Log In

All IPs > Security IP > Content Protection Software

Content Protection Software Semiconductor IP

Content protection software semiconductor IPs are vital components in the safeguarding and management of digital content. These IPs provide essential security measures to ensure that multimedia content is protected from unauthorized access and distribution, maintaining the integrity and confidentiality of sensitive information. As digital media consumption grows, the importance of robust content protection mechanisms becomes increasingly critical across various platforms.

Typically integrated into devices like smartphones, tablets, smart TVs, and streaming devices, content protection IPs enable secure content delivery and playback. They incorporate a range of technologies including encryption, watermarking, and digital rights management (DRM) protocols to enforce access controls and usage rights. This protects the interests of content creators and distributors by curbing piracy and unauthorized sharing, thus ensuring that content monetization strategies are effectively supported.

Moreover, in the realm of semiconductor IP, content protection software is not just about securing media but also about enhancing user experience. By managing the seamless, secure delivery of content, these IPs help in maintaining high-quality playback while safeguarding user data from potential breaches. This dual focus on protection and performance is crucial for the evolving demands of consumers and businesses alike.

Our collection of content protection software semiconductor IPs at Silicon Hub covers a wide array of solutions designed to cater to different security needs in the digital media landscape. Whether it is for media streaming platforms, content distribution networks, or consumer electronics, our IP offerings are geared towards providing trusted, innovative, and efficient security solutions that adapt to the latest technological advancements in the industry.

All semiconductor IP

Secure Boot (OEM/ODM)

Overview: The Secure Boot IP is a turnkey solution that provides a secure boot facility for an SoC. It implements the Post Quantum secure Leighton-Micali Signature (LMS) as specified in NIST SP800-208. The Secure Boot IP operates as a master or slave peripheral to an Application Processor, serving as a secure enclave that securely stores keys to ensure their integrity and the integrity of the firmware authentication process. Features:  Post Quantum Secure LMS Signature: Utilizes a robust Post-Quantum secure algorithm for enhanced security.  Firmware Updates: Supports up to 32 thousand firmware updates with a minimal signature size of typically less than 5KBytes.  SESIP Level 3 Pre-Certification: Pre-certified to SESIP Level 3 for added security assurance.  RTL Delivery: Delivered as RTL for ease of integration into SoC designs.  Proprietary IP: Based on proprietary IP with no 3rd party rights or royalties. Operation: The Secure Boot IP operates as a master, managing the boot process of the Application Processor to ensure that it only boots from and executes validated and authenticated firmware. The Secure Boot IP also functions as a slave peripheral, where the Application Processor requests validation of the firmware as part of its boot process, eliminating the need for managing keys and simplifying the boot process. Applications: The Secure Boot IP is versatile and suitable for a wide range of applications, including but not limited to:  Wearables  Smart/Connected Devices  Metrology  Entertainment Applications  Networking Equipment  Consumer Appliances  Automotive  Industrial Control Systems  Security Systems  Any SoC application that requires executing authenticated firmware in a simple but secure manner.

Plurko Technologies
All Foundries
All Process Nodes
Content Protection Software
View Details

aiData

aiData is designed to streamline the data pipeline for developing models for Advanced Driver-Assistance Systems and Automated Driving solutions. This automated system provides a comprehensive method of managing and processing data, from collection through curation, annotation, and validation. It significantly reduces the time required for data processing by automating many labor-intensive tasks, enabling teams to focus more on development rather than data preparation. The aiData platform includes sophisticated tools for recording, managing, and annotating data, ensuring accuracy and traceability through all stages of the MLOps workflow. It supports the creation of high-quality training datasets, essential for developing reliable and effective AI models. The platform's capabilities extend beyond basic data processing by offering advanced features such as versioning and metrics analysis, allowing users to track data changes over time and evaluate dataset quality before training. The aiData Recorder feature ensures high-quality data collection tailored to diverse sensor configurations, while the Auto Annotator quickly processes data for a variety of objects using AI algorithms, delivering superior precision levels. These features are complemented by aiData Metrics, which provide valuable insights into dataset completeness and adequacy in covering expected operational domains. With seamless on-premise or cloud deployment options, aiData empowers global automotive teams to collaborate efficiently, offering all necessary tools for a complete data management lifecycle. Its integration versatility supports a wide array of applications, helping improve the speed and effectiveness of deploying ADAS models.

