SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
- SHA2 (SHA-256)
Cryptography IP cores provide hardware acceleration for secure data processing in modern SoC and ASIC designs, enabling fast and reliable encryption, decryption, and authentication.
These IP cores implement widely used algorithms such as AES, RSA, ECC, and hash functions, ensuring strong data confidentiality and integrity.
This catalog allows you to compare cryptography IP cores from leading vendors based on performance, security level, power efficiency, and process node compatibility.
Whether you are designing secure embedded systems, IoT devices, automotive platforms, or data center infrastructure, you can find the right crypto IP for your application.
SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
SHA-512/384 - Secure Hash Algorithm IP Core
KiviHash-SHA-512/384 is an IP core implementing the SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash func…
Public-Key Cryptography PKCS IP Core
The PKCS IP is specifically designed for RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 …
ECDSA (Elliptic Curve Digital Signature) IP Core
The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve.
Post-Quantum Key Encapsulation and Digital Signature IP Core
The KiviPQC-Box is an IP core that combines the algorithms ML-DSA and ML-KEM into one single package.
Post-Quantum Digital Signature IP Core
The KiviPQC-DSA is an IP core implementing the ML-DSA (Module-Lattice-based Digital Signature Algorithm) a post-quantum cryptogra…
ECC7 Elliptic Curve Processor for Prime NIST Curves
Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curve…
Post-Quantum Key Encapsulation IP Core
The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptogra…
xQlave® PQC ML-DSA (Dilithium)
The xQlave® ML-DSA (Dilithium) Digital Signature Algorithm IP core secures critical infrastructures and operations against the th…
Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environ…
Modern asymmetric cryptography algorithms such as RSA or elliptic curve cryptography over prime fields require complex mathematic…
High-Speed Elliptic Curve Cryptography Accelerator for ECDH and ECDSA
XIP4200H is an Intellectual Property (IP) core implementing Elliptic Curve Diffie Hellman (ECDH) and Elliptic Curve Digital Signa…
AES-GCM, Extreme-Speed IP Cores for AES256-GCM Authenticated Encryption
XIP1113E is a family of extreme-speed IP cores designed for AES256-GCM ( Encryption Standard with a 256-bit key and Galois Counte…
Unified Hardware IP for Post-Quantum Cryptography based on Kyber and Dilithium
Turn-key implementations of the NIST FIPS recommended CRYSTALS post-quantum for key encapsulation (KEM) and digital signature algorithm (DSA)
Pseudo Random Number Generator, high-speed version (AES256_CTR_DRBG)
XIP8103H from Xiphera is a Pseudorandom Number Generator (PRNG) Intellectual Property (IP) core.
Pseudo Random Number Generator, balanced version (AES256_CTR_DRBG)
XIP8103B from Xiphera is a Pseudorandom Number Generator (PRNG) Intellectual Property (IP) core.
SHA3 Secure Hash Algorithm IP Core (224/256/384/512)
The KiviHash-SHA-3 (secure hash algorithms) is a hardware accelerator for cryptographic hashing functions.
Ascon, A Lightweight Cryptographic Suite for AEAD and Hashing
XIP2201B from Xiphera is an Intellectual Property (IP) core for Ascon authenticated encryption with associated data (AEAD) and ha…
High-Throughput AES Core with SCA/FI Protection for Performance-Critical Systems FortifyIQ’s High-Performance AES IP core is a fa…
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core provides quantum-resistant key exchange, offering a secure solution ag…