Log In

All IPs > Security IP > Cryptography Software Library

Advanced Cryptography Software Library Semiconductor IP Solutions

In today's digital age, security is of paramount importance. Cryptography software libraries are a crucial component of semiconductor IPs, offering robust solutions designed to encrypt, decrypt, and ensure the integrity of information across various platforms and applications. These libraries provide the foundational algorithms and protocols essential for implementing secure communications and safeguarding sensitive data from unauthorized access, tampering, or corruption.

Cryptography software libraries are versatile, supporting a vast array of algorithms such as RSA, AES, SHA, ECC, and more. These libraries are integral to the development of secure systems and are leveraged in myriad applications ranging from personal electronic devices, such as smartphones and computers, to expansive enterprise and governmental systems. They form the backbone of secure data transactions, protecting consumer information during online banking, shopping, and other sensitive communications.

The products within this category are used to build the security layers in hardware devices, providing high efficiency and reliability with optimized performance. Whether you are designing chips for data centers, IoT devices, or embedded systems, employing a cryptography software library not only enhances user trust but also complies with stringent regulatory requirements surrounding data protection and privacy.

At Silicon Hub, our selection of cryptography software library semiconductor IPs is tailored to meet diverse industry needs, ensuring your products are equipped with state-of-the-art security features. Each library is developed with scalability and adaptability in mind, empowering developers to integrate them seamlessly into multi-platform environments. With a focus on minimizing the latency and maximizing the throughput, our cryptography software solutions enable high-speed, secure operations critical to modern computing environments.

All semiconductor IP

RV12 RISC-V Processor

The RV12 RISC-V Processor is a highly configurable, single-core CPU that adheres to RV32I and RV64I standards. It’s engineered for the embedded market, offering a robust structure based on the RISC-V instruction set. The processor's architecture allows simultaneous instruction and data memory accesses, lending itself to a broad range of applications and maintaining high operational efficiency. This flexibility makes it an ideal choice for diverse execution requirements, supporting efficient data processing through an optimized CPU framework. Known for its adaptability, the RV12 processor can support multiple configurations to suit various application demands. It is capable of providing the necessary processing power for embedded systems, boasting a reputation for stability and reliability. This processor becomes integral for designs that require a maintainability of performance without compromising on the configurability aspect, meeting the rigorous needs of modern embedded computing. The processor's support of the open RISC-V architecture ensures its capability to integrate into existing systems seamlessly. It lends itself well to both industrial and academic applications, offering a resource-efficient platform that developers and researchers can easily access and utilize.

Roa Logic BV
AI Processor, CPU, Cryptography Software Library, IoT Processor, Microcontroller, Processor Cores
View Details

AHB-Lite Timer

The AHB-Lite Timer module designed by Roa Logic is compliant with the RISC-V Privileged 1.9.1 specification, offering a versatile timing solution for embedded applications. As an integral peripheral, it provides precise timing functionalities, enabling applications to perform scheduled operations accurately. Its parameterized design allows developers to adjust the timer's features to match the needs of their system effectively. This timer module supports a broad scope of timing tasks, ranging from simple delay setups to complex timing sequences, making it ideal for various embedded system requirements. The flexibility in its design ensures straightforward implementation, reducing complexity and enhancing the overall performance of the target application. With RISC-V compliance at its core, the AHB-Lite Timer ensures synchronization and precision in signal delivery, crucial for systems tasked with critical timing operations. Its adaptable architecture and dependable functionality make it an exemplary choice for projects where timing accuracy is required.

Roa Logic BV
AMBA AHB / APB/ AXI, CPU, Cryptography Software Library, Input/Output Controller, Timer/Watchdog
View Details

ReRAM IP Cores for Embedded NVM in MCU & SOCs

CrossBar's ReRAM IP Cores present a sophisticated solution for enhancing embedded NVM within Microcontroller Units (MCUs) and System-on-Chip (SoC) architectures. Designed to work with advanced semiconductors and ASIC (Application-Specific Integrated Circuit) designs, these cores offer efficient integration, performance enhancement, and reduced energy consumption. The technology seeks to equip contemporary and next-generation chip designs with high-speed, non-volatile memory, enabling faster computation and data handling. Targeting the unique needs of IoT, mobile computing, and consumer electronics, the ReRAM IP Cores deliver scalable memory solutions that exceed traditional flash memory limits. These cores are built to be stackable and compatible with existing process nodes, highlighting their versatility. Furthermore, the integration of ReRAM technology ensures improved energy efficiency, with the added benefit of low latency data access—a critical factor for real-time applications and processing. These IP cores provide a seamless route to incorporating high-performance ReRAM into chips without major redesigns or adjustments. As the demand for seamless, secure data processing grows, this technology enables manufacturers and designers to aptly meet the challenges presented by ever-evolving digital landscapes. By minimizing energy usage while maximizing performance capabilities, these IP cores hold potential for transformative applications in high-speed, secure data processing environments.

