Vendor: Xiphera Ltd Category: Post Quantum

xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core

xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core provides quantum-resistant key exchange, offering a secure solution ag…

Overview

xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core provides quantum-resistant key exchange, offering a secure solution against the growing threat posed by quantum computing. As a member of xQlave® Post-Quantum Cryptography (PQC) product family, this IP core is designed to meet the security standards set by the U.S. National Institute of Standards and Technology (NIST), ensuring that your systems are equipped to handle the cryptographic challenges of the future. The xQlave® ML-KEM PQC solution combines high performance with minimal resource usage, making it an ideal choice for secure, scalable, and efficient key exchange.

Key features

  • Quantum-resistant key exchange for future-proof security
  • Compliant with NIST's ML-KEM standard
  • Pure RTL without hidden CPU or software components
  • Optimised architecture with constant-time execution
  • Easy system integration with 64-bit interface
  • Vendor agnostic FPGA/ASIC implementation

Block Diagram

Benefits

  • Supports all security levels
  • Minimal resource requirement (less than 10 kLUT)
  • Fast performance with thousands of operations/sec
  • Easy to integrate
  • Several bus interfaces available
  • IP core designed in-house at Xiphera
  • Technical support by the original designers and cryptographic experts

Applications

  • Cryptographic key exchange
  • Secure communications
  • data storage and transmission
  • Quantum-resistant cryptographic protocols

What’s Included?

  • Encrypted RTL or source code
  • Sample synthesis scripts
  • Comprehensive simulation test bench, scripts & guide
  • Optional netlist
  • Instantiation file
  • Detailed datasheet and integration guide
  • Please contact sales@xiphera.com for pricing and your preferred delivery method

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
XIP6110B
Vendor
Xiphera Ltd

Provider

Xiphera Ltd
HQ: Finland
Xiphera, Ltd, based in Finland, designs and implements proven cryptographic security for embedded systems. Our strong cryptographic expertise and extensive experience in digital system design enable us to help our customers to protect their most valuable assets. We offer secure and highly optimised cryptographic Intellectual Property (IP) cores, designed directly for Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs) without software components. Our broad, fully in-house designed, and up-to-date portfolio, including implementations of Post-Quantum Cryptography, enables cost-effective development projects with fast time-to-market – providing peace of mind in a dangerous world.

Learn more about Post Quantum IP core

How to design secure SoCs Part IV: Runtime Integrity Protection

SoC designers are increasingly challenged to integrate robust security measures into their designs. Modern connected devices, such as automotive Electronic Control Units (ECUs), Internet of Things (IoT) nodes, and industrial control systems, face increasing susceptibility to cyberattacks. This escalating threat landscape underscores the critical importance of mandatory security requirements.

Nine Compelling Reasons Why Menta eFPGA Is Essential for Achieving True Crypto Agility in Your ASIC or SoC

Today’s world is already overly complicated to provide robust product security, with extremely motivated hackers creating novel threats exposing new vulnerabilities every day. But considering tomorrow’s world with the looming threat of quantum computing, expanding AI possibilities and rapidly evolving regional regulations and export control risk with severe financial penalties, this is a daunting challenge.

Deploying StrongSwan on an Embedded FPGA Platform, IPsec/IKEv2 on Arty Z7 with PetaLinux and PQC

The objective of this article is to present and analyze a concrete IPsec/IKEv2 deployment on an FPGA-based embedded Linux system. Using an Arty Z7 FPGA platform with PetaLinux and StrongSwan, the focus is on system-level integration rather than protocol theory: how the IPsec stack is built and deployed, how classical and post-quantum key exchange are integrated without modifying standardized protocols, and what architectural trade-offs arise when moving cryptographic operations into programmable logic.

A Comprehensive Post-Quantum Cryptography (PQC) Solution based on Physical Unclonable Function (PUF)

This article provides an in-depth analysis of the specific PPA challenges introduced by PQC and elucidates how PUF-PQC leverages its unique dualtrack strategy to deliver a robust and flexible Hardware Root of Trust (HRoT) across diverse application scenarios. Furthermore, it demonstrates the integration of Physical Unclonable Function (PUF) with a NIST SP 800-90B compliant True Random Number Generator (TRNG) to serve as critical components of PUFrt (Root of Trust), ensuring the security of post-quantum key generation starting from the entropy source.

Why Anti-tamper Sensors Matter: Agile Analog and Rambus Deliver Comprehensive Security Solution

If your device processes valuable data, controls a critical function, or connects to a wider network, it’s a target. Attackers don’t just try to break software; they increasingly physically tamper with hardware; probing, fault injecting, or opening enclosures to bypass protections and extract secrets. The consequences range from IP theft and fraud to orchestrated downtime across fleets of connected devices.

Frequently asked questions about Post-Quantum Cryptography IP cores

What is xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core?

xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core is a Post Quantum IP core from Xiphera Ltd listed on Semi IP Hub.

How should engineers evaluate this Post Quantum?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Post Quantum IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP