SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
- SHA2 (SHA-256)
Cryptography IP cores provide hardware acceleration for secure data processing in modern SoC and ASIC designs, enabling fast and reliable encryption, decryption, and authentication.
These IP cores implement widely used algorithms such as AES, RSA, ECC, and hash functions, ensuring strong data confidentiality and integrity.
This catalog allows you to compare cryptography IP cores from leading vendors based on performance, security level, power efficiency, and process node compatibility.
Whether you are designing secure embedded systems, IoT devices, automotive platforms, or data center infrastructure, you can find the right crypto IP for your application.
SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
SHA-512/384 - Secure Hash Algorithm IP Core
KiviHash-SHA-512/384 is an IP core implementing the SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash func…
ECDSA (Elliptic Curve Digital Signature) IP Core
The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve.
SHA3 Secure Hash Algorithm IP Core (224/256/384/512)
The KiviHash-SHA-3 (secure hash algorithms) is a hardware accelerator for cryptographic hashing functions.
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, …
EdDSA Curve25519 signature generation engine
EdDSA IP Core — When Safety and Security Meet the Best Size/Performance Ratio The EdDSA Curve25519 extension adds hardware suppor…
ECC Secure Accelerator - High-performance ECC IP with advanced physical security
High-performance ECC IP with physical security In performance-sensitive systems where speed and responsiveness are critical, but …
Public-Key Cryptography PKCS IP Core
The PKCS IP is specifically designed for RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 …
Post-Quantum Key Encapsulation and Digital Signature IP Core
The KiviPQC-Box is an IP core that combines the algorithms ML-DSA and ML-KEM into one single package.
Post-Quantum Digital Signature IP Core
The KiviPQC-DSA is an IP core implementing the ML-DSA (Module-Lattice-based Digital Signature Algorithm) a post-quantum cryptogra…
Post-Quantum Key Encapsulation IP Core
The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptogra…
High-Throughput AES Core with SCA/FI Protection for Performance-Critical Systems FortifyIQ’s High-Performance AES IP core is a fa…
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core provides quantum-resistant key exchange, offering a secure solution ag…
100% Secure Cryptographic System for RSA, Diffie-Hellman and ECC with AMBA AHB, AXI4 and APB
CryptOne is a fully scalable, hardware-accelerated cryptographic system built on 20+ years of DCD-SEMI’s engineering experience.
The SM4 IP core implements a custom hardware accelerator for the SM4 symmetric block cipher, specified in Chinese national standa…
Advanced Encryption Standard (AES) core
AES is one of the latest crypto standards certificated by the National Institute of Standard and Technology (NIST).
ECC7 Elliptic Curve Processor for Prime NIST Curves
Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curve…
xQlave® PQC ML-DSA (Dilithium)
The xQlave® ML-DSA (Dilithium) Digital Signature Algorithm IP core secures critical infrastructures and operations against the th…
Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environ…
Modern asymmetric cryptography algorithms such as RSA or elliptic curve cryptography over prime fields require complex mathematic…