CrossBar Inc.
12 Categories
View Details

PQSDK

Post-quantum Software Development Kit Provides easy-to-use software implementations of both post-quantum and classical cryptographic primitives. It’s designed with prototyping and experimentation in mind, consisting of an integration of PQShield’s PQCryptoLib library with two popular high-level cryptography libraries: OpenSSL and mbedTLS. OpenSSL: a widely-adopted secure-communication library mbedTLS: primarily intended for use in embedded system and IoT deployments

Premium Vendor
PQShield
Cryptography Cores, Cryptography Software Library
View Details

SHA Hashing for Secure Data Verification

Secure Hash Algorithms (SHA) play a critical role in data integrity and security. The SHA family, including SHA-1, SHA-2, and the widely used SHA-256, provides a method for verifying data through unique hash values that represent original content. Helion Technology designs high-performance and resource-efficient hash cores that cater to both high-speed and low-power applications. Hash functions are integral in digital signatures, message authentication, and integrity verification, ensuring that transmitted or stored data remains unchanged and secure. By aligning the hashing capabilities with robust FPGA and ASIC technologies, Helion offers solutions that enhance data security without imposing hefty resource demands. These cores are engineered for low area and power consumption, making them ideal for compact and energy-sensitive applications.

Helion Technology Limited
TSMC
130nm, 180nm
Cryptography Cores, Cryptography Software Library
View Details

Individual IP Core Modules

The Individual IP Core Modules by ResQuant are comprehensive components engineered to support diverse post-quantum cryptographic standards, including Dilithium, Kyber, XMSS, SPHINCS+, AES, and the SHA-2 family. These modules offer organizations the flexibility to select specific cryptographic functionalities tailored to their security needs, without the necessity of entire systems or hardware changes. Each module is designed to integrate easily into existing infrastructure, ensuring minimal disruption while enhancing security measures against potential future quantum threats. This approach allows industries to gradually implement PQC standards, ensuring a seamless transition to quantum-resistant cryptographic measures. Tailored for flexibility, the ResQuant Individual IP Core Modules can be used across a wide array of applications, from IoT devices to complex military and IT systems. By offering component-level integration, these modules empower companies to future-proof their offerings incrementally while maintaining robust security practices in their operations.

ResQuant
All Foundries
All Process Nodes
AI Processor, Audio Processor, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Suite-Q SW

Suite-Q SW is a versatile cryptographic software library designed to offer flexibility in code size, performance, and memory usage, making it an essential tool for developers working on resource-limited devices. Engineered for high adaptability, this software package provides a robust framework for implementing secure cryptographic operations across diverse platforms, including 8-bit to 64-bit processors. The library is meticulously crafted to support various configuration options that balance speed with memory efficiency, ensuring it meets custom specifications while preserving system integrity. Portable C code and high-speed, hand-optimized assembly variants are available to provide the ideal blend of compatibility and performance required in modern applications. Key features of Suite-Q SW include seamless integration as plug-in modules, support for a wide range of hardware offloads, and extensive compatibility with general-purpose and embedded CPUs. Validated through rigorous testing and performance measurements, it provides a reliable basis for secure software development, ensuring rapid deployment with minimized risk. As such, Suite-Q SW remains an indispensable part of PQSecure's comprehensive cryptographic offerings, perfect for adapting to the ever-changing landscape of digital security.

PQSecure Technologies, LLC
10 Categories
View Details

PQCryptoLib

FIPS 140-3 CMVP compliant, CAVP PQC cryptographic library designed for PQ/T Hybrid PQCryptoLib is a general-purpose FIPS 140-3 CMVP and CAVP-certified cryptographic library. It’s been designed for a wide variety of applications and provides the latest NIST-standardized post-quantum and classical algorithms in a software environment. With a configurable, secure, and easy-to-use API, PQCryptoLib is optimized for crypto-agility, particularly when it comes to FIPS-compliant hybrid PQ/T solutions, and with crypto-agility in mind, it’s built to protect against the threat of ‘harvest-now-decrypt-later’ attacks. The aim of PQCryptoLib is to help organizations transition smoothly and securely to quantum resistance in a manageable, easy-to-integrate solution.

