default banner

Security IP Cores

Compliant with the highest standards, Secure-IC’s silicon-proven semiconductor IP solutions protect efficiently your SoC designs and more generally your electronic components from the most advanced attacks.

Secure-IC provides a comprehensive set of secure IP cores to counter state-of-the-art attacks on embedded electronic systems that are embedded in hundreds of millions of chips for smartphones, laptops, automotives, smart meters, cloud servers and more. These technologies prevent reverse engineering and intellectual property theft.

Securyzr

The most comprehensive set of embedded security solutions in the market

Security Silicon IP are low-level pieces of code that will be embedded in an integrated circuit to ensure security functions. IP cores address the physical security of the components and represent true security solutions for a wide variety of markets.

Depending on customers’ need, Secure-IC can deliver Silicon-proven IP (TSMC, GF, Samsung, SMIC, HH GRACE, ST, UMC, MAGNACHIPS) in advanced technology nodes (130nm, 65nm, 55nm, 40nm, 28nm, 16nm, 12nm, 10nm, 7nm, 5nm) in the form of a hardware IP core (tailored to a particular foundry) and a related software IP core (in the form of RTL code).

Secure-IC’s IPs are fully digital and can be embedded in the thinnest technology nodes

A hardware IP is the only mean to implement a high speed security protocol with low consumption including many advantages compared with a software implementation:

  • It is non hackable;
  • Cryptographic functions are more efficient;
  • Impact on CPU power consumption is reduced.

Secure-IC has an extensive knowledge of the electronics / semiconductor ecosystem and value chain as well as their associated challenges and offers the right security implementation. Over one billion of Secure-IC’s IPs have been deployed.

Secure-IC provides its customers licensed tailored IP cores that meet their needs, their markets and location specificities.

Secure-IC’s IPs portfolio is:

  • Certification ready for all major security standards;
  • FIPS ready with CAVP certificate available for each;
  • IPs can be combined as independent security elements tailored to a constraint environment and central processors (Secure-IC contributes to RISC-V initiative aiming at developing open standard instruction set architecture).

We are also offering Cybersecurity Evaluation Tools & Security Evaluation as a Service

Contact