Ultra High-Performance AES-GCM/CTR IP
The proliferation and expansion of connected devices, connectivity infrastructure, cloud computing, and artificial intelligence i…
- Symmetric Crypto
- Available on request
- Available
Ultra High-Performance AES-GCM/CTR IP
The proliferation and expansion of connected devices, connectivity infrastructure, cloud computing, and artificial intelligence i…
Single instance HW Lattice PQC ultra accelerator
Single instance HW Lattice PQC ultra accelerator as an AXI subordinate PQPerform-Flare is a hardware-based FIPS 140-3 CAVP-certif…
PKC Multi Hardware Accelerator IP
The PKC Multi hardware accelerator is a secure connection engine that can be used to offload the compute intensive Public Key ope…
HMAC-SHA256 Secure Core - Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection
Hardware Accelerator for SHA-2 and HMAC with Low Latency SCA/FI Protection FortifyIQ’s SHA-2/HMAC IP core delivers high-speed, ha…
The eSi-POLY1305 core is an easy to use POLY1305 accelerator peripheral that is fully compliant with the RFC7539 IETF standard.
Combined ChaCha20 and Poly1305 core
The eSi-CHACHA20-POLY1305 core is an easy to use APB hardware accelerator peripheral that is fully compliant with the IETF RFC753…
The eSi-CHACHA20 core is an easy to use CHACHA20 stream cipher hardware accelerator that is compliant with the IETF RFC7539 stand…
In-line Multi-Protocol Cipher Engine
The EIP-96 is an Inline Cryptographic Accelerator designed to accelerate and offload the very CPU intensive IPsec, MACsec, SRTP, …
Multi-Protocol Engine, Look-Aside, 1 Gbps
The Protocol-IP-93 Multi-Protocol Engine is a protocol-aware packet engine for accelerating IPSec, SSL/TLS, and SRTP up to 1 Gbps…
nQrux™ Confidential Computing Engine (CCE)
nQrux™ Confidential Computing Engine (CCE) offers customisable solutions protecting data, code execution, and AI (Artificial Inte…
HMAC-SHA256 cryptographic accelerator
The HMAC-SHA256 cryptographic accelerator function is used to securely generate and verify message authentication codes.
High-Speed Elliptic Curve Cryptography Accelerator for ECDH and ECDSA
XIP4200H is an Intellectual Property (IP) core implementing Elliptic Curve Diffie Hellman (ECDH) and Elliptic Curve Digital Signa…
Multipurpose Security Protocol Accelerator
Complex system-on-chip (SoC) requirements can include security at the MAC layer, VPN layer, and application layer.
Network Security Crypto Accelerator
The Network Security Crypto Accelerator is a hardware IP core platform that accelerates cryptographic operations in System-on-Chi…
Unified Hardware IP for Post-Quantum Cryptography based on Kyber and Dilithium
PQSecure™-CRYSTALS from PQSecure Technologies, LLC.
Filtering with packet payload scanning Message filters are placed in the middle of a TCP / TLS session to scan application data, …
Secure protocol communication by hardware Our SSL/TLS engine accelerates and offloads processing for encryption / decryption and …
SHA3 Secure Hash Algorithm IP Core (224/256/384/512)
The KiviHash-SHA-3 (secure hash algorithms) is a hardware accelerator for cryptographic hashing functions.
Crypto Coprocessor with integrated Post-Quantum Cryptography IPs
The Crypto Coprocessors are a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environ…