Premium Vendor
PQShield
Content Protection Software, Cryptography Software Library
View Details

Suite-Q HW

Suite-Q HW is a robust system-on-chip (SoC) solution that envelops all the necessary cryptography required for secure protocols within compact and efficient hardware. Targeted at both high-end servers and low-end embedded systems, this solution emphasizes the dual benefits of scalability and adaptability. Suite-Q HW efficiently offloads demanding symmetric and asymmetric cryptographic processes by leveraging specialized accelerators, offering enhanced execution speeds that cater to different application requirements. A key component of its utility lies in its support for a wide array of cryptographic operations. This includes classical public key methods, such as ECDSA and ECDH, alongside emerging post-quantum techniques within isogeny and lattice frameworks. The hardware is further augmented by secure hash algorithms and diverse AES encryption modes, delivering comprehensive protection across a variable security landscape. Incorporating optional Differential Power Analysis (DPA) countermeasures and validated security standards, Suite-Q HW ensures security for sensitive data against contemporary and emerging threats. It facilitates integration with existing development flows across SoCs and FPGAs, optimizing power and silicon footprint according to specific needs. Furthermore, the hardware package provides comprehensive resources for integration, from testbench data to simulation scripts, enhancing its adaptability and effectiveness in today's digital security paradigm.

PQSecure Technologies, LLC
13 Categories
View Details

PQCryptoLib Embedded

Highly-optimized PQC implementations, capable of running PQC in < 15kb RAM PQCryptoLib-Emebedded is a versatile, CAVP-compliant version of PQCryptoLib, PQShield’s CMVP-certified library of post-quantum cryptographic algorithms. With its design focused on ultra-small area efficiency, PQCryptoLib-Embedded has been specifically designed for embedded systems, microcontrollers and memory-constrained devices. It could be the first step towards a hardware solution for providing PQC integration to devices already in the field.

Premium Vendor
PQShield
Cryptography Software Library, Embedded Security Modules
View Details

AndeSoft SW Stack

AndeSoft SW Stack encompasses a comprehensive set of software building blocks and middleware optimized for AndesCore processors. This rich collection includes operating systems, libraries, drivers, and middleware components, all meticulously designed to enhance software development speed and quality. By providing ready-to-use components, AndeSoft enables developers to focus on crafting their application-specific solutions, significantly reducing time-to-market. Its seamless integration with AndeSight IDE further enhances development efficiency, supporting diverse operating systems and being adaptable to various processor configurations for optimal performance.

Andes Technology
CPU, Cryptography Cores, Cryptography Software Library
View Details

Alcora V-by-One HS Daughter Card

The Alcora V-by-One HS Daughter Card by Parretto B.V. is designed to facilitate high-speed video data transmission with minimal wire insulation. Featuring V-by-One HS technology, it provides seamless connectivity for large video content transfer over fewer cables, supporting high-definition resolutions efficiently. Alcora's focus on V-by-One HS technology makes it suitable for applications where reduced cable clutter and high data transfer rates are necessary. It becomes an excellent choice for display applications that demand clean setups while transmitting vast amounts of data. By integrating this daughter card, system designers can achieve a streamlined architecture that supports robust video transmission without the associated clutter, keeping systems neat and efficient. Its compatible interface ensures it integrates well with existing video systems, offering scalable and future-proof solutions.

Parretto B.V.
AMBA AHB / APB/ AXI, Analog Filter, ATM / Utopia, Audio Interfaces, Cryptography Cores, Cryptography Software Library, LCD Controller, V-by-One, VESA, VGA
View Details

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

CANsec Controller Core

The CANsec Controller Core is engineered to provide enhanced security features for automotive CAN networks. Traditional CAN networks are not inherently secure, posing challenges in protecting against unauthorized access and data tampering. This controller core integrates security protocols directly into the CAN framework, offering an encryption-enabled solution tailored for modern automotive needs. This controller core implements standardized security measures, ensuring confidentiality, integrity, and authenticity of CAN messages. By incorporating advanced cryptographic algorithms, the CANsec Controller Core meets stringent security requirements without compromising the performance that automotive applications demand. Its design focuses on minimizing resource consumption while providing robust security enhancements. Ideal for vehicles requiring secure communication between various electronic control units (ECUs), the core upholds the automotive industry’s increasing emphasis on cybersecurity. The CANsec Controller Core is versatile in its implementation, suitable for both new vehicle architectures and as an upgrade to existing systems, making it a vital component of future-proof automotive design.

