The patented PUF design generates a unique identity based on quantum tunnelling current variations through the gate terminal in a…
- GlobalFoundries
- 55nm
- Silicon Proven
Key management IP cores provide secure generation, storage, distribution, and lifecycle management of cryptographic keys in modern SoC and ASIC designs.
These IP cores are critical for implementing hardware-based security, enabling features such as secure boot, encryption, authentication, and device identity protection.
This catalog allows you to compare key management IP cores from leading vendors based on security level, key storage mechanisms, performance, and process node compatibility.
Whether you are designing IoT devices, automotive systems, mobile platforms, or secure infrastructure, you can find the right key management IP to protect sensitive data.
The patented PUF design generates a unique identity based on quantum tunnelling current variations through the gate terminal in a…
Secure Storage Solution for OTP IP
The Synopsys Secure Storage Solution for OTP is an add-on to Synopsys One-Time Programmable (OTP) Non-Volatile Memory (NVM) IP.
Small footprint trusted identity Generate unclonable 128 or 256-bit seeds with a compact, logic-based PUF that drops into any SoC.
DOME - Device Ownership Management and Enrollment
Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securel…
PUF FPGA-Xilinx Premium with key wrap
FPGAs are widely used in mission-critical environments with specific processing needs.
ASIL-B Ready PUF Hardware Premium with key wrap and certification support
Anything that is connected to the internet is at risk, and connected vehicles are no exception.
ASIL-B Ready PUF Hardware Base
Anything that is connected to the internet is at risk, and connected vehicles are no exception.
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…
PUF Hardware Premium with key wrap and certification support
Device identities and cryptographic root keys are at the foundation of every security system.
Device identities and cryptographic root keys are at the foundation of every security system.
FPGAs are widely used in mission-critical environments with specific processing needs.
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…
Background: Attacks on electronic devices and systems such as IOT endpoints, computers, medical devices and infrastructure are on…