Design & Reuse
495 IP
351
0.0
AES-GCM Single-channel Crypto Accelerator
The EIP-61 is the IP for accelerating AES-GCM based cryptographic solutions. Designed for easy integration and very high performance the EIP-61 crypto...
352
0.0
ChaCha20 DPA Resistant Crypto Accelerator
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC or FP...
353
0.0
DPA Resistant AES Core
The DPA Resistant AES solution implements the AES algorithm with built-in robust, flexible side-channel resistance validated and optimized for differe...
354
0.0
HASH Accelerator with SHA-3, SHA-2, SHA-1
The EIP-57 is the IP for accelerating the various secure hash integrity algorithms like MD5 (RFC1231), SHA-1 (FIPS-180-2), SHA-2 (FIPS-180-3/4) and SH...
355
0.0
HMAC-SHA-2 (224/256/384/512) 100 Million Trace DPA Resistant Crypto Accelerato
Rambus DPA Resistant HMAC-SHA-2 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through attacks when ...
356
0.0
RSA-ECC Public Key Accelerator Engine DPA Resistant, 8K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
357
0.0
RSA-ECC Public Key Accelerator Engine, 2K ops/sec, DPA Resistant
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
358
0.0
RSA-ECC Public Key Accelerator Engine, 50K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
359
0.0
RSA-ECC Public Key Accelerator Engine, 750K ops/sec
Rambus DPA Resistant PKEv2, PKEv3, PKEv4 Cryptographic Accelerator Cores prevent against the leakage of secret cryptographic key material through atta...
360
0.0
RSA-ECC Public Key Accelerator Engine, 8K ops/sec, DPA & Fault Injection Resistant
Rambus DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through side channel and fault injection attacks ...
361
0.0
SM3 Crypto Accelerator
The EIP-52 SM3 Engine implements the SM3 hash algorithm. The accelerators include I/O registers, hash calculation cores, message padding logic, and da...
362
0.0
SM4-XTS Crypto Accelerator
The EIP-312 – SM4-XTS Accelerator is specifically suited for next generation processors deployed in networking and storage appliances and SSD controll...
363
0.0
ZUC Crypto Accelerator
The EIP-48 is an efficient hardware implementation of the ZUC algorithm. Besides the basic ZUC stream cipher, the EIP-48 fully implements the 3GPP Con...
364
0.0
Public Key Accelerator Farm Engine
The EIP-154 PKI Farm engine, offers autonoumus processing of Public Key Operations. Due to its scalable architecture, it provides high-performance acc...
365
0.0
Secure-IC's Securyzr™ SM4-XTS Multi-Booster
The SM4-XTS Multi-Booster crypto engine includes a generic & scalable implementation of the SM4 algorithm (a block cipher specified by the OSCCA) maki...
366
0.0
Elliptic Curve Cryptography IP
Our ECC IP Core is a state-of-the-art solution that gives your systems access to the capabilities of elliptic curve encryption. Developed with perf...
367
0.0
Elliptic Curve Digital Signature Algorithm
CryptOne's abilities encompass not just supporting several elliptic curves but also the highly recognized Elliptic Curve Digital Signature Algorithm (...
368
0.0
Elliptic Curve Digital Signature Algorithm
Modern public-key cryptography is built on elliptic curves, which are essential to reliable key agreement methods and safe digital signatures. As t...
369
0.0
Secure Hash Algorithm 384 IP Core
Bridge to APB, AHB, and AXI bus SHA2-384 is a universal solution that effectively speeds up the SHA2-384 hash function that complies with FIPS PUB 180...
370
0.0
Secure Hash Algorithm 512 IP Core
A universal solution that effectively accelerates the SHA2-512 hash function complying with FIPS PUB 180-4 is the SHA2-512 bridge to APB, AHB, and AXI...
371
0.0
Post Quantum Secure Boot
The TESIC-310 IP is a turnkey solution to provide a secure boot facility to an SoC. It implements the Post Quantum secure Leighton-Micali Signature (L...
372
0.0
AES-XTS - Balanced variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
373
0.0
AES-XTS - High-speed variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
374
0.0
Ascon
Xiphera's Ascon symmetric encryption IP cores provide robust security for a wide range of applications. It is, as a lightweight encryption algorithm, ...