Fraunhofer Institute for Photonic Microsystems (IPMS)
CAN, CAN XL, CAN-FD, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Temperature Sensor
View Details

Post-Quantum Cryptography IP

Secure-IC's Post-Quantum Cryptography IP offers robust, future-ready security for digital communications, addressing the challenges of quantum computing on traditional encryption methods. This IP is crucial for systems that require long-term confidentiality and authenticity of data, ensuring they remain secure against threats posed by advancements in quantum computing. Designed to integrate seamlessly into existing hardware and software infrastructures, the Post-Quantum Cryptography IP is adaptable and scalable, providing flexibility in implementation. It supports a variety of cryptographic algorithms specifically chosen for their resistance to quantum attacks, ensuring they meet the highest security standards. By adopting this technology, systems can safeguard against potential future vulnerabilities that quantum processors might exploit. This IP is an essential component for industries looking to fortify their security measures, particularly in sensitive sectors such as defense, finance, and critical infrastructure. It provides a forward-thinking approach to cybersecurity, aligning with global trends and regulatory requirements for enhanced cryptographic solutions. By securing today’s systems against tomorrow’s threats, this IP is a strategic investment in sustained security resilience.

Secure-IC
3GPP-5G, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM as FTP/OTP Memory

Tailored for applications requiring secure non-volatile memory, CrossBar's ReRAM as FTP/OTP Memory offers a refined solution for few-time programmable (FTP) and one-time programmable (OTP) needs. Leveraging the intrinsic properties of ReRAM technology, these applications benefit from reduced write requirements and minimized area without compromising security or performance. This ReRAM variant integrates effectively within standard CMOS processes, providing adaptability whether used independently or embedded within more complex systems. Its non-volatility and high density make it a preferred choice for secure applications where cost-efficient data integrity is essential. The technology supports diverse applications across numerous sectors including automotive, medical, and industrial systems, where quick response times and reliability are critical. The FTP/OTP ReRAM enables provisioning for physical unclonable functions (PUF), further enhancing its security capabilities. Such an implementation provides resistance to invasive attacks and maintains data integrity even under adverse conditions. These features position ReRAM as a powerful tool for managing sensitive data operations and broad pursuits in modern digital infrastructures.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Flash Controller, HBM, I/O Library, Mobile DDR Controller, Mobile SDR Controller, NAND Flash
View Details

Customizable Cryptography Accelerator

The Customizable Cryptography Accelerator offered by ResQuant is designed to meet varied client needs with an extensive array of configurable options. It integrates seamlessly with all NIST PQC standards like Dilithium, Kyber, XMSS, and SPHINCS+, and is extendible with additional algorithms, including customer-specific implementations. The accelerator is built to be DPA, timing, and SCA resistant, and is AXI 4 ready, ensuring robust protection in a variety of applications. This innovation allows for customizable tuning in performance and size, addressing the specific security requirements of customers from various industries. The accelerator demonstrates ResQuant's commitment to flexibility and adaptability, enabling clients to implement cutting-edge encryption with ease. With ongoing enhancements to extend its capabilities, the accelerator stands as a critical component in defenses against future computational threats posed by quantum technologies. In addition to its technical capabilities, the ResQuant Customizable Cryptography Accelerator is engineered for efficient power use and minimized physical footprint, making it suitable for integration into a wide range of hardware setups. This solution underscores ResQuant's dedication to delivering high-security standards and unmatched versatility in cryptographic processing solutions.

ResQuant
All Foundries
All Process Nodes
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Processor, Security Protocol Accelerators
View Details

Cryptographic Core

PQSecure's Cryptographic Core serves as a comprehensive solution for implementing standardized cryptographic algorithms within system-on-chip (SoC) designs. This product is tailored for diverse applications, ranging from high-end servers to low-end embedded systems, ensuring broad compatibility. It effectively offloads both symmetric and asymmetric cryptographic operations, boosting execution efficiency. The core includes hardware accelerators capable of performing various cryptographic functions, such as true random number generation and classical public key cryptographic algorithms like ECDSA and ECDH. Incorporating next-generation post-quantum cryptographic methods, this core tackles the imminent threats posed by quantum computing. By supporting isogeny-based, lattice-based, and code-based cryptographies, it prepares systems for the quantum evolution. Furthermore, this Cryptographic Core supports secure hashing algorithms and a variety of advanced encryption standards, ensuring robust protection across different security levels recommended by standardization bodies. As an embodiment of both agility and security, it integrates seamlessly into various SoC and FPGA architectures, providing substantial power reductions compared to traditional software implementations. Designed with future-proofing in mind, PQSecure's Cryptographic Core features optional side-channel protection mechanisms validated by standard techniques, delivering DPA countermeasures without significant overhead. It boasts a comprehensive suite of verification tools, including test benches and simulation scripts, making integration into existing systems both easy and efficient. With customizable performance profiles, the Cryptographic Core is engineered to meet the demanding security requirements of tomorrow's digital environments.

