SHA-3 Secure Hash Function IP
Filter
Compare
10
IP
from 6 vendors
(1
-
10)
-
SHA-3 Secure Hash Function Core
- Standards Support
- Performance
- Interfaces
- Fully autonomous operation
-
SHA-3 Secure Hash Function
- Standards support
-
Secure Hash Algorithm-3 (SHA-3)
- Support NIST FIPS 202 standard
- Pass NIST FIPS 202 test vectors
- Support four cryptographic hash functions
-
Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator
- AMBA interface
- Supported function: SHA1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Compliant with FIPS-180-4
- Tunable performance (area and performance) - From low area to high-performance
-
SHA-3 Crypto IP Core
- Area efficient
- High throughput
- Compliant to NIST’s FIPS 202 standard
-
Secure Execution Processor
- Built-in protection of code and data in a 32-bit compact, low-power, royalty-free, processor IP core.
-
SHA3 core for accelerating NIST FIPS 202 Secure Hash Algorithm
- Supports variable length SHA-3 Hash Functions
- Supports Extendable Output Functions (XOF)
- Configurable architecture for achieving the required performance and silicon area
-
Secure Execution Processor
- Two cryptographically isolated secure execution contexts
- Cryptographic primitives agnostic
- Lowest overhead implementation with single Keccak (SHA3) core
-
Secure-IC's Securyzr™ HMAC compatible with Securyzr™ hardware Hash accelerators with SCA protections
- AMBA interface
- Compliant with all hash functions: SHA1, SHA2, SHA3, SM3
- Compliant with FIPS-198-1
-
Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Tunability for consumer requirements
- Security (different levels, SCA, FIA)
- Modes
- Area