aiMotive
AI Processor, AMBA AHB / APB/ AXI, Audio Interfaces, Content Protection Software, Digital Video Broadcast, Embedded Memories, H.264, Processor Core Dependent, Vision Processor
View Details

eSi-Crypto

The eSi-Crypto suite by EnSilica is a comprehensive collection of cryptographic IP cores designed for both ASIC and FPGA architectures, aiming for minimal resource consumption while ensuring high throughput. A key component within this suite is the True Random Number Generator (TRNG), which adheres to NIST 800-22 standards and is offered as a hard macro in target technologies. Its configurable options are tailored to balance resource efficiency with throughput, making it essential for robust encryption solutions. These IP cores are available as stand-alone modules or integrated with AMBA APB/AHB or AXI bus interfaces.\n\nThe suite supports a variety of cryptographic algorithms such as CRYSTALS Kyber, CRYSTALS Dilithium, elliptic curve cryptography (ECC/ECDSA), RSA, AES, SHA1/SHA2/SHA3, ChaCha20, Poly1305, and TDES/DES. These diverse implementations can be tailored for specific use cases, including high-throughput core configurations ideal for applications like V2X communications. Additionally, the suite's ECC/ECDSA capabilities provide secured digital signature mechanisms, critical for applications requiring stringent data integrity and authenticity.\n\nEnSilica's dedication to cryptographic excellence is further evidenced in their sophisticated handling of secure web-server implementations. By leveraging their ultra-low-power accelerators, particularly for algorithms like ChaCha20 and Poly1305, eSi-Crypto reduces computational overhead while optimizing security performance. This makes the suite a preferred choice for customers seeking efficient and reliable cryptographic solutions across varied technology platforms.

EnSilica
Content Protection Software, Cryptography Cores, Embedded Security Modules, IEEE1588, Input/Output Controller, Platform Security, Security Protocol Accelerators, Security Subsystems, USB
View Details

SiFive Essential

The SiFive Essential family provides a comprehensive range of embedded processor cores that can be tailored to various application needs. This series incorporates silicon-proven, pre-defined CPU cores with a focus on scalability and configurability, ranging from simple 32-bit MCUs to advanced 64-bit processors capable of running embedded RTOS and full-fledged operating systems like Linux. SiFive Essential empowers users with the flexibility to customize the design for specific performance, power, and area requirements. The Essential family introduces significant advancements in processing capabilities, allowing users to design processors that meet precise application needs. It features a rich set of options for interface customizations, providing seamless integration into broader SoC designs. Moreover, the family supports an 8-stage pipeline architecture and, in some configurations, offers dual-issue superscalar capabilities for enhanced processing throughput. For applications where security and traceability are crucial, the Essential family includes WorldGuard technology, which ensures comprehensive protection across the entire SoC, safeguarding against unauthorized access. The flexible design opens up various use cases, from IoT devices and microcontrollers to real-time control applications and beyond.