PQSecure Technologies, LLC
9 Categories
View Details

Cramium Personal Hardware Security Module (PHSM)

The Cramium Personal Hardware Security Module (PHSM) by CrossBar is an integrated security solution that enhances digital asset security through its advanced ReRAM technology. Built with the capability for Multi-Party Computation (MPC), the Cramium PHSM provides robust key protection by eliminating the need for key reconstruction, thus reducing vulnerability to attacks. Utilizing FIDO2 authentication, the module is designed with an offline-by-default architecture, ensuring high assurance levels in protecting sensitive data. This protection is particularly crucial for applications operating within decentralized systems where security is paramount. Combining innovative memory and cryptographic technology, the Cramium PHSM is crafted to meet varying compliance needs, making it ideal for industries such as finance, healthcare, and information technology. The module enhances tamper resistance for cryptographic operations, ensuring secure storage and operation of sensitive information within protected environments. One of its unique features is the ability to offer robust authentication without relying on external network connectivity, effectively insulating assets from unauthorized access. Cramium PHSM exemplifies CrossBar's commitment to developing secure solutions for complex challenges presented by modern computational demands. Its modular design enables easy customization and integration, catering to specific industry requirements and assuring enterprises of enhanced cryptographic functionalities. The module not only safeguards digital secrets but also introduces an improved fault-tolerant element that minimizes risk from potential breaches or exploits.

CrossBar Inc.
Cryptography Software Library, Embedded Security Modules, NVM Express, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

FortiCrypt

FortiCrypt offers a robust and secure cryptographic framework specifically designed to thwart side-channel and fault injection attacks. This suite of cryptographic IP includes advanced protection mechanisms that ensure both high security and performance across various platforms. The IP core is meticulously engineered to deliver ultra-low power consumption, making it ideal for battery-operated and IoT devices. The FortiCrypt product line is versatile, supporting a wide array of cryptographic algorithms, including both classical and post-quantum variations. It integrates seamlessly with existing systems, requiring minimal integration overhead, and is validated to withstand real-world attacks. Its high bandwidth capacity, achieved through multi-pipeline architecture, makes FortiCrypt suitable for high-performance applications, ensuring rapid data throughput without compromising security. Furthermore, FortiCrypt's compliance with the highest industry standards, such as FIPS 140-3 and SESIP, assures its usage in applications requiring stringent security measures. Whether used for secure communication, data protection, or hardware defense, FortiCrypt establishes a fortress against unauthorized access and data breaches, demonstrating unparalleled resilience and efficiency.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

NVM Defender

NVM Defender is crafted to bolster the protection of non-volatile memory on integrated circuits against unauthorized access and data breaches. With a cutting-edge architecture, this product secures sensitive information stored within ICs, employing robust measures to counter invasive and non-invasive attack vectors. NVM Defender is pivotal in environments where data integrity and confidentiality are paramount, ensuring that sensitive data remains shielded from potential threats. The technology integrates seamlessly with various IC designs, providing a comprehensive security layer without affecting the performance of the primary device functions. It is engineered to withstand sophisticated threats, capturing and neutralizing attempts to access or alter stored data illicitly. Industries reliant on secure data transfer and storage leverage this product to maintain high levels of security across their hardware. Designed with adaptability in mind, NVM Defender can be implemented across different industries, offering scalable security solutions tailored to the specific demands of various fields such as automotive, aerospace, and consumer electronics.

Texplained
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security
View Details

Keccak Hash Engine

The Keccak Hash Engine is known for its versatility in cryptographic operations, supporting a broad range of functions beyond traditional hashing. Notably, it serves as a foundational element for hash functions, authentication, encryption, and pseudo-random number generation. This IP core employs the innovative sponge construction technique and the Keccak-f permutation, renowned for its simplicity and adaptability. Keccak has been internationally standardized within several specifications, including NIST's FIPS 202 for SHA-3 and the 3GPP TS 35.231 for mobile telecommunications. This extensive scrutiny and third-party analysis ensure its suitability for highly secure applications. The Keccak Hash Engine excels in scenarios demanding configurable security levels or output lengths, integrated seamlessly into various systems. Built for integration ease and robust security, the Keccak IP core operates within a single clock domain and comes extensively verified. It provides a strong foundation for applications in security, data integrity, blockchain technologies, and secure data storage, extending the potential of cryptographic protections within embedded systems.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Low Power Security Engine

The Low Power Security Engine is designed by Low Power Futures to provide robust security for IoT devices while maintaining minimal power usage. Focusing on compact and comprehensive security capabilities, it supports elliptic-curve based cryptographic algorithms, including ECDHE (Elliptic-Curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm). The design is perfect for ensuring secure operations in constrained environments like RFID systems and embedded SIM cards, offering side-channel and timing attack resistance, thus securing sensitive data in demanding applications like IIoT and connected infrastructure.

