Log In

KiviCore

KiviCore is a specialized provider of cutting-edge cryptographic IP cores, known for their emphasis on security and efficiency. Situated at the forefront of semiconductor innovation, KiviCore offers a diverse range of products and services aimed at securing embedded systems. Their portfolio includes hardware implementations optimized for both ASICs and FPGAs, providing a streamlined and integrated approach to cryptographic solutions. These offerings underscore KiviCore's commitment to enabling rapid development cycles and cost-effective design solutions, promoting the highest levels of security and efficiency. With a strong focus on cryptographic functionalities such as hash engines and post-quantum cryptography, KiviCore's products serve as the foundation for complex cryptographic protocols and systems. Their expertise in ASIC/SoC and FPGA security, combined with consulting and co-design services, facilitates the creation of robust security architectures in today's embedded products. KiviCore's solutions promise a compact attack surface and straightforward validation, ensuring maximum performance and security. KiviCore also provides specialized services aimed at meeting emerging cybersecurity standards such as the Cyber Resilience Act. Their offerings include comprehensive security assessments that identify potential vulnerabilities and offer clear, actionable recommendations to enhance system security. This proactive approach helps clients prepare for cybersecurity compliance and adapt their embedded systems to evolving industry demands. Read more

Is this your business? Claim it to manage your IP and profile

3
IPs available

SHA-3 Crypto Engine

The SHA-3 Crypto Engine is a hardware accelerator designed for cryptographic hashing, offering high throughput and area efficiency. It adheres to the NIST FIPS 202 standard, supporting all variants of the SHA-3 family, including SHA-3-224, SHA-3-256, SHA-3-384, and SHA-3-512, along with extendable output functions SHAKE-128 and SHAKE-256. Designed to resist time-based side-channel attacks, this IP core is integrated as a fully synchronous design supporting AMBA AXI4-Stream interfaces, making it versatile for various secure applications. Applications for the SHA-3 Crypto Engine span from secure message authentication to encryption protocols within IPsec and TLS/SSL engines, secure boot processes, and decentralized blockchain technologies. It is particularly suitable for e-commerce platforms and financial transaction processing, where data integrity and authenticity are paramount. Its ease of integration and robust performance ensure it is a preferred choice for next-generation security solutions. Offering resource-optimized performance, the SHA-3 engine is available with a range of deliverables, including Verilog RTL, testbenches, and comprehensive documentation. Its resource utilization across different FPGA and ASIC platforms demonstrates compatibility and efficiency, ensuring developers can implement secure hashing functions seamlessly within their devices.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

Keccak Hash Engine

The Keccak Hash Engine is known for its versatility in cryptographic operations, supporting a broad range of functions beyond traditional hashing. Notably, it serves as a foundational element for hash functions, authentication, encryption, and pseudo-random number generation. This IP core employs the innovative sponge construction technique and the Keccak-f permutation, renowned for its simplicity and adaptability. Keccak has been internationally standardized within several specifications, including NIST's FIPS 202 for SHA-3 and the 3GPP TS 35.231 for mobile telecommunications. This extensive scrutiny and third-party analysis ensure its suitability for highly secure applications. The Keccak Hash Engine excels in scenarios demanding configurable security levels or output lengths, integrated seamlessly into various systems. Built for integration ease and robust security, the Keccak IP core operates within a single clock domain and comes extensively verified. It provides a strong foundation for applications in security, data integrity, blockchain technologies, and secure data storage, extending the potential of cryptographic protections within embedded systems.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Embedded Security Modules, Platform Security, Security Protocol Accelerators, Security Subsystems
View Details

KiviPQC-KEM

The KiviPQC-KEM represents KiviCore's cutting-edge approach to post-quantum cryptography, designed to provide robust security against both classical and quantum computing threats. This IP core supports the Module-Lattice-based Key Encapsulation Mechanism (ML-KEM), aligning with the stringent standards set by NIST FIPS 203. By enabling secure key exchanges over untrusted channels, KiviPQC-KEM forms the cornerstone of future-proof network security solutions. This IP core focuses on minimal logic utilization while delivering high performance and low latency through hardware acceleration. The integration of an AMBA AXI4-Lite interface ensures simple system inclusion, whether in ASIC or FPGA designs. The KiviPQC-KEM-Fast and KiviPQC-KEM-Tiny variants cater to different performance needs, optimizing either for rapid processing or resource efficiency. Applications for KiviPQC-KEM include quantum-resistant network infrastructures, secure public key infrastructures (PKI), and transport-level security protocols like TLS/SSL. Its design supports a comprehensive set of operations including key generation, encapsulation, and decapsulation, making it an invaluable resource in the evolving landscape of cryptographic security.

KiviCore
2D / 3D, Content Protection Software, Cryptography Cores, Cryptography Software Library, Platform Security, Security Protocol Accelerators
View Details

Latest News About KiviCore

Securing Data Across States: Implementing Encryption in SoC Designs

Learn about integrating robust encryption practices in SoC designs to safeguard data at all stages and shield your devices from cyber threats. Read more

Sign up to Silicon Hub to buy and sell semiconductor IP

Sign Up for Silicon Hub

Join the world's most advanced semiconductor IP marketplace!

It's free, and you'll get all the tools you need to discover IP, meet vendors and manage your IP workflow!

No credit card or payment details required.

Sign up to Silicon Hub to buy and sell semiconductor IP

Welcome to Silicon Hub

Join the world's most advanced AI-powered semiconductor IP marketplace!

It's free, and you'll get all the tools you need to advertise and discover semiconductor IP, keep up-to-date with the latest semiconductor news and more!

Plus we'll send you our free weekly report on the semiconductor industry and the latest IP launches!

Switch to a Silicon Hub buyer account to buy semiconductor IP

Switch to a Buyer Account

To evaluate IP you need to be logged into a buyer profile. Select a profile below, or create a new buyer profile for your company.

Add new company

Switch to a Silicon Hub buyer account to buy semiconductor IP

Create a Buyer Account

To evaluate IP you need to be logged into a buyer profile. It's free to create a buyer profile for your company.

Review added

Claim Your Business

Please enter your work email and we'll send you a link to claim your business.

Review added

Claim Email Sent

Please check your email for a link you can use to claim this business profile.

Chatting with Volt