Elliptic Curve Cryptography IP
Developed with performance and adaptability in mind, this IP
A number of fundamental algorithms are supported by Core, such as point multiplication, ECDSA signature creation, and ECDSA signature verification.
Our ECC IP Core's point multiplication capability makes elliptic curve operations safe and effective.
In elliptic curve cryptography, point multiplication is a basic operation that enables scalar multiplication of a point on the curve. A number of cryptographic systems, such as digital signatures, key agreement, and key creation, are based on this process.
View Elliptic Curve Cryptography IP full description to...
- see the entire Elliptic Curve Cryptography IP datasheet
- get in contact with Elliptic Curve Cryptography IP Supplier
ECC IP Core IP
- Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Secure-IC's Securyzr™ Tunable Public Key Cryptographic (RSA, ECDSA, SM2, Diffie-Hellman) accelerator - optional SCA protection
- Reed Solomon Error Correcting Code ECC
- BCH Error Correcting Code ECC
- Elliptic Curve Cryptography (ECC) core with AMBA APB interface
- Cryptographic library for Elliptic Curve Diffie–Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA)