RSA Public Key Exponentiation Accelerator
The operations necessary for the RSA cannot be efficiently implemented on an embedded CPU, however, typically requiring many seconds of the CPU time for signature verification.
RSA1-E implements by far the most time-consuming operation of the RSA cryptography: so called “exponentiation” to enable low-power operation of the battery-powered devices.
The design is fully synchronous and available in multiple configurations varying in bus widths, set of finite fields supported and throughput.
View RSA Public Key Exponentiation Accelerator full description to...
- see the entire RSA Public Key Exponentiation Accelerator datasheet
- get in contact with RSA Public Key Exponentiation Accelerator Supplier
Block Diagram of the RSA Public Key Exponentiation Accelerator IP Core
RSA IP
- Secure-IC Securyzr™ Tunable Cryptography solutions with embedded side-channel protections: AES - SHA2 - SHA3 - PKC - RSA - ECC - Crystals Kyber - Crystals Dilithium - XMSS - LMS - SM2 - SM3 - SM4 - Whirlpool - CHACHA20 - Poly1305
- Secure-IC's Securyzr™ Tunable Public Key Cryptographic (RSA, ECDSA, SM2, Diffie-Hellman) accelerator - optional SCA protection
- Java Card compliant cryptographic library for encryption and decryption of RSA, DSA, Diffie-Hellman, El-Gamal and Elliptic Curves algorithms
- Hardware accelerator for RSA, DSA, Diffie-Hellman, El-Gamal and Elliptic Curves algorithms
- Secure cryptographic library compliant with the X9.31 and FIPS 186-4 standards.
- Secure key computation, encryption, decryption, signature and verification functionalities compliant with the PKCS#1