Low Power Futures
Coprocessor, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

Securyzr Key Management System

The Securyzr Key Management System by Secure-IC is designed to provide robust management and protection of cryptographic keys within a wide array of systems. This system ensures that sensitive keys are securely generated, stored, and distributed, preventing unauthorized access and misuse while maintaining data confidentiality and integrity. Incorporating a variety of security mechanisms, the Securyzr Key Management System supports end-to-end encryption protocols and enables secure communication between devices. It is particularly beneficial for applications that demand high security, such as financial services, healthcare, and critical infrastructure. The system ensures compliance with international security standards, facilitating smooth implementation into existing IT infrastructures. The solution's flexibility allows for scalable deployment across different networks and systems, ensuring an adaptable approach to key management. By integrating this system, organizations can simplify the process of securing their keys, reduce the risk of breaches, and enhance their overall cyber defense posture. Enhanced features like lifecycle management and audit abilities make it a valuable tool for maintaining high security standards over time.

Secure-IC
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Processor, Security Protocol Accelerators, Security Subsystems
View Details

ReRAM Secure Keys

ReRAM Secure Keys from CrossBar deliver an innovative solution for secure computing, utilizing the unique properties of resistive random-access memory (ReRAM) to generate physically unclonable function (PUF) keys. These keys offer robust security, providing a high degree of randomness and stability essential for safeguarding modern electronic devices. CrossBar's secure keys adapt smoothly into existing semiconductor processes, particularly where traditional embedded flash memory solutions falter at smaller node sizes. Designed to withstand varied environmental conditions, ReRAM-based PUF keys resist tampering and sidestep the vulnerabilities associated with other traditional memory systems. They do not suffer from RF interference, providing an enhanced layer of security crucial for applications in automotive, data center, and industrial sectors. These secure keys reflect the powerful integration potential of ReRAM technology, ensuring data integrity under a wide range of operational environments. By leveraging the predictable characteristics of ReRAM, CrossBar ensures that these keys protect sensitive information against unauthorized extraction and mimicry. The secure key technology bolsters cryptographic processes, instilling confidence in secure boot and trusted platform modules. This innovative application of ReRAM underscores its versatility, enabling a new era of security measures in computational and smart device ecosystems.

CrossBar Inc.
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Other, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Side-channel Attack Resistance

Side-channel Attack Resistance technology by FortifyIQ focuses on defending cryptographic systems against unauthorized data breaches through physical observation. This protection suite is essential for devices targeted by side-channel metrics like power usage, electromagnetic emissions, or timing discrepancies, ensuring that sensitive data remains secure from spillover attacks. Developed with a keen understanding of modern attack vectors, this technology employs advanced countermeasures crafted from algorithmic optimizations and hardware-level enhancements. Each design component is thoroughly tested to close any vulnerabilities, protecting cryptographic keys and operations even under intense scrutiny from external attackers. FortifyIQ's Side-channel Attack Resistance solutions are a staple for environments with stringent security requirements, such as government, financial institutions, and defense sectors. By integrating these defenses, manufacturers can prevent leakage of critical information during cryptographic processes, maintaining a high level of trustworthiness and cyber resilience.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Fault Injection Attack Countermeasures

FortifyIQ's Fault Injection Attack Countermeasures are designed to shield cryptographic devices from manipulations that cause malfunctions and data breaches. These techniques form a core part of security architectures that need to withstand sophisticated hacking attempts aimed at faulting the operational framework of hardware systems. These countermeasures incorporate multilayered protections at both the hardware and software level. They detect and neutralize inconsistencies introduced by fault injection methods, ensuring continued security and reliable operation regardless of the attack sophistication. All solutions are rigorously analyzed to validate their efficacy against diverse fault models. Crucial for high-security contexts like data centers and financial systems, the implementation of Fault Injection Attack Countermeasures guarantees operational integrity and prevents attackers from exploiting hardware weaknesses. FortifyIQ’s offerings emphasize robustness without compromising performance or elevating complexity, essential for environments where reliability is paramount.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Subsystems
View Details

ATEK250P3 (SPDT Switch)

The ATEK250P3 is a SPDT switch known for its absorptive functionality, operating efficiently at low frequencies. It spans a frequency range from LF to 14 GHz, characterized by 1.5 dB loss, providing a robust isolation of 43 dB, and delivering a P1dB of 27 dBm. The switch utilizes a control voltage that is positive, all encased in a compact 3x3 mm QFN package, ensuring minimal space usage while maintaining high performance.

