Design & Reuse
495 IP
451
0.0
13 Different Cryptographic Hash Functions Core
These are 13 different cryptographic hash function originally submitted to NIST hash function competition which made upto round 2. All of these cores ...
452
0.0
Intrinsic ID Zign RNG: NIST-Certified Random Number Generator, software-only implementation
Zign™ RNG is an embedded software IP solution that enables device manufacturers and designers to add a random number generator to their products...
453
0.0
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every ...
454
0.0
HIP 1000 - HCR_AES Crypto Core Family
The use of IP cores in ASIC, FGPA and system-on-chip (SoC) design has become a critical methodology as companies struggle to address the need for rapi...
455
0.0
Intrinsic ID QuiddiKey 300: First Ever PSA Certified Level 3 RoT Component IP
Digital trust is critical for the continued success of the IoT, so security, reliability, and privacy are top concerns. New legislations are driving i...
456
0.0
Intrinsic ID QuiddiKey 400 - Root of Trust Meeting Automotive Functional Safety Standards
Anything that is connected to the internet is at risk, and connected vehicles are no exception. Every connected electronic component represents a pot...
457
0.0
Secure IP a Robust Security Enclave
Kudelski IoT Secure Hardware IP has been designed for chipset manufacturers seeking key protection in their system on chip (SoC/ASIC) solutions, robus...
458
0.0
Via-PUF Security Chip for Root of Trust
ICTK s Via-PUF solutions let you build the most reliable root of trust for IoT supply chain safety....
459
0.0
TRNG (True Random Number Generator) NIST SP800-90C
TRNG Core meets NIST SP 800-90A/B standard...
460
0.0
Root of Trust
The Root of Trust (RoT) is always the trusted root within a cryptographic system. Cryptographic systems use encryption keys to encrypt data and perfor...
461
0.0
400G AES Encryption Core
The 400G AES Encryption Core is a high performance and yet low footprint AES engine for 400G/s application. Typical applications are providing bulk en...
462
0.0
Fast, Compact, Ultra-Low-Power Cryptographic Tools
Quickly and easily embed our fast, small-footprint, ultra-low-power cryptographic solutions in your IoT devices. Our hardware and software development...
463
0.0
Ironwood KAP (TM) Fast, Future-Proof Key Agreement Protocol Designed for Low-Resource Devices
Key agreement protocols are at the foundation of many of today's security applications. Veridify's Ironwood KAP™ is a future-proof, Diff...
464
0.0
Walnut DSA (TM) Fast, Future-Proof Digital Signature Algorithm Designed for Low-Resource Devices
WalnutDSA™ is a fast, small footprint, future-proof, public-key digital signature solution for low-resource devices–running on 8-, 16-, an...
465
0.0
Verimatrix WhiteBox
Verimatrix's WhiteBox enables you to build, control and trust your own software crypto-security. It does this in a pure software environment, with...
466
0.0
SHA-3 Secure Hash Crypto Engine
It is compliant with NIST's FIPS 202 standards. The core can provide all the fixed-length hashing functions provided as part of the SHA-3 standard...
467
0.0
Advanced Encryption Standard (AES) IP core 128/192/256
VISENGI’s Advanced Encryption Standard (AES) IP core provides AES-128, AES-192, and AES-256 encryption and decryption, as per FIPS-197, with a s...
468
0.0
SHA-1 Hashing Core
The ES1002 hash core fully implements the SHA-1 (Secure Hash Algorithm RFC 3174). The core can be used for data authentication in digital broadband, w...
469
0.0
MD5 Hashing Core
The es1005 hash fully implements the MD5 (Message Digest Algorithm RFC 1321). The core can be used for data authentication in digital broadband, wire...
470
0.0
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 co...
471
0.0
DES Core - Low-gate count Data Encryption Standard
ES1040 core implements Data Encryption Standard (DES) cipher algorithms in hardware. DES is a block cipher, works on blocks of 64 bits of data using 6...
472
0.0
AES Core
The es4001 AES core implements the Advanced Encryption Standard (Rijndael Algorithm FIPS 197) encoder and decoder. The core encrypts and decrypts in b...
