SHA-3 Secure Hash Function IP
Filter
Compare
14
IP
from 8 vendors
(1
-
10)
-
SHA-3 Secure Hash Function
- Standards support
-
SHA-3 Secure Hash Function Core
- Standards Support
- Performance
- Interfaces
- Fully autonomous operation
-
SHA3 core for accelerating NIST FIPS 202 Secure Hash Algorithm
- Supports variable length SHA-3 Hash Functions
- Supports Extendable Output Functions (XOF)
- Configurable architecture for achieving the required performance and silicon area
-
Secure Hash Algorithm-3 (SHA-3)
- Support NIST FIPS 202 standard
- Pass NIST FIPS 202 test vectors
- Support four cryptographic hash functions
-
Keccak Hash Engine
- KECC-224
- KECC-256
- KECC-384
-
Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Tunability for consumer requirements
- Security (different levels, SCA, FIA)
- Modes
- Area
-
Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator
- AMBA interface
- Supported function: SHA1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Compliant with FIPS-180-4
- Tunable performance (area and performance) - From low area to high-performance
-
Secure Execution Processor
- Two cryptographically isolated secure execution contexts
- Cryptographic primitives agnostic
- Lowest overhead implementation with single Keccak (SHA3) core
-
RISC-V Secure Enclave IP
- Secure AES crypto-processor
- Secure DES / Triple DES crypto-processor
- Secure PKA public key crypto-processor
-
SHA-3 Crypto IP Core
- FIPS 202 compliant
- Supports cryptographic hashing for SHA-3 in 224/256/384/512 mode
- Extendable-Output Functions for SHAKE 128/256
- AMBA® AXI4-Stream