Atek Midas
AMBA AHB / APB/ AXI, Analog Multiplexer, Cryptography Software Library, Input/Output Controller, Peripheral Controller, Receiver/Transmitter, USB
View Details

FortiMac

The FortiMac suite provides advanced cryptographic solutions specifically designed for rigorous protection against differential power analysis and fault injection attacks. This IP core specializes in HMAC SHA2-based applications, offering state-of-the-art security features that ensure both reliability and compactness. FortiMac's strength lies in its use of algorithmic defenses that are resistant to advanced side-channel attacks. The IP is highly adaptable, suitable for integration in both new and existing security systems. By minimizing power usage and gate count, FortiMac is an optimal choice for devices with stringent power and area constraints, delivering efficient performance without sacrificing security integrity. This product supports all major SHA2 hash functions, providing flexibility for developers and ensuring comprehensive protection for various cryptographic operations. Additionally, the IP is crafted to align with the highest security certifications, making it a trusted choice for secure communication and data integrity in sensitive sectors such as finance, telecommunications, and defense.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, IoT Processor, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

QRoot Lite

QRoot Lite is a lightweight and configurable root-of-trust IP tailored for resource-constrained microcontrollers and IoT devices. The solution provides comprehensive security features such as secure boot, device attestation, and sealed storage, all in alignment with the TCG MARS specification. Designed to minimize silicon footprint, QRoot Lite integrates seamlessly via standard industry interfaces, ensuring a rapid and cost-effective implementation conducive to meeting regulatory compliance standards. This IP is ideal for integrating secure elements in low-power and cost-sensitive environments, offering a secure solution for modern connected devices.

Crypto Quantique
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

KiviPQC-KEM

The KiviPQC-KEM represents KiviCore's cutting-edge approach to post-quantum cryptography, designed to provide robust security against both classical and quantum computing threats. This IP core supports the Module-Lattice-based Key Encapsulation Mechanism (ML-KEM), aligning with the stringent standards set by NIST FIPS 203. By enabling secure key exchanges over untrusted channels, KiviPQC-KEM forms the cornerstone of future-proof network security solutions. This IP core focuses on minimal logic utilization while delivering high performance and low latency through hardware acceleration. The integration of an AMBA AXI4-Lite interface ensures simple system inclusion, whether in ASIC or FPGA designs. The KiviPQC-KEM-Fast and KiviPQC-KEM-Tiny variants cater to different performance needs, optimizing either for rapid processing or resource efficiency. Applications for KiviPQC-KEM include quantum-resistant network infrastructures, secure public key infrastructures (PKI), and transport-level security protocols like TLS/SSL. Its design supports a comprehensive set of operations including key generation, encapsulation, and decapsulation, making it an invaluable resource in the evolving landscape of cryptographic security.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

FortiCrypt Library

The FortiCrypt Library is a sophisticated suite of cryptographic tools engineered to provide secure software implementations resistant to power and fault analysis. With an emphasis on flexibility and efficiency, it facilitates secure cryptographic operations without specialized hardware. The library is adaptable to a variety of environments, from embedded systems to high-capacity servers. By focusing on ultra-low power consumption and streamlined integration, it offers an excellent solution for developers looking to bolster their software against potential vulnerabilities without redesigning existing hardware. This toolset is designed to enable secure data processing across a multitude of applications, particularly where the implementation of physical security measures is impractical. With its robustness firmly grounded in industry standards, the FortiCrypt Library is especially suited for deployment in sectors like automotive and industrial automation, where reliable software security is critical.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

Hardware Security Module

The Hardware Security Module (HSM) provides a robust security infrastructure for digital systems, featuring functions that support cryptographic key storage, boot authentication, and system supervision. This module is crucial for protecting sensitive information and ensuring system integrity, especially in high-security environments like space missions or government networks. Built to integrate seamlessly into complex systems, the HSM offers a comprehensive suite of security features that address various digital threats. Its design ensures encryption processes run efficiently without impacting overall system performance, preserving both speed and data confidentiality. By leveraging the GRLIB IP library, the HSM accelerates the development and deployment of secure systems, offering developers pre-configured tools that shorten time-to-market. The module's high adaptability and trusted protection mechanisms make it an ideal solution for sophisticated digital security applications.

Frontgrade Gaisler
Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Subsystems
View Details

PCIe GEN6 PHY

Designed for next-generation PCIe systems, the PCIe GEN6 PHY core delivers reliable performance with data rates up to 64GT/s per lane using advanced PAM4 signaling. It is optimized for high-speed, data-intensive applications such as AI and ML, modern storage solutions, and high-performance computing. This PHY core supports PRBS testing, loopback modes, multiple power states, and jitter measurement, providing robust and scalable throughput, essential for innovation in data-driven environments.