473
0.0
HDCP 2.0 Encryption Suite
HDCP Suite consists of hardware and software components implementing the HDCP 2.0 protocol. The hardware components are fully synchronous and availabl...
474
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
475
0.0
IEC 61850/62351 Substation Automation Systems Cryptographic IP Core
IEC 61850/62351 Substation Automation Systems Cryptographic (SASCrypt) IP Core secures the strict real-time traffic used in the Substation Automation ...
476
0.0
SHA-1 IP Core fully verified with NIST test vectors
...
477
0.0
Sub-2.5G AES Encryption Core
The sub-2.5G AES Encryption Core is a special low footprint and low-power implementation of AES engine for application requiring less than 2.5G/s. Bec...
478
0.0
Advanced Encryption Standard (AES) Engine
ParaQum Technologies® advanced Encryption Standard (AES) engine is a highly configurable and multipurpose encryption/decryption engine. The AES en...
479
0.0
Zign 100 - Software implementation of SRAM PUF
The number of connected devices, machines, sensors, or simply things are linked with each other over open communication networks on the internet of th...
480
0.0
Geon Secure Execution Processor
Geon Secure Execution Processor delivers secure code execution by supporting two secure contexts. All code and data belonging to a secure context is c...
481
0.0
AES Encryption, 128-bit block cipher, which supports a choice of three key sizes (128,192 and 256-bits)
Eta Compute offers the only commercially available self-timed technology supporting dynamic voltage scaling that is insensitive to process variations,...
482
0.0
Post-quantum secure root of trust subsystem
PQPlatform-TrustSys provides a complete Root of Trust solution, providing architects with everything needed to secure systems during, and beyond post-...
483
0.0
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure that pirates: Do not a...
484
0.0
AES-GCM MACsec (IEEE 802.1AE) and FC-SP Cores
Implementation of the new LAN security standard 802.1ae (MACSec) requires the NIST standard AES cipher in the GCM mode for encryption and message auth...
485
0.0
P1619/802.1ae (MACSec) GCM/XEX/XTS-AES Core
General Description LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 us...
486
0.0
Combo P1619 / 802.1ae (MACSec) GCM-AES/LRW-AES Cores
LAN security standard IEEE 802.1ae (MACSec) uses AES cipher in the GCM mode, while the disk/tape encryption standard IEEE P1619 uses the LRW mode. Sin...
487
0.0
SecureOne anti-counterfeiting solution
BlueSemi's SecureOne™ is the anti-counterfeiting solution you need to protect your premier products from imitations. SecureOne™ is an ...
488
0.0
IPsec Security Processor
Core implements the IPsec and SSL/TLS security standard at high data rates that require the cryptographic processing acceleration. The ISP1-128 core i...
489
0.0
G.hn AES-CCM Core
Implementation of the new ITU G.9961 standard for home networking requires the NIST standard AES cipher in CTR and CBC modes (a.k.a. CCM) for encrypti...
490
0.0
CMAC and XCBC AES Core
The CMAC1 core provides implementation of cryptographic hashes AES-CMAC per NIST SP 800-38B and AES-XCBC. The cores utilize “flow-through” design that...
491
0.0
ES-GCM/CCM/CCM*/EAX' Core
The GCE1-MP core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard and encryption/authentication mode...
492
0.0
800G Channelized Ethernet MACsec IP
The Rianta Solutions MACsec IP cores are best-in-class, fully-featured 1G to 800G channelized MACsec streaming processor cores supporting both LAN and...
493
0.0
Bloodhound Wi-Fi Packet Sniffer/Injector for Network Characterization, Surveillance, and Law Enforcement
In 2017 and beyond, analysts, agencies, and security experts are all in agreement that threats to public safety, critical infrastructure, and data wil...
494
0.0
QuiddiKey 100 - Small Footprint PUF IP to Create, Wrap and Manage Keys
The number of connected devices, machines or sensors that are linked with each other over open communication networks on the internet of things (IoT) ...
495
0.0
AES Engine IP
YEESTOR s AES engine (ESAES) IP is a high-performance cryptographic engine operates in AES (Rijndael) NIST Federal information processing standard FIP...