Secure Execution Processor
Cryptographic operations can be performed with single Keccak (SHA3) core or by combination of cryptographic hash primitives (SHA3 or SHA2) and symmetric ciphers.
Despite upgrades allowing for secure execution processing, the Geon processor maintains high configurability, performance and efficiency of the proven BA22. Performance is remaining in-line with BA22-CE.
The processor is already verified at system level and suitable for diverse security needs.
View Secure Execution Processor full description to...
- see the entire Secure Execution Processor datasheet
- get in contact with Secure Execution Processor Supplier
Block Diagram of the Secure Execution Processor IP Core
Secure Execution Processor IP
- Secure Execution Processor
- Ultra-low power 32-bit processor with secure execution capability
- Low power 32-bit processor with secure execution capability
- Ultra-low power processor with RISC-V architecture possessing secure execution capability
- Secure-IC Securyzr(TM) Cyber Escort Unit IP provides real time detection of sero day attacks on processor
- 32-bit RISC core for secure applications