying, emulation, cloning, and counterfeiting of chips by integrating security by design principles. This innovative technology detects invasive attempts in real-time, thereby rendering bypass strategies impracticable. It is effectively engineered for seamless integration into existing chip designs, offering a cost-effective security enhancement for chip manufacturers and integrators.

Texplained
52 Views
Embedded Security Modules, NVM Express, Platform Security, Security Subsystems
View Details

PQPlatform Hash

Post-Quantum Hardware Accelerator Power side-channel accelerator, supporting a wide range of Hash-Based Signature Schemes (HBSS). PQPlatform-Hash deploys tried-and-tested HBSS including quantum-safe LMS and XMSS (not hybrid). It provides acceleration of HBSS in embedded devices, especially where high throughput is required, or there’s a demand on signature verification. Hash-based signature schemes offer different trade-offs of memory/area to lattice-based, and as a result, PQPlatform-Hash is ideally suited for smaller key sizes, larger signature sizes, and processing times for key generation, signature generation and verification.

PQShield
52 Views
Cryptography Cores, Platform Security
View Details

iShield Key

The iShield Key by Swissbit is a robust hardware authentication tool tailored to protect digital identities in online environments. This security device combines ease of use and high levels of protection to safeguard user data against threats like phishing and unauthorized access. It's designed to integrate with existing systems seamlessly, offering a plug-and-play user experience. The iShield Key stands out for its innovative use of FIDO (Fast Identity Online), ensuring that the user's sensitive information remains secure across platforms.

Swissbit AG
51 Views
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

Securyzr Key Management System

The Securyzr Key Management System offers a comprehensive environment for managing authentication keys, ensuring their secure distribution and maintenance. This system is engineered to protect data integrity and privacy in widespread IoT networks. By incorporating features like secure key bootstrapping and updates, the system ensures robust protection against unauthorized access and misuse of secure keys, making it ideal for deployments that demand high levels of trust and secrecy.

Secure-IC
49 Views
Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators
View Details

iShield HSM

Swissbit's iShield HSM is a versatile hardware security module tailored for IoT applications, enabling secure storage of cryptographic keys. This module enhances device authentication and registration in a straightforward plug-and-play format, making it an excellent choice for system integrators looking to retrofit security in existing systems. The iShield HSM ensures that sensitive information such as private keys and certificates are securely maintained, protecting against unauthorised access and duplication.

Swissbit AG
48 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Security Protocol Accelerator

This accelerator is pivotal in enhancing the performance of cryptographic protocols, significantly offloading the computational demand from primary processors. Designed with advanced threat models in mind, it supports a wide range of security operations, ensuring fast and secure data handling. The accelerator is built to accommodate both current standards and potential future adaptations, particularly in environments susceptible to high-risk operations. Its integration into existing systems offers a seamless upgrade path, providing robust solutions against evolving cryptographic threats.

PQSecure Technologies, LLC
47 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

DCRP1A

DCRP1A, branded as CryptOne, represents a leading-edge cryptographic solution derived from two decades of expertise at Digital Core Design. This IP core is engineered to deliver unparalleled security by providing a 100% secure cryptographic environment, specifically designed to be resilient against the computational challenges posed by quantum computing advancements. It boasts a minimal silicon footprint while offering superior processing speeds, making it ideal for applications requiring robust security mechanisms.

Digital Core Design
46 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details

Side-channel Attack Resistance

Side-channel Attack Resistance from FortifyIQ offers a comprehensive solution to side-channel threats through both hardware and software components. Primarily, it focuses on SCA-protected implementations, leveraging novel algorithmic techniques to shield sensitive data without degrading system performance. This technology is pivotal in applications where information security is paramount, such as in financial systems, automotive systems, and secure communications, providing rigorous validation processes compliant with industry standards. The Side-channel solution offers adaptability across various hardware platforms, enhancing security while maintaining compatibility with legacy systems.

FortifyIQ
46 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

ECDSA Sign

The ECDSA Sign core from Digital Core Design offers a cutting-edge solution for digital signatures using elliptic curve cryptography (ECC). Known for its optimal size-to-performance ratio, this core implements essential standards such as NIST and Brainpool, across a variety of elliptic curves. Offering a NAND gate range from 30k to 110k, it provides a high-efficiency option for implementing secure digital signatures in electronic communication and authentication systems.

Digital Core Design
41 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details

ECDSA Verify

ECDSA Verify by Digital Core Design ensures secure digital communication through elliptic curve signature verification. Supporting key elliptic curves, this core is engineered to achieve the best possible performance-to-size ratio, guaranteeing exceptional safety and reliability. It is instrumental in authentication processes where digital signatures are critical, providing robust verification that withstands contemporary security challenges.

Digital Core Design
41 Views
Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details

CCSDS LDPC (8160, 7136)

The CCSDS LDPC IP Core implements LDPC (Low-Density Parity-Check) codes as per the Consultative Committee for Space Data Systems (CCSDS) standards, specifically catering to the complex needs of space communication systems. This IP core optimizes data transmission over long distances by providing reliable error correction and enhancing the signal integrity. With its attributes tailored for space applications, the CCSDS LDPC IP Core is highly effective in environments where bandwidth and processing power are limited, yet high reliability is mandatory. It employs efficient coding strategies to minimize data loss and improve the clarity of received signals, a critical factor for satellite and interstellar communications. The core design supports a wide range of platform deployments, offering scalable performance for diverse space missions. Its implementation can adapt to both low-latency links and high-throughput requirements, ensuring communication consistency and institutional reliability across varying signal conditions.