SiFive, Inc.
Building Blocks, Content Protection Software, CPU, IoT Processor, Microcontroller, Multiprocessor / DSP, Processor Core Dependent, Processor Core Independent, Processor Cores, Standard cell
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library designed to offer flexibility in code size, performance, and memory usage, making it an essential tool for developers working on resource-limited devices. Engineered for high adaptability, this software package provides a robust framework for implementing secure cryptographic operations across diverse platforms, including 8-bit to 64-bit processors. The library is meticulously crafted to support various configuration options that balance speed with memory efficiency, ensuring it meets custom specifications while preserving system integrity. Portable C code and high-speed, hand-optimized assembly variants are available to provide the ideal blend of compatibility and performance required in modern applications. Key features of Suite-Q SW include seamless integration as plug-in modules, support for a wide range of hardware offloads, and extensive compatibility with general-purpose and embedded CPUs. Validated through rigorous testing and performance measurements, it provides a reliable basis for secure software development, ensuring rapid deployment with minimized risk. As such, Suite-Q SW remains an indispensable part of PQSecure's comprehensive cryptographic offerings, perfect for adapting to the ever-changing landscape of digital security.

PQSecure Technologies, LLC
10 Categories
View Details

PQCryptoLib

FIPS 140-3 CMVP compliant, CAVP PQC cryptographic library designed for PQ/T Hybrid PQCryptoLib is a general-purpose FIPS 140-3 CMVP and CAVP-certified cryptographic library. It’s been designed for a wide variety of applications and provides the latest NIST-standardized post-quantum and classical algorithms in a software environment. With a configurable, secure, and easy-to-use API, PQCryptoLib is optimized for crypto-agility, particularly when it comes to FIPS-compliant hybrid PQ/T solutions, and with crypto-agility in mind, it’s built to protect against the threat of ‘harvest-now-decrypt-later’ attacks. The aim of PQCryptoLib is to help organizations transition smoothly and securely to quantum resistance in a manageable, easy-to-integrate solution.

Premium Vendor
PQShield
Content Protection Software, Cryptography Software Library
View Details

Origin E1

The Origin E1 is a streamlined neural processing unit designed specifically for always-on applications in personal electronics and smart devices such as smartphones and security systems. This processor focuses on delivering highly efficient AI performance, achieving around 18 TOPS per watt. With its low power requirements, the E1 is ideally suited for tasks demanding continuous data sampling, such as camera operations in smart surveillance systems where it runs on less than 20mW of power. Its packet-based architecture ensures efficient resource utilization, maintaining high performance with lower power and area consumption. The E1's adaptability is enhanced through customizable options, allowing it to meet specific PPA requirements effectively, making it the go-to choice for applications seeking to improve user privacy and experience by minimizing external memory use.

Expedera
14 Categories
View Details

Cyclone V FPGA with Integrated PQC Processor

The Cyclone V FPGA with Integrated PQC Processor by ResQuant is a specialized product that comes pre-equipped with a comprehensive NIST PQC cryptography suite. This FPGA is tailored for applications requiring a robust proof-of-concept for quantum-safe implementations. It ensures seamless integration into existing systems, providing a practical platform for testing and deployment in quantum-secure environments. This product is available at a competitive price and represents an ideal starting point for entities looking to explore and adopt quantum-resilient technologies. Its configuration allows for straightforward implementation in diverse hardware infrastructures while offering a reliable option for organizations aiming to stay ahead in the evolving cyber security landscape. By incorporating the latest in cryptographic standards and ensuring vendor independence, the Cyclone V FPGA with Integrated PQC Processor by ResQuant effectively bridges current hardware technologies and future-proof security needs. It supports industry-wide applications, from IoT and ICT to automotive and military sectors, underscoring ResQuant's versatility in hardware security solutions.

ResQuant
All Foundries
All Process Nodes
13 Categories
View Details

QDID PUF

The patented QDID PUF by Crypto Quantique utilizes quantum tunneling current variations to produce a unique identity in standard CMOS processes. This solution leverages oxide thickness variations and trap distributions in the gate oxide to create an unpredictable and unclonable physically unclonable function (PUF). As a hardware root-of-trust, it simplifies secure provisioning and emits high-entropy seeds resistant to side-channel attacks, supporting up to 256-bit security strength. The QDID PUF's robustness is confirmed through extensive testing, including adherence to NIST standards, making it an ideal choice for secure device identity and post-quantum cryptographic applications.

