cryptography IP
Filter
Compare
121
IP
from 29 vendors
(1
-
10)
-
Cryptography Software Library
- Symmetric Ciphers
- Hashes
- RSA®
- ECC Prime Curves
- ECC Binary Curves
- Certificates (X.509 v3)
-
Secure-IC's Securyzr Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
- Scalable architecture and crypto engines for optimal performance/resource usage
- Configurable for perfect application fit
- 100% CPU offload with low latency and high throughput
- DPA countermeasures Full software/driver support
-
Elliptic Curve Cryptography IP
- Supported algorithms:
- Point multiplication
- ECDSA signature generation
- ECDSA signature verification
-
Post-Quantum Cryptography Processor
- PQPlatform-CoPro (PQP-HW-COP) adds PQShield’s state-of-the-art post-quantum cryptography (PQC) to your security sub-system, with optional side-channel countermeasures (SCA).
- PQPlatform-CoPro can be optimized for minimum area as part of an existing security sub-system.
- PQPlatform-CoPro is designed to be run by an existing CPU in your security system, using PQShield’s supplied firmware.
-
high-performance solution for elliptic curve cryptography
- Supported algorithms:
- Supported Elliptic Curves
- Optional Side Channel Attacks countermeasures
- Input/Output EC point verification
-
Post-Quantum Cryptography IP: Crystals Kyber - Crystals Dilithium - XMSS - LMS
- 512 and/or 768 and/or 1024-bit secret key length
- Implementation protected against Side-Channel Attacks (Key Generation and Key Decapsulation operations are sensitive):
- Hybrid hardware-software tunable solution
- Tunable in performance or power/area
-
Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Tunability for consumer requirements
- Security (different levels, SCA, FIA)
- Modes
- Area
-
Asymmetric Public Key Cryptography IP
- Constant time of the basic arithmetic unit: protection against timing attacks.
- Regular modular exponentiation (RSA): protection against SPA.
- Regular ECSM: protection against SPA.
- Protection against CPA and collision attacks.
- Protection against Address-bit CPA.
- Protection against fault attacks.
-
RSA public key cryptography with APB interface
- For a typical 1024-bit keysize the modular exponentiation can be performed 25 times faster than a pure software implementation. A 1024-bit message can be encrypted (public key of 65537) in 50,000 clock cycles and decrypted in 3,600,000 clock cycles. The peripheral can also be used with software support for CRT based decryption and for generating keys. Using CRT can reduce the cycle count by 1/4.
- The core is very small; when targeting TSMC90LP at 200MHz it comprises only 17k gates for the logic and an equivalent 32k gates including all memories.
-
Elliptic Curve Cryptography (ECC) core with AMBA APB interface
- AMBA interface for ECC core
- AMBA APB slave interface
- No block RAM needed
- Low area consumption