www.design-reuse-embedded.com
44 Solutions


You must be registered to the DR-Embedded website to view the descriptions, including:
  • Complete datasheets for products
  • Contact information for Suppliers

Please Login here to your account.
New user? sign up here.

1
2-port HDCP 2 on HDMI and DisplayPort Embedded Security Module
HDCP 2.2 ESMs are designed to protect HD and Ultra HD uncompressed audio-visual content and are fully compliant with the HDCP 2.2 standard for DisplayPort-based systems.

2
CLP-630: Multi-Packet Manager Security Engine
The Multi-Packet Manager is a highly programmable and unique Security Protocol Accelerator specifically designed to efficiently process data for high capacity wireless and network applications. The en...

3
CryptoManager Security Platform
From chip management to device personalization to downstream feature provisioning, the CryptoManager security platform creates a trusted path from the SoC manufacturing supply chain to downstream service providers with a complete silicon-to-cloud security solution.

4
DesignWare ARC SEM Security Processors
The DesignWare® ARC® SEM Family includes performance-efficient, ultra-low power, compact security processors that enable designers to integrate security into their SoC to protect against logical, hardware and physical attacks.

5
DesignWare tRoot Hardware Secure Modules
DesignWare® tRoot Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment.

6
Ellipsys-SB: Secure Boot
Ellipsys-SB is part of the Ellipsys Trust Framework which is Elliptic s solution to help device manufactures and system providers protect their product from tampering, cloning, and other threats. T...

7
Ensigma Security (IPSec) Protocol Processing Engine
The high performance engine can process multiple gigabits of traffic with short IP packets (40 byte). Ensigma IPSec provides DMA type of interface for programming pointers to the security association data, packet pointers.

8
Ensigma Unified Security Engine (UNISec)
The Ensigma Unified Security Processor (USecP) combines the IPSec, MACSec and DTLS engines into a single unified multi-protocol processing engine supporting eight 1Gbps ports or one 10Gbps port.

9
HDCP 2 on HDMI / DisplayPort Embedded Security Module Firmware
Embedded Security Modules (ESMs) for High-Bandwidth Digital Content Protection 2.2 (HDCP 2.2) on High-Definition Multimedia Interface (HDMI) are autonomous modules that provide designers with a complete and robust TX/RX/Rep implementation of the HDCP 2.2 content-protection technology over HDMI wired connections.

10
HDCP 2 on HDMI or DisplayPort Embedded Security Module (single port)
HDCP 2.2 Embedded Security Modules (ESMs) on DisplayPort are autonomous modules that provide designers with a complete and robust transmitter (TX) implementation of the HDCP 2.2 content-protection technology over DisplayPort wired connections.

11
Host Library for HDCP 2.2 on HDMI Embedded Security Modules
Embedded Security Modules (ESMs) for High-Bandwidth Digital Content Protection 2.2 (HDCP 2.2) on High-Definition Multimedia Interface (HDMI) are autonomous modules that provide designers with a complete and robust TX/RX/Rep implementation of the HDCP 2.2 content-protection technology over HDMI wired connections.

12
Host Library for HDCP 2.2 on HDMI/DP Embedded Security Modules
Embedded Security Modules (ESMs) for High-Bandwidth Digital Content Protection 2.2 (HDCP 2.2) on High-Definition Multimedia Interface (HDMI) are autonomous modules that provide designers with a complete and robust TX/RX/Rep implementation of the HDCP 2.2 content-protection technology over HDMI wired connections.

13
LTE Security Protocol Accelerator
The DesignWare LTE Security Protocol Accelerator targets 3G and 4G wireless broadband 3GPP/LTE technologies. The high-performance and configurable DesignWare LTE Security Protocol Accelerator can be tailored to address the complex security requirements of mobile networks, platforms and devices, while minimizing costs.

14
Receiver HDCP 2 on HDMI 2.1 Embedded Security Module
Embedded Security Modules (ESMs) for High-Bandwidth Digital Content Protection 2.2 (HDCP 2.2) on High-Definition Multimedia Interface (HDMI) are autonomous modules that provide designers with a complete and robust TX/RX/Rep implementation of the HDCP 2.2 content-protection technology over HDMI wired connections.

15
SPP-330: IPsec/TLS Multi-Protocol PDU Processor
The SPP-330 IPsec/TLS Multi-protocol PDU Processor is a member of Elliptic s highly-integrated Security Protocol Processors (SPP) family targeted at ASIC manufacturers and FPGA designers and supports ...

16
Transmitter HDCP 2 on HDMI 2.1 Embedded Security Module
Synopsys' DesignWare® Embedded Security Modules (ESMs) for High-Bandwidth Digital Content Protection 2.2 (HDCP 2.2) on High-Definition Multimedia Interface (HDMI) are autonomous modules that provide designers with a complete and robust TX/RX/Rep implementation of the HDCP 2.2 content-protection technology over HDMI wired connections.

17
DRM Fusion Agent for Embedded Development
Complete, TrustZone enabled client-side DRM software for device manufacturers, semiconductor vendors and software application providers Quickly and cost-effectively enables DRM on mobiles and co...

