crypto IP

Filter
Filter

Login required.

Sign in

Login required.

Sign in

Login required.

Sign in

Compare 380 IP from 65 vendors (1 - 10)
  • CPU IP Following the RVA23 Profile, supporting RVV1.0 and all extensions of Vector Crypto
    • Dubhe-83 CPU IP features a 10+ stage pipeline, 3-issue, and out-of-order pipeline, follows the RVA23 Profile, supports RV64GCBVH, supports RVV1.0 and supports all extensions of Vector Crypto.
    • With a score of 8.5 SPECInt2006/GHz, Dubhe-83 targets applications that require highly energy-efficient computation, including mobile, desktop, AI, and automotive.
    Block Diagram -- CPU IP Following the RVA23 Profile, supporting RVV1.0 and all extensions of Vector Crypto
  • Digital PUF IP
    • Generate unclonable 128 or 256-bit seeds with a compact, logic-based PUF that drops into any SoC.
    • Digital PUF IP adds true hardware identity for secure boot, key generation, and device authentication with minimal silicon overhead.
  • NIST’s ASCON Lightweight Crypto Algorithm Accelerator
    • The ASCON-IP-41 is an efficient implementation of NIST’s lightweight crypto algorithm family ASCON. ASCON is a single algorithm defined in different modes to support AEAD and HASH operations.
    • As a multi-purpose algorithm with minimal area requirements ASCON is extremely suitable for low-cost and low-power applications.
  • Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
    • The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA or ASIC.
    • Symmetric operations are offloaded very efficiently as it has a built-in scatter/gather DMA. The coprocessors can be used to accelerate/offload IPsec, VPN, TLS/SSL, disk encryption, or any custom application requiring cryptography algorithms.
    Block Diagram -- Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
  • Post Quantum ready Public Key Crypto HW acceleration library optimized for networking applications
    •  ML-KEM KeyGen, Encaps, Decaps operations for all security modes in FIPS 203;
    •  ML-DSA Keygen, Sign, Verify operations for all security modes in FIPS 204;
    •  ECDSA Sign/Verify operations for all NIST prime field curves;
    •  ECC public key generation for all NIST prime field standardized curves;
    •  SHA3/SHAKE operations specified in FIPS 202;
  • TLS 1.3 Compliant Crypto Coprocessor
    • NIST CAVP certified and OSCCA standard compliant crypto engine suite
    • Includes private/public key ciphers, message authentication code, hashes, and key derivation
    • Key wrapping function for the secure export of keys
    • Public-key coprocessor for digital signatures and key agreements over elliptic/Edward curves
    Block Diagram -- TLS 1.3 Compliant Crypto Coprocessor
  • nQrux™ Crypto Module
    • Compatible with applicable NIST, IETF, and IEEE standards, RFCs, and test vectors for compliance and certification programs
    Block Diagram -- nQrux™ Crypto Module
  • SHA-3 Crypto IP Core
    • FIPS 202 compliant
    • Supports cryptographic hashing for SHA-3 in 224/256/384/512 mode
    • Extendable-Output Functions for SHAKE 128/256
    • AMBA® AXI4-Stream 
    Block Diagram -- SHA-3 Crypto IP Core
  • Network Security Crypto Accelerator
    • Scalable architecture & crypto engines for optimal performance/resource usage
    • Configurable for perfect application fit
    • 100% CPU offload with low latency and high throughput
    Block Diagram -- Network Security Crypto Accelerator
  • SM4-GCM Multi-Booster crypto engine
    • ASIC & FPGA
    • High throughput
    • Guaranteed performance with small packets
    Block Diagram -- SM4-GCM Multi-Booster crypto engine
×
Semiconductor IP