Differential Power Analysis IP
Filter
Compare
30
IP
from 7 vendors
(1
-
10)
-
RT-650 DPA-Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140
- Secure co-processor
- Main processor agnostic
- Standard secure applications
-
RT-660-FPGA DPA-Resistant Hardware Root-of-Trust Security Processor for Govt/Aero/Defense FIPS-140
- Superior Security
- Enhanced Flexibility
- Security Models
- Cryptographic Accelerators
-
RT-660 DPA & Fault Injection Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140
- Superior Security
- Enhanced Flexibility
- Security Models
- Cryptographic Accelerators
-
Secure-IC's Securyzr™ Inline Decrypter IP Core
- XIP (eXecution In Place) of encrypted code directly from Flash. (Optional xSPI controller)
- Decryption based on AES fully compliant with NIST FIPS 197
- AMBA Master/Slave interfaces
-
AES-ECB-CBC-CFB-CTR-GCM 1 Billion Trace DPA Resistant Crypto Accelerator
- Superior performance cryptographic cores optimized for performance, area, and security applications
- Technology and node independent RTL source code design
- Synchronous design and interface allows easy integration in various SoC architectures
-
AES-ECB-CBC-CFB-CTR 1 Billion Trace DPA Resistant Crypto Accelerator
- Superior performance cryptographic cores optimized for performance, area, and security applications
- Technology and node independent RTL source code design
- Synchronous design and interface allows easy integration in various SoC architectures
-
AES-ECB 1 Billion Trace DPA Resistant Crypto Accelerator
- Superior performance cryptographic cores optimized for performance, area, and security applications
- Technology and node independent RTL source code design
- Synchronous design and interface allows easy integration in various SoC architectures
-
DPA Resistant Software Library
- Library implements a very high-security primitives for AES, ECC, RSA, and SHA
- Supported platforms: ARM Cortex-A9, ARM7TDMI, and others
- AES supports 128/192/256-bit encrypt and decrypt
- ECC supports ECDSA/ECDH for NIST prime fields (192/256/384/521)
-
Post-Quantum Cryptography IP: Crystals Kyber - Crystals Dilithium - XMSS - LMS
- 512 and/or 768 and/or 1024-bit secret key length
- Implementation protected against Side-Channel Attacks (Key Generation and Key Decapsulation operations are sensitive):
- Hybrid hardware-software tunable solution
- Tunable in performance or power/area
-
Elliptic Curve Digital Signature generation and verification
- Supports any EC over GF(p) of the simplified Weierstrass form that is commonly defined in ECC standards such as NIST, SEC2, Brainpool