Design & Reuse
33 IP
1
49.0
Secure-IC's Securyzr(TM) True Random Number Generator
The True Random Number Generator is an essential silicon-proven digital IP core for all FPGA, ASIC and SoC designs that targets cryptographically secu...
2
30.0
Media Access Control Security (MACSec)
Media Access Control Security (MACSec) is an IEEE standards-based protocol for securing communication among the trusted components of an 802.1 LAN. MA...
3
25.0
Secure-IC's Securyzr(TM) Blockchain Hardware Accelerator
Blockchain has a wide range of applications on the internet. As it is decentralized by design, it is an alternative to the many traditional transactio...
4
19.0
Hardware Security Module (HSM)
The HSM IP module is a Hardware Security Module for a wide range of applications. It is developed, validated and licensed by Secure-IC (partner of Xil...
5
16.0
On-chip protection against IEC61000-4-2 events
ESD solutions and Analog Pads * All voltage domains (0.85V to 5.0V) * Additional higher voltage ranges in BCD processes * High ESD levels (scal...
6
10.0
Secure-IC's Securyzr™ Deterministic Random Bit Generator (DRBG)
The Deterministic Random Bit Generator is an essential silicon-proven digital IP core for all FPGA, ASIC and SoC designs that targets cryptographicall...
7
10.0
True Random Number Generators
The security strength of many systems and applications is dependent on the quality of random number generators. Many cryptographic operations require ...
8
9.0
TRNG fully compliant with NIST 800-22
The eSi-TRNG is a high quality implementation of a True Random Number Generator fully compliant with latest NIST 800-22. The block uses a standard AM...
9
5.0
The True Random Number Generator (TRNG) Digital Noise Source is a standard-cell based entropy generator
​The True Random Number Generator (TRNG) Digital Noise Source is a standard-cell based entropy generator compliant with the statistical test of the FI...
10
5.0
True Random Number Generator (TRNG) Digital Post Processing compliant with the FIPS 140-2 and AIS 31 standards.
The True Random Number Generator (TRNG) Digital Post-Processing is a digital IP compliant with the AIS 31 and NIST SP 800-90B standards....
11
5.0
Fully-integrated 256-bit Physically Unclonable Function (PUF) with embedded reliability check
The Physical Unclonable Function (PUF) acts as a device fingerprint: it exploits the random variations of the process parameters to generate a per chi...
12
4.0
High Throughput Additive White Gaussian Noise Generator
A configurable AWGN generator that can be used as emulator of a noisy transmission channel and can support very high throughput rates up to 10 Gbps....
13
3.0
Pseudorandom Number Generator (PRNG) - High-speed variant
The PRNG IP core establishes a benchmark for hardware-based security in cryptographic systems by generating high-quality pseudorandom numbers. It deli...
14
3.0
Pseudorandom Number Generator (PRNG) - Balanced variant
The PRNG IP core establishes a benchmark for hardware-based security in cryptographic systems by generating high-quality pseudorandom numbers. It deli...
15
2.0
Clock Attack Monitor GlobalFoundries
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
16
2.0
Clock Attack Monitor Intel
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
17
2.0
Clock Attack Monitor Samsung
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
18
2.0
Clock Attack Monitor SMIC
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
19
2.0
Clock Attack Monitor TSMC
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
20
2.0
Clock Attack Monitor UMC
The agileCAM is a Ring Oscillator (RO) based clock attack monitor designed to detect clock attacks due to violation of the set-up time requirements of...
21
2.0
Voltage Glitch Sensor GlobalFoundries
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
22
2.0
Voltage Glitch Sensor Intel
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
23
2.0
Voltage Glitch Sensor Samsung
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
24
2.0
Voltage Glitch Sensor SMIC
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
25
2.0
Voltage Glitch Sensor TSMC
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
26
2.0
Voltage Glitch Sensor UMC
The agileVGLITCH voltage monitor provides security and protection against voltage side-channel attacks (SCA) and tampering such as supply voltage chan...
27
1.0
Cypher Processor IP
Vivante’s CYP800 (CYPher) Processor IP encryption and decryption fabric provides a unified data encryption and decryption infrastructure for the SoC....
28
0.0
Interlaken FEC (ILKN FEC)
...
29
0.0
NCR Processor
NCR (Network Clock Reference) is a procedure to provide the master clock (i.e. time information) of the satellite to all its user terminals. Typically...
30
0.0
Post Quantum Secure Boot
The TESIC-310 IP is a turnkey solution to provide a secure boot facility to an SoC. It implements the Post Quantum secure Leighton-Micali Signature (L...
31
0.0
Integrated Secure Element (iSE) for industrial IoT, factory automation, and AI devices
Secure-IC provides integrated Secure Elements (iSE) that can act as trust anchors to protect the security assets of a device. An iSE - also referred a...
32
0.0
Reconfigurable Parallel CRC Generator
Parallel CRC IP is reconfigurable high-speed CRC generator, flexible in terms of input data width and generating polynomial. With different data size...
33
0.0
Centralised Real Time Processor IP Core
We provide many configurations for our cryptographic solutions based on the requirements of the project. When compared to competing designs, the CR...