IPrium LLC
39 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Protocol Accelerators
View Details

Fault Injection Attack Countermeasures

Fault Injection Attack Countermeasures offer systems tailored to detect and mitigate vulnerabilities to fault injection attacks at the pre-silicon stage. Utilizing simulation tools, FortifyIQ provides a proactive approach to identify potential weaknesses before physical production. This technology, integrated with their comprehensive design architecture, includes support for advanced countermeasures that reinforce protection against physical disruptions and unauthorized data extraction techniques. It's especially beneficial for automotive, IoT, and other industries facing stringent security requirements, ensuring the integrity of critical information in deployment scenarios where traditional defenses may fall short.

FortifyIQ
38 Views
Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Reed-Solomon Codec

The Reed-Solomon Codec IP Core offers comprehensive error detection and correction capabilities, essential for digital communication systems that require high reliability and data integrity. Commonly employed in digital television, satellite communications, and data storage, this codec is known for its ability to correct burst errors effectively, thus safeguarding data across noisy channels. This core provides flexible configurations to adjust code length and correction capacity, adapting to various requirements of consumer electronics and professional communication gear. Its robust design ensures minimal signal degradation and enhances performance even under challenging transmission conditions. The Reed-Solomon Codec integrates seamlessly with a range of transmission protocols, making it suitable for diverse applications including optical data links, hard disk storage, wireless communication systems, and broadcast transmission. Its high error resilience enables trusted data delivery and security in critical environments.

IPrium LLC
33 Views
Cryptography Cores, Error Correction/Detection, Ethernet, Platform Security
View Details

NeoPUF

NeoPUF is an innovative hardware security module designed to harness the unique variations inherent in semiconductor manufacturing to create a distinctively secure identity for devices. These Physically Unclonable Functions (PUFs) form the visible 'fingerprint' of a chip, offering robust protection against reverse engineering and cloning, critical to safeguarding sensitive information across a device's lifecycle. Designed to integrate seamlessly into semiconductor systems, NeoPUF supports various security applications, including key management, authentication, and encryption. It is an essential component for ensuring data integrity and security, valuable in environments requiring stringent security protocols due to high exposure to threats. The ability of NeoPUF to provide inherent unpredictability makes it indispensable in developing secure digital identities, fortifying hardware against unauthorized access and generating reliable, random cryptographic keys. NeoPUF is a testament to eMemory's drive towards innovative security solutions, reinforcing trust across technology's rapidly evolving frontiers.

eMemory Technology Inc
30 Views
All Foundries
All Process Nodes
Cryptography Cores, Embedded Security Modules, Platform Security
View Details

Integrated Secure Element

The Integrated Secure Element is a core security offering from Secure-IC that establishes a trusted environment within the main System-on-Chip (SoC). This element serves as a root of trust, offering services such as secure boot, key isolation, and anti-tampering protection. Its design emphasizes dual computation and isolation to bolster security beyond traditional methods, making it vital for modern devices that need comprehensive security measures embedded directly into their hardware systems.

Secure-IC
28 Views
Embedded Security Modules, Platform Security
View Details

Digital Systems and Security Solutions

The Digital Systems and Security Solutions offered by VeriSyno encompass a range of IPs developed for secure digital communication and processing. These solutions utilize cutting-edge technology to deliver highly secure, efficient, and reliable systems critical for modern digital applications. The suite provides comprehensive solutions that cover secure data storage, transmission, and processing, making it vital for applications needing enhanced data integrity and protection. It is crafted to support a variety of process nodes, ensuring compatibility with both current and developing technologies. VeriSyno's commitment to security and innovation ensures that their offerings continuously evolve to meet the growing threats in the digital world, ensuring high resilience against potential vulnerabilities. These solutions are essential for industries with high-security demands, such as data centers, enterprise computing, and secure communication networks, providing them with robust protection against data breaches and cyber threats.

VeriSyno Microelectronics Co., Ltd.
15 Views
All Foundries
180nm
Cryptography Cores, DDR, Embedded Security Modules, Platform Security
View Details

Suite-Q SW

The Suite-Q SW is a versatile cryptographic software library designed for optimized performance across a wide range of platforms. It is highly customizable to manage code size, stack usage, and processing capabilities, available in both C and hand-optimized assembly suitable for multiple processor architectures. This makes Suite-Q SW ideal for integrating cryptographic capabilities without excessive resource use, especially on memory-limited devices. The software library allows for seamless operation on general-purpose and embedded CPUs, offering various configurations to balance speed and memory requirements effectively. With a focus on flexibility, it provides simple plug-in modules and capabilities for hardware offloading where needed. The Suite-Q SW caters to a broad spectrum of cryptographic needs, backed by comprehensive validation tests and performance metrics, ensuring it meets industry standards and operational excellence.

PQSecure Technologies, LLC
13 Views
Cryptography Cores, Cryptography Software Library, Platform Security
View Details
Chatting with Volt