Find IP Sell IP AI Assistant Chip Talk About Us
Log In

KiviCore GmbH

KiviCore is an innovative provider specializing in secure embedded systems. At the forefront of cryptography, they develop and license primitive cryptographic IP cores which are foundational for creating complex security protocols and systems. Situated in Dresden, Germany, the company thrives on ensuring that their customers have access to top-tier security hardware solutions to safeguard their embedded systems. KiviCore is renowned for its advanced cryptographic technologies that facilitate secure message authentication and efficient data encryption. Firmly committed to supporting its clients, KiviCore extends its expertise through consulting services in embedded security. They address the complexities of secure system design by assisting in the development of systems that leverage hardware security concepts. This approach not only enhances the security of embedded systems but also integrates seamlessly into software solutions, ASICs, and FPGAs. KiviCore's comprehensive portfolio includes IP cores optimized for both FPGAs and ASICs. Emphasizing a compact attack surface and easy validation, their products are designed for maximum security and performance in electronic devices. The technology encompasses the latest post-quantum cryptography solutions, offering a path to future-proofing embedded systems in various sectors, including automotive. Read more

Is this your business? Claim it to manage your IP and profile

2
IPs available

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a sophisticated hardware accelerator designed for cryptographic hashing functions. It stands out as an area-efficient and high-throughput design, fully compliant with the NIST FIPS 202 standard. This IP core supports all SHA-3 hash functions including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, in addition to extendable output functions (XOF) such as SHAKE-128 and SHAKE-256. Its design includes robust protection against time-based side channel attacks (SCA) and features automatic byte padding. Operating within a single clock domain, the SHA-3 Crypto Engine has been meticulously verified to ensure reliability. It serves as a versatile solution for maintaining data integrity, enabling authentication, and supporting various security protocols. Its applications are extensive, finding use in Message Authentication Codes (MAC), IPsec and TLS/SSL protocol engines, secure boot mechanisms, encrypted storage, e-commerce, financial systems, blockchain, and pseudo-random bit generation. Deliverables with the SHA-3 Crypto Engine include System Verilog RTL source code, testbenches, integration examples, and software example source code, accompanied by comprehensive documentation. It is available under a one-time licensing fee, suitable for both single and multi-project licenses. The IP core offers impressive resource utilization and performance across several device families, ensuring efficient integration in diverse system environments.

KiviCore GmbH
49 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Keccak Hash Engine

The Keccak Hash Engine IP core is a versatile cryptographic function component known for its adaptability beyond just hashing. Based on the innovative sponge construction, Keccak powers not only hash functions but also serves roles in authentication, encryption, and pseudo-random number generation. Among its notable features is the Keccak-f cryptographic permutation, which offers an easy-to-implement flexible solution that caters to varying security requirements. Standardized under 3GPP TS 35.231 for mobile telephony and NIST’s FIPS 202 and SP 800-185, Keccak assures dependability by undergoing rigorous public scrutiny and third-party analysis. It provides an easy integration path, operating within a single clock domain, and it can be configured to suit different output lengths and security strengths. This flexibility ensures its applicability in a broad spectrum of applications, from maintaining hash functions to complex encryption tasks. When licensing the Keccak Hash Engine, KiviCore provides System Verilog RTL source code, along with testbenches, software examples, and documentation. Licensing is available with single and multi-project options, ensuring accessibility and implementation for various project scopes. Its efficient design and robust security make it a critical component for those developing secure systems across numerous platforms.

KiviCore GmbH
45 Views
Cryptography Cores, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to evaluate IP, download trial versions and datasheets, and manage your evaluation workflow!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chat to Volt about this page

Chatting with Volt