www.design-reuse-embedded.com
   With presence and customers across 5 continents, Secure-IC is the rising leader and the only global provider of end-to-end cybersecurity solutions for embedded systems and connected objects. Driven by a unique approach called PESC (Protect, Evaluate, Service & Certify), Secure-IC positions itself as a partner to support its clients throughout and beyond the IC design process. Relying on innovation and research activities, Secure-IC provides Silicon-proven and cutting-edge protection technologies, integrated Secure Elements and security evaluation platforms to reach compliance with the highest level of certification for different markets (such as automotive, AIoT, defense, payments & transactions, memory & storage, server & cloud). More information on https://www.secure-ic.com   
55 SoCs

1
AI IP for Cybersecurity monitoring - Smart Monitor
In cryptography, an attack can be performed by injecting one or several faults into a device, thus, disrupting its functional behavior. Commonly used techniques to inject faults consists of introducin...

2
integrated Secure Element (iSE) for automotive - Hardware Security Module HSM - Security Enclave - Security Subsystem
As part of Secure-IC s iSSP (integrated Security Service Platform), Secure-IC is able to provide integrated Secure Elements (iSE) that can act as trust anchors that protect the security assets of a de...

3
eSecure module for SoC security for IoT
Secure Boot | Firmware update in the field | Secure key storage | Cryptography algorithms off-loading

4
IPsec Engine
On OSI layer 3 (network layer), IPsec is the transport security protocol of choice. The BA454 is a very scalable engine implementing the IPsec standard for high throughput applications.

5
Colibri Video Codec - The future of AV over IP distribution

NEW VIDEO CODEC THAT WILL SHAPE THE FUTURE OF AV OVER IP DISTRIBUTION OVER 1GbE!

The Professional Audio/Video market moves rapidly to IP. The majority of the codecs developed for the ProAV i...


6
lightweight video compression codec
The VC-2 LD (Low Delay) codec is a lightweight video compression IP core with ultra-low latency,for ASIC/FPGA ready for UHD and 4K transport

7
VC-2 High Quality Codec
The VC-2 HQ (High Quality) codec is a lightweight video compression IP core with ultra-low latency.

8
Video Codec IP using RAW input (CFA)
The video IP cores using CFA (Bayer, Quad-Bayer) produces visually lossless video quality. The algorithm adds minimal latency to the system while it offers super-resolution.

9
Viper - OEM Board for 4K HDMI transport over IP
These boards are fully integrated boards that enable the development of ultra-low latency audio/video over IP products. The transmit and receive boards are productionready and reduce the cost of the system.

10
Security Enclave IP based on RISC-V
The eSecure IP is a single subsystem for RISC-V based SoC to address key security challenges, playing the role of root-of-trust. The module is highly flexible and fits all applications of the heteroge...

11
AES-GCM Ultra-Low Latency
The AES-GCM Ultra-low latency crypto engine is targeted for CXL link encryption with an implementation of the AES-GCM algorithm compliant with the NIST SP 800-38D standard. The unique architecture ena...

12
ARIA Crypto Engine
The ARIA crypto engine includes a generic implementation of the ARIA algorithm which is the block cipher standard of South Korea.

13
BA452 secure connection IP core
The BA452 is a secure connection engine that can be used to off-load the compute intensive Public Key operations.

14
Blockchain Hardware Accelerator
Our solution is a secure public key infrastructure engine that can be used to offload compute-intensive public key operations such as signature generations and verifications.

15
Chacha20-Poly1305 HP
Chacha20-Poly1305 high performance IP core for authenticated encryption.

16
Crypto Coprocessor
The Cryptographic Coprocessor (or CryptoSoc Accelerator) is a hardware IP core platform that accelerates cryptographic operations in System-on-Chip (SoC) environment on FPGA (Intel SoC, Xilinx Zynq) and ASIC.

17
High-performance AES-GCM accelerator - optional SCA protection
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. Galois Counter Mod...

18
High-performance AES-XTS accelerator - optional SCA protection
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. It is included in ...

19
Memory (SRAM, DDR, NVM) encryption solution
Memory protection against reverse engineering and tampering Protecting raw memory content from malevolent access Memory protection from the beginning it is written Available with zero latency or high...

20
Post-Quantum Cryptography IP
Secure-IC has several IP products relative to Post-Quantum Cryptography - Securyzr integrated Secure Elements (iSE) supports a dual boot based on classical cryptography and on post-quantum cryptogra...

