Cryptographic Cores IP

Lightweight, Scalable Cryptographic Accelerators for Secure SoC Designs

Crypto Quantique’s Cryptographic Cores IP portfolio delivers secure, high-performance implementations of symmetric, asymmetric, and post-quantum algorithms. Designed for low-area, low-latency operation, our silicon-proven cores help SoC designers and embedded teams build trusted, efficient devices for IoT, automotive, medical, and industrial markets.

Book an IP evaluation Contact sales

For teams building secure ASICs & SoCs with tight area and power budgets

  • SoC & ASIC Design Teams
    Build secure chips with certified crypto IP that meets performance and area goals.
  • Embedded Platform & Security Architects
    Choose from proven cores to enforce secure boot, identity, and encryption policies.
  • Embedded Designers
    Integrate crypto acceleration into MCU or subsystem with minimal code overhead.
  • Compliance & QA
    Achieve regulatory compliance faster with certifiable, standards-aligned building blocks.

IoT devices

Full Algorithm Coverage

AES, SHA, ECC, Ascon, and PQC options. All hardened and production-ready

IoT devices

Side-Channel Resistance

Built-in defences against side-channel and fault injection attacks as standard

IoT devices

Flexible Integration

Configurable for silicon area, latency, and interface options (AXI, APB, etc.)

Post-Quantum Ready

Support for Kyber, Dilithium, and SPHINCS+ ensures future-proof security

Standards Compliant

FIPS 186-4 and ISO/IEC 14888 conformant, with support for certification workflows

Low Power, High Throughput

Designed to meet the demands of constrained IoT devices and real-time systems

AES Encryption

Supports 128-, 192-, and 256-bit keys with ECB, CBC, GCM, OFB, and CTR modes. Configurable for optimal performance/power trade-offs.

Ascon for Lightweight Use Cases

Authenticated encryption and hashing based on the NIST SP800-232 finalist. Compact and efficient, ideal for small-footprint devices.

Elliptic Curve Cryptography (ECC)

Implements ECDSA and ECDH for secure identity, authentication, and encryption, optimized for embedded systems.

Post-Quantum Cryptography (PQC)

Hardware acceleration for ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (SPHINCS+) — ready for emerging quantum-safe mandates.

Secure Hashing

SHA-2 and SHA-3 cores with integrated countermeasures provide fast, secure integrity and signature verification.

Key Lifecycle Support

On-chip TRNG-based key generation with integrated management for generation, rotation, and revocation.

IoT devices

Optimized AES

Fast, scalable encryption cores with configurable throughput and area profiles

IoT devices

Ascon & Hashing

Embedded security against SCA and FI in authenticated encryption and hashing

IoT devices

PQC Hardware

Ready-to-integrate Kyber, Dilithium, and SPHINCS+ cores for future-proof cryptography

IoT devices

Key Lifecycle

Built-in TRNG and support for secure key provisioning and revocation processes

Standard Interfaces

AXI4, AXI-Lite, APB — fast integration into existing SoC or subsystem pipelines

Deliverables

RTL, test benches, LEF/GDSII, SystemVerilog models, synthesis constraints, documentation

Certifiable Design

FIPS, ISO, and NIST-compliant implementations for standards-based development

Security Hardened

Countermeasures against timing, power, fault injection, and other physical threats

Ready to accelerate cryptographic performance in your SoC or embedded platform?

Talk to Crypto Quantique experts today to learn more or start your evaluation.

Download Silicon IP Products Brochure Contact sales