Crypto Quantique
GLOBALFOUNDRIES, TSMC, UMC
16nm FFC/FF+, 28nm
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

PhantomBlu - Tactical Communications

PhantomBlu is a sophisticated mmWave communication solution specifically designed for the defense sector, empowering military operations with robust, high-performance connectivity. Leveraging advanced mmWave technology, it supports tactical connections between land, sea, and air platforms, enabling seamless IP networking over a secure, anti-jam resistant mesh network. PhantomBlu’s design is optimized for rapid deployment and versatile use across various challenging military and defense environments. The PhantomBlu system offers unprecedented connectivity and integration capabilities, supporting high-bandwidth, low-latency communications essential for defense operations. It features LPI (Low Probability of Interception) and LPD (Low Probability of Detection), ensuring stealth and operational security. Its adaptive networking solutions significantly enhance situational awareness and interoperability amongst varied defense assets, assuring seamless transfer of C4ISR data. Whether deployed across large terrains or in mobile units, PhantomBlu's resilience and scalability ensure that defense teams operate with confidence. Its advanced capabilities are critical in mitigating risks and enhancing strategic emission, making it an invaluable asset for modern military communications needs.

Blu Wireless Technology Ltd.
Intel Foundry, Samsung
28nm, 65nm
24 Categories
View Details

Blazar Bandwidth Accelerator Engine

The Blazar Bandwidth Accelerator Engine is an advanced memory solution that integrates in-memory computing capabilities for high-capacity, low-latency applications. This engine accelerates data processing by incorporating up to 32 RISC cores, significantly boosting data throughput and application performance. The built-in memory offers a capacity of up to 1Gb, effectively supporting high bandwidth and low latency operations critical in modern networking and data center infrastructures. Key features include the ability to perform tasks traditionally reserved for external processing units directly within the memory, reducing data movement and improving system efficiency. By embedding specific in-memory operations such as BURST and RMW functions, the Blazar engine minimizes execution time and interaction with external processors, offering optimal performance in SmartNICs and SmartSwitch applications. This accelerator engine is specifically designed to operate seamlessly with dual-port memory architectures, allowing parallel data access and processing. This feature is crucial for applications requiring high reliability and fast data aggregation, thus supporting sophisticated networking requirements inherent in 5G and advanced computing environments.

Peraso Inc.
15 Categories
View Details

FortiCrypt

FortiCrypt offers a robust and secure cryptographic framework specifically designed to thwart side-channel and fault injection attacks. This suite of cryptographic IP includes advanced protection mechanisms that ensure both high security and performance across various platforms. The IP core is meticulously engineered to deliver ultra-low power consumption, making it ideal for battery-operated and IoT devices. The FortiCrypt product line is versatile, supporting a wide array of cryptographic algorithms, including both classical and post-quantum variations. It integrates seamlessly with existing systems, requiring minimal integration overhead, and is validated to withstand real-world attacks. Its high bandwidth capacity, achieved through multi-pipeline architecture, makes FortiCrypt suitable for high-performance applications, ensuring rapid data throughput without compromising security. Furthermore, FortiCrypt's compliance with the highest industry standards, such as FIPS 140-3 and SESIP, assures its usage in applications requiring stringent security measures. Whether used for secure communication, data protection, or hardware defense, FortiCrypt establishes a fortress against unauthorized access and data breaches, demonstrating unparalleled resilience and efficiency.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

