ECC IP
Filter
Compare
464
IP
from 70 vendors
(1
-
10)
-
Elliptic Curve Cryptography IP
- Supported algorithms:
- Point multiplication
- ECDSA signature generation
- ECDSA signature verification
-
Hamming Code ECC
- Encoder:
- Decoder
-
high-performance solution for elliptic curve cryptography
- Supported algorithms:
- Supported Elliptic Curves
- Optional Side Channel Attacks countermeasures
- Input/Output EC point verification
-
ECC with BCH Algorithm
- High bandwidth, low latency parallel encode and decode paths
- Configurable number of encode blocks
- Configurable number of decode blocks
- Configurable code word length (K), up to 1024 bytes
-
Synthesized RTL of SRAM/NOR memory controller with ECC IP-core (MCIF interface)
- • Support of various models of SRAM- NOR-memory with asynchronous interface;
- • Configurable timing parameters exchange with SRAM- NOR-memory;
- • Configurable to support up to 6 banks of memory;
- • Configurable to support up to 26 bit address;
-
Synthesized RTL of SRAM/NOR memory controller with ECC IP-core (AXI interface)
- • Configurable timing parameters exchange with SRAM- NOR-memory;
- • Configurable to support up to 6 banks of memory;
- • Configurable to support up to 26 bit address;
- • 32-bit data bus;
-
100% Secure Cryptographic System for RSA, Diffie-Hellman and ECC with AMBA AHB, AXI4 and APB
- For RSA, Diffie-Hellman and ECC
- With AMBA AHB, AXI4 and APB
-
ECC IP Core for Digital Signature Generation and Verification (P-384)
- High Performance ECC IP Core for digital signature (Generation / Verification)
- Support the selection of hashing modes SHA1 / SHA2 / SHA3
-
Security Gasket to hide transaction to range of addresses for SPA and DPA and secure Data using End-to-End ECC.
- 1. AMBA-AXI-4.0 Master and Slave
- 2. Blocks user to snoop the meaningful data.
- 3. Block User from SPA/ DPA Gassing the secure data.
- 4. End to End ECC Secured transactions.
-
Security Gasket to hide transaction to range of addresses for SPA and DPA and secure Data using End-to-End ECC.
- 1. AMBA-AHB Master and Slave
- 2. Blocks user to snoop the meaningful data.
- 3. Block User from SPA/ DPA Gassing the secure data.
- 4. End to End ECC Secured transactions.