Security Hash, SM3 Hash and HMAC Engine
The hash processor is a fully compliant implementation of the secure hash algorithm (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512), …
- Hash / MAC
Security Hash, SM3 Hash and HMAC Engine
The hash processor is a fully compliant implementation of the secure hash algorithm (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512), …
Hash and HMAC Functions Accelerator
The DSHA2-384 - a universal solution that accelerates SHA2-384 hash with HMAC mode.
SHA IP Core with native SHA2-256 HMAC support
The DSHA2-256 is a universal solution which efficiently accelerates SHA2-256 hash function compliant with FIPS PUB 180-4.
SHA-1, SHA-2, SHA-3 Hash based HMAC, accelerators
HMAC-IP-59 (EIP-59) is IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algor…
HMAC-SHA256 Secure Core - Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection
Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection FortifyIQ’s SHA-2/HMAC IP core delivers high-speed, ha…
HKDF/HMAC/SHA-512, SHA-512 IP Core with Extended Functionalities
XIP3324B is a versatile Intellectual Property (IP) core designed for SHA-512 cryptographic hash function with extended support fo…
HKDF/HMAC/SHA-384, SHA-384 IP Core with Extended Functionalities
XIP3323B is a versatile Intellectual Property (IP) core designed for SHA-384 cryptographic hash function with extended support fo…
HKDF/HMAC/SHA-256/SHA-512, SHA-256 IP Core with Extended Functionalities
XIP3327Cis a versatile Intellectual Property (IP) core designed for SHA-256 and SHA-512 cryptographic hash functions with extende…
HKDF/HMAC/SHA-256, SHA-256 IP Core with Extended Functionalities
XIP3322B is a versatile Intellectual Property (IP) core designed for SHA-256 cryptographic hash function with extended support fo…
Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
The RT-64x Embedded Hardware Security Module (Root of Trust) family are fully programmable, ISO 26262 ASIL-B hardware security co…
Programmable Root of Trust With DPA and FIA for US Defense
The Rambus Root of Trust RT-1660 is a fully programmable, FIPS 140-3 compliant root-of-security core offering security by design …
Secure Hash Algorithm 256 IP Core
A universal solution that effectively accelerates the SHA2-256 hash function conforming with FIPS PUB 180-4 is the SHA2-256 bridg…
Secure Hash Algorithm 512 IP Core
A universal solution that effectively accelerates the SHA2-512 hash function complying with FIPS PUB 180-4 is the SHA2-512 bridge…
Secure Hash Algorithm 384 IP Core
Bridge to APB, AHB, and AXI bus SHA2-384 is a universal solution that effectively speeds up the SHA2-384 hash function that compl…
HMAC-SHA256 cryptographic accelerator
The HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes.
Programmable Root of Trust Family With DPA & Quantum Safe Cryptography
The RT-65x Root of Trust IP are fully programmable, FIPS 140-3 compliant hardware security anti-tamper cores offering security by…
The Hash Crypto Engine is flexible and optimized hash IP core compliant with FIPS 180-3 (HASH functions), FIPS 198 (HMAC function…
The Helion Fast Hash core family implements the NIST approved SHA-1, SHA-256, SHA-384 and SHA-512 secure hash algorithms to FIPS …
The Helion Tiny Hash Core family for ASIC offers a combination of high functionality and low resource usage for lower data rate a…
Standalone stateful hash-based signatures software library
The SHSlib is a standalone stateful hash-based signatures software library, which provides signature verification for stateful ha…