www.design-reuse-embedded.com
29 "Other" Solutions

1
DesignWare ARC Secure IP Subsystem
The DesignWare® ARC® Secure IP Subsystem is a complete, pre-verified, hardware and software solution that provides a programmable hardware root of trust to secure high value embedded targets.

2
DesignWare tRoot Hardware Secure Modules
DesignWare® tRoot Hardware Secure Modules (HSMs) with Root of Trust enable connected devices to securely and uniquely identify and authenticate themselves to create secure channels for remote device management and service deployment.

3
Circuit Camouflage Technology
Inside Secure Circuit Camouflage Technology, also known as SecureMedia Library (SML), is an anti-reverse engineering and anti-cloning protection for integrated circuits that has both Commercial and Government Applications.

4
Code Protection: Instilling trust into your applications
Inside Secure s Code Protection technology provides powerful automated software protection tools applicable across Mobile, IoT, Desktop and Server platforms.

5
CryptoFirewall Cores
Providing superior security and tamper resistance, while being highly-cost effective. Our cores complement existing security implementations, and are ideal for preventing counterfeiting in a broad number of applications.

6
CryptoManager Security Engine
CryptoManager Security Engine is an in-device root-of-trust offered as an embedded hardware core, or as a software agent that can be implemented as a protected element in a trusted OS or directly in the high-level device OS for the secure provisioning of keys and features throughout the device lifecycle. This provides flexible implementation options and allows the CryptoManager Infrastructure to securely communicate with the device to provision keys and manage feature configurations in the supply chain and downstream ecosystems.

7
CryptoManager Security Platform
From chip management to device personalization to downstream feature provisioning, the CryptoManager security platform creates a trusted path from the SoC manufacturing supply chain to downstream service providers with a complete silicon-to-cloud security solution.

8
CryptoManager Trusted Services Security Solutions
The Rambus CryptoManager Trusted Services support a variety of root of trust configurations via a hardware core or secure software, providing a scalable and flexible security solution. Our solutions s...

9
DPA Countermeasures
Our Cryptography Research division discovered Simple Power Analysis (SPA) and Differential Power Analysis (DPA), and developed fundamental solutions and techniques for protecting devices against DPA and related side-channel attacks, along with supporting tools, programs, and services.

10
DPA Resistant Cores
The DPA Resistant Hardware Cores prevent against the leakage of secret cryptographic key material through attacks when integrated into an SoC. These superior performance cores are easy to integrate into SoCs and FPGAs, providing robust side-channel resistance across different security and performance levels.

11
DPA Resistant Software Library
DPA Resistant Software Libraries are a portfolio of unique products that provide performance optimized, quantifiable side-channel resistant security for embedded software systems with seamless integration across a wide range of applications. Our software libraries come in two main varieties, platform neutral C-code which is designed to run on any platform and optimized code for ARM Cortex platforms, providing a wide range of device design options.

12
DPA Workstation Analysis Platform
Designed for leading security chip vendors, product companies, testing labs, and government organizations, the DPA Workstation analysis platform is the world’s premier side-channel analysis plat...

13
Payments and Tokenization
As an industry leader in tokenization solutions for online, mobile, card and account-based transactions, the family of Rambus Payment solutions provides comprehensive solutions for banks, financial institutions and retailers alike.

14
Root-of-Trust Engine
Root-of-Trust Engine, formerly known as Vault-IP,is a Silicon IP developed to protect the SoC platform and its operation so it can securely boot SoCs and protect sensitive key material and assets.

15
Flexible Key Storage based on SRAM PUF (Physically Unclonable Functions)
This is a secure key management solution that dynamically reconstructs on-chip secret keys without ever storing those keys. This means that the keys are not present on the device when it is powered off, but generated only when needed on-the-fly using device-dependent Physically Unclonable Functions (PUFs).

16
Fuzzy-ID - Device identification with silicon fingerprint
Tiny variations in a semiconductor manufacturing process make each transistor and each piece of silicon unique. These variations are random and uncontrollable making it impossible to construct an exac...

17
Integrated security-processing unit building on SRAM PUF
This is an integrated security-processing unit that serves as a root of trust in applications for mobile and IOT such as payment, content provisioning, authentication and secure cloud access.

18
PermSRAM
A versatile nonvolatile memory macro available on foundry standard CMOS platform covering process node of 180nm to 28nm and beyond.

19
Physical Unclonable Function (PUF)
The Physical Unclonable Function (PUF) is a fully integrated analog IP generating a stable number from random local process variations.

20
Secure Key Storage based on SRAM PUF (Physically Unclonable Functions)
This is a secure key management solution that dynamically reconstructs on-chip secret keys without ever storing those keys. This means that the keys are not present on the device when it is powered off, but generated only when needed on-the-fly using device-dependent Physically Unclonable Functions (PUFs).

21
TwinBit
An embedded, true logic-based non-volatile memory solution with an extremely high endurance performance of 10K (PROGRAM) cycles.

22
Cronus
Cronus is a SmartNIC PCIe card and is designed for network monitoring and security applications that require high throughput and low latency. It is a unique, hardware accelerated solution that combines network monitoring capability with Security Analytics Acceleration (SAA) and content processing.

23
Helios F1
Helios F1 is an FPGA-based Regular eXpression Processor (RXP), designed to be used as a CPU offload accelerator. The RXP runs on an Amazon FPGA Image (AFI) in an AWS EC2 F1 instance.

24
Helios RXPA
Helios RXPA is a silicon soft IP targeted for ARM® based System on Chip (SoC), smartNIC ASIC and solid state drive ASIC solutions. It is designed for high throughput low latency Deep Packet Inspection (DPI) applications that require hardware accelerated pattern matching and string matching.

25
Helios RXPF
Helios RXPF is a unique, fully scalable, hardware accelerated pattern matching solution for Security Analytics Acceleration (SAA) and content processing. The solution can be tuned for the desired combination of throughput, rule depth and complexity.

26
Hyperion
Hyperion is a PCIe Accelerator card and is designed for high throughput, low latency Deep Packet Inspection (DPI) applications that require Regular Expression (RegEx) pattern matching and string matching. It is a unique, hardware accelerated pattern matching solution for cyber Security Analytics Acceleration (SAA) and content processing.

27
True Random and Pseudorandom Number Generator Core
The true random generator core implements true random number generation. The core passes the American NIST Special Publication 800-22 and Diehard Random Tests Suites. It is compliant with FIPS 140-2 Annex C.

28
Geon Secure Execution Processor
Geon Secure Execution Processor delivers secure code execution by supporting two secure contexts. All code and data belonging to a secure context is cryptographically isolated in main memory, so even ...

29
SmartMX2-P60
The SmartMX2 P60 family follows on the proven reliability and interoperability of the preceding SmartMX family members with a further optimized feature set. It introduces our Integral Security archite...

 Back

Partner with us

Visit our new Partnership Portal for more information.

Submit your material

Submit hot news, product or article.

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2018 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted,
reposted, duplicated or otherwise used without the
express written permission of Design And Reuse.