ADICSYS Soft eFPGA

ADICSYS, a subsidiary of EASii IC, provides advanced Field Programmable Gate Array (FPGA) solutions that blend the benefits of custom FPGA and embedded FPGA technologies. With over a decade's worth of expertise in FPGA development, ADICSYS offers soft eFPGA IP which is not only highly customizable and scalable but also seamlessly integrates into standard RTL design flows. This IP is designed to be technology-independent and supports a synthesis from RTL to FPGA bitstream conversion, catering to diverse application requirements. The soft eFPGA technology from ADICSYS is celebrated for its flexibility, allowing modifications to circuits even post-production and during service. This adaptability significantly reduces design times and risks associated with errors. By enabling Programmable IPs with immediate accessibility for customization, ADICSYS supports a range of architectural parameters, from LUT count to routing density, ensuring precise adaptation to area, performance, and power constraints. The Synthesizable Programmable Core (SPC) created by ADICSYS is particularly advantageous for reducing risks associated with design errors and specification changes, making it a pivotal component in many industrial applications. ADICSYS stands out for its application of industry-standard CAD tools, guaranteeing ease in integration and adaptability for varied semiconductor projects.

EASii IC
Building Blocks, Content Protection Software, Processor Core Independent, Processor Cores
View Details

Keccak Hash Engine

The Keccak Hash Engine is known for its versatility in cryptographic operations, supporting a broad range of functions beyond traditional hashing. Notably, it serves as a foundational element for hash functions, authentication, encryption, and pseudo-random number generation. This IP core employs the innovative sponge construction technique and the Keccak-f permutation, renowned for its simplicity and adaptability. Keccak has been internationally standardized within several specifications, including NIST's FIPS 202 for SHA-3 and the 3GPP TS 35.231 for mobile telecommunications. This extensive scrutiny and third-party analysis ensure its suitability for highly secure applications. The Keccak Hash Engine excels in scenarios demanding configurable security levels or output lengths, integrated seamlessly into various systems. Built for integration ease and robust security, the Keccak IP core operates within a single clock domain and comes extensively verified. It provides a strong foundation for applications in security, data integrity, blockchain technologies, and secure data storage, extending the potential of cryptographic protections within embedded systems.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Substation Automation Systems Cryptographic COEsec

The Cryptographic COEsec Core is integral to substation automation systems, providing robust encryption and security features to safeguard data integrity and confidentiality within power distribution networks. It offers advanced cryptographic operations, ensuring that data transmissions remain secure from unauthorized access and tampering. Particularly relevant for utilities and infrastructure operations, the COEsec core supports a variety of cryptographic standards and protocols essential for protecting sensitive data as it moves through networked systems. With cyber threats increasingly posing risks to critical infrastructure, the core provides necessary security measures to mitigate potential vulnerabilities. This core's integration into substation automation systems is crucial, where securing communication between devices is paramount to system reliability. By deploying the Cryptographic COEsec core, operators can ensure that their data control and management processes remain uncompromised, thus maintaining the integrity of essential service operations.

Concurrent EDA, LLC
Content Protection Software, Cryptography Cores, Embedded Security Modules, Platform Security, Security Subsystems
View Details

Security Protocol Accelerators

Synopsys' Security Protocol Accelerators are designed to enhance the security of data transmission by accelerating encryption and decryption processes across networks. These accelerators are optimized to handle complex cryptographic algorithms efficiently, ensuring secure data transfer in applications such as enterprise networks, cloud services, and secure storage. By integrating these accelerators, systems can achieve robust security protocols without compromising on speed or performance.

Synopsys, Inc.
Content Protection Software, Cryptography Cores, Security Protocol Accelerators
View Details

ULYSS MCU

The ULYSS MCU is a cutting-edge microcontroller crafted for advanced automotive applications, reflecting Cortus' commitment to innovation in the automotive technology space. With its foundation in RISC-V architecture, the ULYSS MCU offers a powerful range of features suitable for the rigorous demands of modern vehicles. This 32/64-bit MCU is engineered to operate at clock speeds ranging from 120MHz up to 2GHz, ensuring robust performance for automotive systems requiring highly responsive and reliable operation. The ULYSS MCU is adept at managing a variety of automotive functions, from basic operational controls to advanced driver-assistance systems (ADAS), positioning it as a future-ready solution for automotive technology evolution. Its capacity for real-time processing and data analysis is instrumental in achieving safety and efficiency enhancements in vehicle operations, enhancing the overall driving experience. In addition to its technical prowess, the ULYSS MCU is designed to accommodate cost-effectiveness alongside its performance benefits, making it an attractive option for automotive manufacturers seeking to integrate advanced technology without compromising on budget constraints. This harmonization of performance and affordability is key to its appeal across the automotive sector.