18
DRM Fusion Server
A complete, interoperable server-side DRM solution for download and stream protection. Designed for wireless and wireline operators and service providers, DRM Fusion Server implements and extends multiple DRM technologies such as Microsoft PlayReady and OMA DRM while providing common integration interfaces.

19
Microsoft DRM-based Solutions
A complete portfolio of client and server DRM solutions for enabling digital content protection, distribution, and monetization via Microsoft technologies Microsoft DRM technologies are widely...

20
OMA- Based DRM Solutions
A complete portfolio of OMA-compliant client and server-side DRM solutions for enabling digital content protection and monetization Open Mobile Alliance (OMA) DRM is the most widely used DRM t...

21
QuickSec Mobile VPN Client for Android
INSIDE s Mobile VPN Client for Android is a complete Mobile VPN solution that includes a fully functional reference GUI. It is a fully-featured VPN client tailored specifically for Android phones and...

22
SHA-3 hashing function
The BA418 is crypto engine IP core for SHA-3 hashing functions compliant to NISTS s FIPS 180-4 and FIPS 202 standards.

23
AES encryptor / AES decryptor - Symmetric Security Range
The family of IPX-AES IP-Cores provides an efficient FPGA implementation of the Advanced Encryption Standard (AES). Its flexibility allows the combination of several functions and operating modes for a very small FPGA footprint.

24
HMAC-SHA1 Authentication & Hashing function
IPX-HMAC-SHA-1 IP-Core is the hashing function required for the content integrity check and content identification as specified in DCI document v1.2. It is designed for Xilinx and Altera devices.

25
RSA Public Key Cryptography Exponentiation Accelerator
The modular exponentiation accelerator IPX-RSA is an efficient arithmetic coprocessor for the RSA public-key cryptosystem.

26
Advanced Encryption Standard (AES) Engine
Advanced Encryption Standard (AES) engine is a highly configurable and multipurpose encryption/decryption engine. The AES engine can be used for wide range of requirements from low gate count to high performance.

27
Cryptographic library for Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)
The Software ECC is a cryptographic library providing the main ECDSA and ECDH functionalities

28
Cryptographic Software Library
Field-proven, high performance cryptographic software library for embedded applications Discretix cryptographic library offers an optimized software-only implementation of a variety of cryptograph...

29
Dragon-QT
The Dragon-QT combines Athena s TeraFire F5200 security microprocessor with Intrinisic-ID s Quiddikey-Flex secure key management. Intrinsic-ID s patented physically unclonable function (PUF) technolog...

30
Flexible Key Storage based on SRAM PUF (Physically Unclonable Functions)
This is a secure key management solution that dynamically reconstructs on-chip secret keys without ever storing those keys. This means that the keys are not present on the device when it is powered off, but generated only when needed on-the-fly using device-dependent Physically Unclonable Functions (PUFs).

31
Fuzzy-ID - Device identification with silicon fingerprint
Tiny variations in a semiconductor manufacturing process make each transistor and each piece of silicon unique. These variations are random and uncontrollable making it impossible to construct an exac...

32
Geon Secure Execution Processor
Geon Secure Execution Processor delivers secure code execution by supporting two secure contexts. All code and data belonging to a secure context is cryptographically isolated in main memory, so even ...

33
Integrated security-processing unit building on SRAM PUF
This is an integrated security-processing unit that serves as a root of trust in applications for mobile and IOT such as payment, content provisioning, authentication and secure cloud access.

34
PermSRAM
A versatile nonvolatile memory macro available on foundry standard CMOS platform covering process node of 180nm to 28nm and beyond.

35
Quiddicard
Quiddicard is a key management and anti-counterfeiting software for remotely programming keys into ICs with Intrinsic-ID s Quiddikey-Flex secure key storage module. The PUF used by Quiddikey-Flex is a...

36
Secure 128-bit Advanced Encryption Standard (AES) coprocessor
The Secure AES Coprocessor encrypts and decrypts 128-bit data blocks by computing an AES algorithm with a 128, 192 or 256-bit key through a highly secure architecture (SPA, DPA[1] and fault hardened).

37
Secure Key Storage based on SRAM PUF (Physically Unclonable Functions)
This is a secure key management solution that dynamically reconstructs on-chip secret keys without ever storing those keys. This means that the keys are not present on the device when it is powered off, but generated only when needed on-the-fly using device-dependent Physically Unclonable Functions (PUFs).

38
TwinBit
An embedded, true logic-based non-volatile memory solution with an extremely high endurance performance of 10K (PROGRAM) cycles.

39
AES Core
The es4001 AES core implements the Advanced Encryption Standard (Rijndael Algorithm FIPS 197) encoder and decoder. The core encrypts and decrypts in blocks of 128 bits. It supports key length of 128, ...

40
ARC4 core
ES1020 core fully implements the ARC4 stream ciphering algorithm in hardware. For each input character, an output character is nerated. ES1020 ARC4 core allows simultaneous encryption/decryption of mu...

 Previous Page | 1 | 2 | Next Page   Back

Partner with us

Visit our new Partnership Portal for more information.

Submit your material

Submit hot news, product or article.

List your Products

Suppliers, list and add your products for free.

© 2016 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted,
reposted, duplicated or otherwise used without the
express written permission of Design And Reuse.