tRoot Fx Hardware Secure Modules: Programmable Root of Trust
The tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authe…
- Root Of Trust
- Available on request
- Available
tRoot Fx Hardware Secure Modules: Programmable Root of Trust
The tRoot™ Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authe…
Securyzr™ integrated Secure Element (iSE) is Secure-IC Root of Trust solution.
Securyzr™ neo Core Platform is Secure-IC’s enhanced version of its flagship offering Securyzr™ integrated Secure Element (iSE) Se…
True Random Number Generator (TRNG) IP
High-Quality Entropy for Secure Key Generation and Cryptographic Operations The TRNG IP delivers NIST- and BSI-compliant entropy …
Fast Quantum Safe Engine for ML-KEM (CRYSTALS-Kyber) and ML-DSA (CRYSTALS-Dilithium)
The Quantum Safe Engine (QSE) IP provides Quantum Safe Cryptography acceleration for ASIC, SoC and FPGA devices.
Intrusion Detection System (IDS)
Securyzr™ IDS is an Intrusion Detection System software module, embedded in the device to protect and part of the Secure-IC threa…
Fast Quantum Safe Engine for ML-KEM (CRYSTALS-Kyber) and ML-DSA (CRYSTALS-Dilithium) with DPA
The Quantum Safe Engine (QSE) IP provides Quantum Safe Cryptography acceleration for ASIC, SoC and FPGA devices.
Integrated Security Services Platform (iSSP)
Secure-IC offers the first worldwide PQC ready Security Lifecycle Management solution.
The Arm® SecurCore® SC300 processor is designed specifically for high-performance smartcard and embedded security applications.
PUF Software Premium with key wrap and certification support
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…
The number of connected devices, machines, sensors, or things that are linked with each other over open communication networks on…
AES Encryption Core with Extreme SCA Protection for Ultra-High-Security Applications FortifyIQ’s Ultra-Secure AES IP core is desi…
Root of Trust IP is a Hardware Secure Module (HSM) solution that provides the security foundation for processors and System on Ch…
Network Security Crypto Accelerator
The Network Security Crypto Accelerator is a hardware IP core platform that accelerates cryptographic operations in System-on-Chi…
Tamper-resistant Cortex-M processor with optional software isolation using TrustZone for Armv8-M
For embedded developers seeking to hinder physical tampering and achieve a higher level of security certification, Arm offers the…
ChaCha20-Poly1305 Crypto Engine
The ChaCha20-Poly1305 Crypto Engine is RFC7539 compliant to provide Authenticated Encryption with Associated Data (AEAD) using th…
SHA-1, SHA-2, SHA-3 Hash based HMAC, accelerators
HMAC-IP-59 (EIP-59) is IP for accelerating the various single pass HMAC (FIPS-198-1) algorithms using secure hash integrity algor…
The 3DES-IP-16 (EIP-16) is IP for accelerating the AES symmetric cipher algorithm (FIPS-46/81 – SP800-IP-20), supporting single D…
Poly-IP-53 (EIP-53) is IP for accelerating the Poly1305 hash-based message authentication algorithm (RFC7539), supporting the NIS…
The ChaCha-IP-13 (EIP-13) is an IP solution for accelerating the ChaCha20 cipher algorithm (RFC7539), supporting the NIST CTR mod…