Cortus SAS
AI Processor, Audio Processor, Content Protection Software, CPU, LIN, Microcontroller, Multiprocessor / DSP, Processor Cores, Safe Ethernet
View Details

Racyics® ABX Platform

The Racyics® ABX Platform is a powerful technology cornerstone designed to enhance performance and reliability in integrated circuits operating at ultra-low voltages. Leveraging Adaptive Body Biasing (ABB), this platform supports operation down to 0.4V, ensuring device efficiency even under challenging process, voltage, and temperature variations. Particularly adept for automotive applications, it offers significant improvements such as up to 75% reduction in leakage power and enhancement of performance by up to 9X. This makes it an ideal solution for high-performance needs, providing reliable and predictable operation across diverse conditions.<br><br>Racyics® ABX FBB (Forward Body Biasing) optimizes the operation of devices by substantially improving performance metrics, offering a comprehensive solution for ultra-low voltage applications. Furthermore, its RBB (Reverse Body Biasing) functionality excels in minimizing power consumption, notably providing substantial benefits in automotive environments where power efficiency is paramount.<br><br>The platform is backed by a robust design flow that integrates seamlessly with various advanced technology nodes, supported by an expansive library of ABB-enabled standard cells and SRAM IPs. This ensures easy adoption and adaptability, promoting enhanced timing and power predictability across applications. Its proven silicon track record underscores its capability as a reliable turnkey solution that meets stringent automotive-grade requirements.

Racyics GmbH
GLOBALFOUNDRIES
22nm
13 Categories
View Details

KiviPQC-KEM

The KiviPQC-KEM represents KiviCore's cutting-edge approach to post-quantum cryptography, designed to provide robust security against both classical and quantum computing threats. This IP core supports the Module-Lattice-based Key Encapsulation Mechanism (ML-KEM), aligning with the stringent standards set by NIST FIPS 203. By enabling secure key exchanges over untrusted channels, KiviPQC-KEM forms the cornerstone of future-proof network security solutions. This IP core focuses on minimal logic utilization while delivering high performance and low latency through hardware acceleration. The integration of an AMBA AXI4-Lite interface ensures simple system inclusion, whether in ASIC or FPGA designs. The KiviPQC-KEM-Fast and KiviPQC-KEM-Tiny variants cater to different performance needs, optimizing either for rapid processing or resource efficiency. Applications for KiviPQC-KEM include quantum-resistant network infrastructures, secure public key infrastructures (PKI), and transport-level security protocols like TLS/SSL. Its design supports a comprehensive set of operations including key generation, encapsulation, and decapsulation, making it an invaluable resource in the evolving landscape of cryptographic security.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

FortiCrypt Library

The FortiCrypt Library is a sophisticated suite of cryptographic tools engineered to provide secure software implementations resistant to power and fault analysis. With an emphasis on flexibility and efficiency, it facilitates secure cryptographic operations without specialized hardware. The library is adaptable to a variety of environments, from embedded systems to high-capacity servers. By focusing on ultra-low power consumption and streamlined integration, it offers an excellent solution for developers looking to bolster their software against potential vulnerabilities without redesigning existing hardware. This toolset is designed to enable secure data processing across a multitude of applications, particularly where the implementation of physical security measures is impractical. With its robustness firmly grounded in industry standards, the FortiCrypt Library is especially suited for deployment in sectors like automotive and industrial automation, where reliable software security is critical.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