21
SHA-3 hashing function
The BA418 is crypto engine IP core for SHA-3 hashing functions compliant to NISTS s FIPS 180-4 and FIPS 202 standards.

22
SM4 Crypto Engine
The SM4 crypto engine includes a generic & scalable implementation of the SM4 algorithm which is the block cipher standard of China.

23
SM4-GCM Multi-Booster
The SM4-GCM Multi-Booster crypto engine is a scalable implementation of the SM4-GCM algorithm compliant with the standard GBT.32907-2016

24
Tunable AES (ECB, CBC, CTR, XTS, CCM, GCM) accelerator - optional SCA protection
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. It is included in ...

25
Tunable Cryptography
Secure-IC offers a broad range of Cryptography technologies with a Tri-Dimensional trade-off of speed vs area vs security to cover customers needs, from Symmetric Cryptography to Asymmetric Cryptogra...

26
Tunable DES - Triple DES (ECB, CBC, CTR) accelerator - optional SCA protection
The Data Encryption Standard (DES) is defined in FIPS PUB 46-3 as a symmetric-key algorithm. The triple DES (TDES) is block cipher that applies the DES algorithm three times to each data block. The TD...

27
Tunable Hash (SHA1-SHA2) accelerator
The Secure Hash Algorithm (SHA) is a family of cryptographic hash function. This family includes SHA-0, SHA-1, SHA-2 and SHA-3. The SHA IP is focused on SHA-1 and SHA-2 algorithms. Although this algor...

28
Tunable Hash (SHA3) accelerator
In the beginning of the 2000s, strong progress has been made on hacking NIST standard hash functions, which led to break of the SHA-1 algorithm. This achievement had a lot of consequences on the other...

29
Tunable HMAC accelerator - compliant with all hash functions (SHA1, SHA2, SM3, SHA3) - optional SCA protection
The HMAC hardware module allows performing NIST HMAC algorithms as standardized in the FIPS 198-1. The module is coupled with one of the NIST standard secure hash algorithm, SHA-1, SHA-256, SHA-384, S...

30
Tunable Public Key Cryptographic (RSA, ECDSA, SM2, Diffie-Hellman) accelerator - optional SCA protection
RSA is a public-key cryptosystem (the encryption key is public when the decryption key is private) widely used for secure data transmission. This IP provides comprehensive RSA encryption / decryption...

31
Tunable SM3 accelerator
The SM3 hash algorithm is a cryptographic hash function designed by the Chinese Commercial Cryptography Administration Office (CCCAO) in order to propose new standard for digital signature generation....

32
Tunable SM4 (ECB, CBC, CTR, XTS, CCM, GCM) accelerator - optional SCA protection
SM4 is a standardized block cipher used in the Chinese National Standard for Wireless LAN WAPI (Wired Authentication and Privacy Infrastructure).

33
Tunable True Random Number Generator compliant with NIST SP800-90 - Digital TRNG
Random number generation is a keystone in security. Secure-IC offers both True Random Number Generator (TRNG) resilient to harmonic injection for statistically independent sets of bits generation and...

34
Network Security Crypto Accelerator
To answer the needs of high-performance systems, a new generation of powerful processors is being designed and deployed. These multi-core SoCs contain dedicated hardware accelerators that offload chal...

35
Silex Insight BA451 MACsec Engine
The BA451 is a very scalable engine implementing the MACsec standard for high throughput applications.

36
Fully Digital Physically Unclonable Function (PUF)
In cryptography, a key is used by ciphers to transform a plaintext into cipher text or cipher text into plaintext. The key is a sensitive information, therefore it must be generated by a true random s...

37
Active mesh against tampering attacks - Active Shield
Attacks against digital circuits can be performed by directly tampering with the device s internal structure. These attacks are intrusive, and regroup attempts to directly probe or force signals, remo...

38
Anti Row-Hammer / Memory Attacks
The Anti Row-Hammer IP takes part in Memory Controller in order to protect the Memory against Rowhammer Attacks, especially on RAM. This IP is able to determine if the number of access requests to a M...

39
BA470 - Security Enclave IP based on RISC-V
The eSecure IP is a single subsystem for RISC-V based SoC to address key security challenges, playing the role of root-of-trust.

40
Boot Protection Pack / Root-of-Trust
The Boot Protection Pack is a solution provided by Secure-IC to ensure a Secure Boot function. The Boot Protection Pack provides a secure root-of-trust with a high level of resistance against malevole...

 | 
 Previous Page
 | 1 | 2 | 
Next Page 
 | 
 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.