Logic Fruit Technologies
Cryptography Software Library
View Details

AES XP-DPA-FIA

AES XP-DPA-FIA is a highly refined encryption module designed by FortifyIQ to fortify against side-channel and fault injection attacks. This core is particularly notable for delivering ultra-high bandwidth, making it a superior choice for applications requiring rapid and secure data processing. The IP leverages a multi-pipeline architecture, which allows it to sustain high throughput rates while maintaining robustness against unauthorized access. Its architecture enhances encryption efficiency, delivering optimal security for sensitive data transfers in high-performance computing environments. Certified by rigorous security standards, AES XP-DPA-FIA is tailored to meet the demands of modern electronic security needs. It is an invaluable component in sectors such as telecommunications and government operations, where data integrity and speed are critical.

FortifyIQ
Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators, Security Subsystems
View Details

AES ULP-DPA-FIA

AES ULP-DPA-FIA offers ultra-low power encryption capabilities fortified against differential power analysis and fault injection. This core design maintains exceptional energy efficiency while providing robust security, making it ideal for devices with limited power resources. Its architectural efficiency supports high throughput performance, ensuring secure data handling without significant power draw. The core is designed for easy integration into existing systems, preserving existing infrastructure while upgrading security measures comprehensively. With a focus on battery-operated and minimally powered environments, AES ULP-DPA-FIA is perfect for IoT applications and portable electronics needing dependable, long-lasting security. Compliance with top industry security benchmarks further validates its applicability in sensitive sectors demanding unwavering data protection.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

HMAC-SHA2-DPA-FIA

HMAC-SHA2-DPA-FIA by FortifyIQ provides an innovative solution for message authentication, with hardened protection against side-channel and fault injection attacks. Tailored to safeguard HMAC SHA2 operations, this IP remains an essential part of systems aiming to maintain high levels of security integrity. Designed to adapt to various computational environments, HMAC-SHA2-DPA-FIA guarantees that HMAC processing remains secure and efficient, regardless of external attempts to compromise system integrity. Its development is based on sophisticated algorithmic countermeasures that ensure operational resilience without impacting system performance. By aligning with stringent certification requirements, HMAC-SHA2-DPA-FIA is positioned as a reliable choice for industries needing assurances against data tampering and leakage during message authentication. This makes it particularly suitable for secure communications in sensitive fields like defense and finance.

FortifyIQ
AV1, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Security Protocol Accelerators
View Details

AES SX-DPA-FIA

AES SX-DPA-FIA is engineered for balanced encryption solutions, offering formidable defense against side-channel and fault injection attacks while balancing high performance with efficient resource usage. This IP core is optimized for applications requiring both high security and a modest gate count. It provides a mid-range solution in FortifyIQ's extensive IP catalog, serving devices that need a compromise between full feature sets and efficiency. AES SX-DPA-FIA integrates seamlessly into a wide variety of devices, from consumer electronics to industrial control systems, offering consistent protection without compromising on speed or durability. With validation against industry-leading standards and certifications, AES SX-DPA-FIA is equipped for deployment across sectors requiring cost-effective security solutions. Its versatile design is adept at maintaining data integrity across networked environments, safeguarding information against unauthorized access and breaches.

FortifyIQ
Amplifier, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

AES UC-DPA-FIA

The AES UC-DPA-FIA core from FortifyIQ excels in delivering ultra-compact security solutions that guard against side-channel and fault injection attacks. Tailored for environments with space limitations, it ensures minimalistic footprint while retaining high security assurances against exploitable vulnerabilities. By minimizing gate count without sacrificing security performance, AES UC-DPA-FIA stands as a preferred choice for integrated circuits where every nanometer counts. Its application extends to compact electronic devices, providing cutting-edge cryptographic capabilities where space and efficiency are crucial. Occupying an essential niche in secure gadget design, AES UC-DPA-FIA adheres to the strictest security protocols, furnishing engineers with a reliable tool for protecting confidential information within sleek, space-efficient products. It delivers an optimal balance of resilience and compactness for advanced security applications.

FortifyIQ
Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Memories, Embedded Security Modules, Security Protocol Accelerators
View Details

VibroSense Tire Monitoring Solution

The VibroSense Tire Monitoring Solution by Polyn Technology is an ultra-low power, neuromorphic front-end chip that transforms regular tires into smart, self-aware components. This innovative chip is seamlessly integrated into standard Tire Pressure Monitoring Systems (TPMS), allowing it to detect tire-road friction changes in real time. These friction changes are crucial for sending alerts to a vehicle's Advanced Driving Assistance Systems (ADAS), enhancing safety by improving road surface awareness and reducing stopping distances. Unlike traditional systems, which often rely on indirect estimations, VibroSense provides precise, on-the-fly monitoring of tire conditions, offering unparalleled accuracy and reliability.

Polyn Technology Ltd.
Cryptography Software Library, Keyboard Controller
View Details
Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Chatting with Volt