SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
- SHA2 (SHA-256)
Security IP cores provide essential hardware-based protection for modern SoC and ASIC designs, ensuring data confidentiality, system integrity, and secure device operation.
These IP cores implement critical security functions such as encryption, authentication, secure boot, key management, and true random number generation.
This catalog allows you to explore and compare security IP cores from leading vendors based on security features, performance, certification support, and process node compatibility.
Whether you are designing IoT devices, automotive systems, mobile platforms, or data center infrastructure, you can identify the right security IP to protect your system.
SHA-256 Secure Hash Algorithm IP Core
KiviHash-SHA-256 is an IP core implementing the SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIP…
SHA-512/384 - Secure Hash Algorithm IP Core
KiviHash-SHA-512/384 is an IP core implementing the SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash func…
ECDSA (Elliptic Curve Digital Signature) IP Core
The ECDSA IP is specifically designed for elliptic curve cryptography (ECC) using the ANSI X9.63 secp256k1 Koblitz curve.
SHA3 Secure Hash Algorithm IP Core (224/256/384/512)
The KiviHash-SHA-3 (secure hash algorithms) is a hardware accelerator for cryptographic hashing functions.
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, …
MACsec Protocol Engine for 1G/10G+ Ethernet
The MAC-SEC-MG IP core implements a compact and configurable custom-hardware protocol engine for the IEEE 802.1AE (MACsec) standa…
EdDSA Curve25519 signature generation engine
EdDSA IP Core — When Safety and Security Meet the Best Size/Performance Ratio The EdDSA Curve25519 extension adds hardware suppor…
ECC Secure Accelerator - High-performance ECC IP with advanced physical security
High-performance ECC IP with physical security In performance-sensitive systems where speed and responsiveness are critical, but …
ASIL B Compliant MIPI CSI-2 CSE2 Security Module
MIPI CSI‑2 is a widely adopted high‑speed interface for transmitting still and video data from image sensors to processors across…
Public-Key Cryptography PKCS IP Core
The PKCS IP is specifically designed for RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5 …
Post-Quantum Key Encapsulation and Digital Signature IP Core
The KiviPQC-Box is an IP core that combines the algorithms ML-DSA and ML-KEM into one single package.
Post-Quantum Digital Signature IP Core
The KiviPQC-DSA is an IP core implementing the ML-DSA (Module-Lattice-based Digital Signature Algorithm) a post-quantum cryptogra…
Post-Quantum Key Encapsulation IP Core
The KiviPQC-KEM is an IP core implementing the ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) a post-quantum cryptogra…
High-Throughput AES Core with SCA/FI Protection for Performance-Critical Systems FortifyIQ’s High-Performance AES IP core is a fa…
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core
xQlave® ML-KEM (Kyber) Key Encapsulation Mechanism IP core provides quantum-resistant key exchange, offering a secure solution ag…
100% Secure Cryptographic System for RSA, Diffie-Hellman and ECC with AMBA AHB, AXI4 and APB
CryptOne is a fully scalable, hardware-accelerated cryptographic system built on 20+ years of DCD-SEMI’s engineering experience.
The SM4 IP core implements a custom hardware accelerator for the SM4 symmetric block cipher, specified in Chinese national standa…
Advanced Encryption Standard (AES) core
AES is one of the latest crypto standards certificated by the National Institute of Standard and Technology (NIST).
MIPI CSI-2 CSE2 Security Module
MIPI CSI‑2 is a widely adopted high‑speed interface for transmitting still and video data from image sensors to processors across…
ECC7 Elliptic Curve Processor for Prime NIST Curves
Elliptic Curve Cryptography (ECC) is a public-key cryptographic technology that uses the mathematics of so called “elliptic curve…