Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
This is the only pure SW solution in the market.
The underlying protection is purely algorithmic and implementation-agnostic. Resistance to attacks was validated analytically and on a physical device. The protection is based on the Threshold Implementation (TI) approach, the security of which has been proven.
View Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library full description to...
- see the entire Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library datasheet
- get in contact with Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library Supplier
side channel IP
- Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- LPDDR4x/5 Secondary/Slave (memory side!) PHY
- LPDDR4x Secondary/Slave (memory side!) PHY
- LPDDR5 Secondary/Slave (memory side!) PHY
- LPDDR5X Secondary/Slave (memory side!) PHY
- Multi Protocol IO Concentrator (RDC) IP Core for Safe and Secure Ethernet Network