AES Accelerator IP
Filter
Compare
41
IP
from 7 vendors
(1
-
10)
-
AES + SHA DMA Crypto Accelerator
- Control interface
- Crypto Algorithms (AES)
- Hash Algorithms
- DMA Controller
-
AES Key Wrap Crypto Accelerator
- Wide bus interface (128 bit data, 256 bit keys) or 32 bit register interface.
- Key/KEK sizes: 128, 192 and 256 bits.
- Includes key scheduling hardware.
- Supported modes: Nist AES Key Wrap.
-
SECURE ENCLAVE IP
- CRYPTOGRAPHIC ACCELERATOR HARDWARE
- Operations up to 4096 bits
-
Secure Enclave IP
- Common Criteria (CC) EAL5+ PP0117 certification ready Secure Enclave
-
RISC-V Secure Enclave IP
- Secure AES crypto-processor
- Secure DES / Triple DES crypto-processor
- Secure PKA public key crypto-processor
-
HDCP 2.0 Encryption Suite
- Support for HDCP 2.0
- Support for all HDCP configurations:
- Implementation of the HDCP Authentication protocol:
- Data encryption:
-
IP Platform for AI-Enabled IEEE 802.15.4 Smart Sensors
- IEEE 802.15.4 CONTROLLER :
- NEURAL NETWORK PROCESSOR :
- SENSOR FUSION :
- SECURITY ACCELERATOR :
-
Secure-IC's Securyzr™ Tunable AES (ECB, CBC, CTR, XTS, CCM, GCM) accelerator - optional SCA protection
- AMBA interface
- Supported key sizes: 128, 192 and 256 bits
- Multiple modes supported: ECB, CBC, CFB, OFB, CTR, CMAC, CCM, GMAC, GCM, XTS
- Compliant with NIST SP 800-38
-
AES-ECB-CBC-CFB-OFB-CTR-GCM-XTS-CCM Crypto Accelerator
- Register interface.
- Key sizes: 128, 192 and 256 bits.
- Key scheduling hardware.
- Feedback modes: ECB, CBC, CFB, OFB, CTR.
-
RT-640 Embedded Hardware Security Module (HSM) for Automotive ASIL-B
- Custom-designed 32-bit RISC-V secure processor
- Security model include hierarchical privilege model, secure key management policy, hardware-enforced isolation/access control/protection, error management policy
- Standard hardware cryptographic accelerators, including AES (all modes), HMAC, SHA-2 (all modes), RSA up to 4096 bits, ECC up to 521 bits, a NIST-compliant Random Bit Generator, AXI Multi Issue Out-of-Order, and Fast DMA capability. Additional algorithms such as Whirlpool (SHE), SHA-1 (legacy), AES-CMAC, SHA-3, Poly1305, ChaCha and OSCCA SM2-3-4 are available
- Multi-layered security model protects all core components against a wide range of attacks