375
0.0
ChaCha20-Poly1305 - Balanced variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
376
0.0
ChaCha20-Poly1305 - High-speed variant
Xiphera's ChaCha20-Poly1305 symmetric encryption IP cores provide robust security for a wide range of applications. It combines the high-speed ChaCha2...
377
0.0
SHA-3 Hash Function - Compact variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
378
0.0
SHA-3 Hash Function - High-speed variant
This IP core support SHA3-224, SHA3-256, SHA3-384, SHA3-512, and related functions such as SHAKE, cSHAKE, KMAC,TupleHash, and ParallelHash. Xiphera's...
379
0.0
Versatile AES
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
380
0.0
GEON Security Platform
There is a growing awareness of threats posed by devices that were traditionally not considered security critical. With rising connectivity, versatili...
381
0.0
AES-CTR
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
382
0.0
AES-GCM - Balanced variant
Xiphera's AES symmetric encryption IP cores ensure robust encryption and decryption, providing data confidentiality and integrity with the Advanced En...
383
0.0
AES Encryption & Decryption with Fixed Block Cipher Mode AES-C
The Alma Technologies AES-C IP Core implements the FIPS-197 Advanced Encryption Standard. It can be programmed to encrypt or decrypt 128-bit blocks of...
384
0.0
AES Encryption & Decryption with Programmable Block Cipher Mode AES-P
The Alma Technologies AES-P IP Core implements the FIPS-197 Advanced Encryption Standard. It can be programmed to encrypt or decrypt 128-bit blocks of...
385
0.0
Authenticated Encryption & Decryption AES-GCM128
The Alma Technologies AES-GCM128 IP Core implements the GCM-AES authenticated encryption and decryption, as specified in the NIST SP800-38D recommenda...
386
0.0
DES Cryptoprocessor
This core is a fully compliant implementation of the DES encryption algorithm. Both encryption and decryption are supported. ECB, CBC and triple DES v...
387
0.0
DPA Resistant Software Library
Addressing the growing demand for readily available solutions that implement Differential Power Analysis (DPA) countermeasures, we developed a family ...
388
0.0
eSi-Crypto
EnSilica provide a comprehensive range of encryption and authentication IP for ASIC and FPGA targets with low resource usage and high throughput. An e...
389
0.0
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. ...
390
0.0
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem. It performs the Ae mod M ca...
391
0.0
Secure 128-bit Advanced Encryption Standard (AES) coprocessor
The Secure AES Coprocessor encrypts and decrypts 128-bit data blocks by computing an AES algorithm with a 128, 192 or 256-bit key through a highly sec...
392
0.0
SHA-256 Secure Hash Function
The Alma Technologies SHA256 IP core is a high performance implementation of the SHA-256 Message Digest algorithm, a one-way hash function, compliant ...
393
0.0
Cryptographic library for Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities:- ECDSA key generation; - ECDSA signature and verificati...
394
0.0
TESIC-SE Secure Elements for IoT Devices
TESIC is our silicon-proven secure IP platform built around proprietary clockless microcontroller core. It allows us to shorten the design time of sec...
395
0.0
MD5 Message-Digest Algorithm
The MD5 core from Alma Technologies is a high-performance implementation of the MD5 Message-Digest algorithm, a one-way hash function, compliant to th...
396
0.0
SHA-1 Secure Hash Function
The SHA1 core from Alma Technologies is a high performance implementation of the SHA-1 (Secure Hash Algorithm 1) one-way cryptographic hash function, ...
397
0.0
AES Encrypt/Decrypt Core
The AES encryption IP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. It processes 128-bit bl...
398
0.0
Processor Core
The MD5 encryption IP core is a fully compliant hardware implementation of the Message Digest Algorithm MD5, suitable for a variety of applications. ...
399
0.0
SNOW-V Stream Cipher Engine
The SNOW-V IP core implements the SNOW-V stream cipher mechanism, aiming to meet the security demands of modern high-speed communication systems. It c...
400
0.0
Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode. DSHA2-384 bridge to APB, AHB, AXI bus, it is a universal solution...