www.design-reuse-embedded.com
Search Solutions  
OK
20 "IoT Security" IP

1
Content Protection (HDCP) 2.2/2.3 embedded security modules (ESMs) for HDMI, DisplayPort, and USB 3.x Type-C interfaces

Synopsys offers highly integrated and proven security solutions spanning silicon cores to embedded software to help content owners, service providers, network operators, embedded system OEMs and So...


2
Cryptography IP solutions, Public Key Accelerators (PKAs) and True Random Number Generators (TRNGs)

Synopsys offers a broad portfolio of silicon-proven DesignWare® Cryptography IP solutions that includes symmetric and hash cryptographic engines, Public Key Accelerators (PKAs) and True Random ...


3
CryptoManager IoT Device Management
The CryptoManager IoT Device Management is a turnkey security service that provides IoT OEMs and service providers an easy to use security solution from device-to-cloud.

4
eSecure module for SoC security for IoT
Secure Boot | Firmware update in the field | Secure key storage | Cryptography algorithms off-loading

5
IPsec Engine
On OSI layer 3 (network layer), IPsec is the transport security protocol of choice. The BA454 is a very scalable engine implementing the IPsec standard for high throughput applications.

6
Mbed TLS
Arm Mbed TLS makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal code footprint. It offers an SSL library with an intuitive API and readable source code, and includes an elaborate test suite. You can build it out of the box on most systems, or manually select and configure features.

7
Provisioning Platform
Inside Secure Provisioning Platform allows production line certificate generation and tracking to ensure the integrity of the manufacturing and licensing process.

8
PSA Certified
PSA Certified offers a framework for securing connected devices, from analysis through to security assessment and certification. The framework provides standardized resources to help resolve the growi...

9
RT-130 State-Machine-based Root of Trust for IoT, IoT servers, gateways, edge devices
Rambus Hardware Root of Trust RT-130 is a state-machine-based hardware security core offering security by design. It protects against a wide range of attacks through state-of-the-art anti-tamper and s...

10
RT-131 State-Machine-based Root of Trust for IoT, IoT servers, gateways, edge devices for China market
Rambus Hardware Root of Trust RT-131 is a state-machine-based hardware security core offering security by design. It protects against a wide range of attacks through state-of-the-art anti-tamper and s...

11
RT-140 State-Machine-based Root of Trust for IoT, IIoT and cloud-connected devices, sensors, gateways
Rambus Hardware Root of Trust RT-140 is a state-machine-based hardware security core offering security by design. It protects against a wide range of attacks through state-of-the-art anti-tamper and s...

12
RT-260 State-Machine-based Root of Trust for IoT, IIoT and cloud-connected devices, sensors, gateways
Rambus Hardware Root of Trust RT-260 is a state-machine-based hardware security core offering security by design. It protects against a wide range of attacks through state-of-the-art anti-tamper and s...

13
Secure True Random Number Generators for IoT
True Random Number Generators (TRNGs) are typically deployed in semiconductors for secure data communications, secure electronic transactions, and secure data storage.

14
Security Protocol Accelerators provide increased performance, ease-of-use, and advanced security features

Synopsys offers two Security Protocol Accelerator (SPAcc) IP products:

- DesignWare® Multipurpose Security Protocol Accelerator (Multipurpose SPAcc)

- DesignWare LTE Security Prot...


15
tRoot Hardware Secure Modules (HSMs)

The DesignWare tRoot Hardware Secure Modules (HSMs) offer silicon-proven, self-contained security solutions with Root of Trust for a wide range of applications, including IoT, industrial control, n...


16
NeoPUF - an ideal security solution for IoT
NeoPUF technology stands out for its features of ideal randomness and an entropy pool of random bits up to 1024 kbits. In addition, the security functions are statistically-tested robust and reliable, unaffected by external influences including temperature and voltage. NeoPUF can be implemented in logic compatible process and does not require additional masks or process adaption. This specialty IP enables upgraded security due to the intrinsic randomness and self-encrypted feature.

17
Cryptographic IP Cores for IoT
The Intrinsix Cryptographic Subsystem IP Cores for IoT provide a complete security solution for your IoT ASICs and SOCs.

18
Robust Embedded Security Solutions for Industrial Applications
One of the most critical requirements for industrial IoT applications is to provide security for devices that must be controlled remotely.

19
Zign 200 - Software implementation of SRAM PUF with symmetric cryptography
The number of devices, machines, or sensors linked over open communication networks on the internet of things (IoT) has exploded. Every device represents a potential entry point for malicious intrusio...

20
Zign 300 - Software implementation of SRAM PUF with symmetric & asymmetric cryptography + PKI
Root-of-trust (RoT) technology is becoming a requirement for securing connected devices, their data, and, by extension, the entire infrastructure with which they communicate. But, RoT technology shoul...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.