AES ULP-DPA-FIA

AES ULP-DPA-FIA offers ultra-low power encryption capabilities fortified against differential power analysis and fault injection. This core design maintains exceptional energy efficiency while providing robust security, making it ideal for devices with limited power resources. Its architectural efficiency supports high throughput performance, ensuring secure data handling without significant power draw. The core is designed for easy integration into existing systems, preserving existing infrastructure while upgrading security measures comprehensively. With a focus on battery-operated and minimally powered environments, AES ULP-DPA-FIA is perfect for IoT applications and portable electronics needing dependable, long-lasting security. Compliance with top industry security benchmarks further validates its applicability in sensitive sectors demanding unwavering data protection.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

AES SX-DPA-FIA

AES SX-DPA-FIA is engineered for balanced encryption solutions, offering formidable defense against side-channel and fault injection attacks while balancing high performance with efficient resource usage. This IP core is optimized for applications requiring both high security and a modest gate count. It provides a mid-range solution in FortifyIQ's extensive IP catalog, serving devices that need a compromise between full feature sets and efficiency. AES SX-DPA-FIA integrates seamlessly into a wide variety of devices, from consumer electronics to industrial control systems, offering consistent protection without compromising on speed or durability. With validation against industry-leading standards and certifications, AES SX-DPA-FIA is equipped for deployment across sectors requiring cost-effective security solutions. Its versatile design is adept at maintaining data integrity across networked environments, safeguarding information against unauthorized access and breaches.

FortifyIQ
Amplifier, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

AES UC-DPA-FIA

The AES UC-DPA-FIA core from FortifyIQ excels in delivering ultra-compact security solutions that guard against side-channel and fault injection attacks. Tailored for environments with space limitations, it ensures minimalistic footprint while retaining high security assurances against exploitable vulnerabilities. By minimizing gate count without sacrificing security performance, AES UC-DPA-FIA stands as a preferred choice for integrated circuits where every nanometer counts. Its application extends to compact electronic devices, providing cutting-edge cryptographic capabilities where space and efficiency are crucial. Occupying an essential niche in secure gadget design, AES UC-DPA-FIA adheres to the strictest security protocols, furnishing engineers with a reliable tool for protecting confidential information within sleek, space-efficient products. It delivers an optimal balance of resilience and compactness for advanced security applications.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

Motor Control IC

The VS4111SOC Motor Control IC is meticulously crafted for managing a variety of motor types such as BLDC, synchronous, and AC induction motors, with precision control over operations, speed, and torque. Equipped with robust integrated gate drivers, this IC simplifies motor operation setups by directly interfacing with power components. Tailored for automotive and industrial application sectors, it provides embedded protection features and extensive motor phase configuration capabilities to assure enduring performance. Its design caters towards reducing system complexity and enhancing motor operational efficiency, which is critical in the outcomes of high-demand industrial tasks.

Vervesemi
Content Protection Software, Microcontroller
View Details

Post-Quantum Cryptography

Secure-IC's Post-Quantum Cryptography seeks to safeguard digital communications against the anticipated cryptographic vulnerabilities posed by quantum computing advancements. This forward-looking IP protects data security through algorithms resistant to quantum attacks, ensuring sustained confidentiality and data integrity. By integrating seamlessly with hardware and software setups, this IP facilitates secure data transfers and communications even in the face of future technological threats. The Post-Quantum Cryptography IP employs a diverse range of cryptographic methods, each rigorously tested for durability against quantum-level threats, thus forming a future-proof security foundation for sensitive information. Industries prone to data sensitivity, like financial services, healthcare, and national defense, benefit substantially from this quantum-resilient solution, which extends beyond conventional security-giving robust protection. Secure-IC's commitment to pioneering such technology reflects its leadership in cutting-edge cybersecurity, offering enterprises a strategic advantage in preemptively tackling quantum-related security challenges.

Secure-IC
Content Protection Software, Cryptography Cores, Platform Security, Security Protocol Accelerators
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt