75 results found
Malaysia
SkyeChip specializes in cutting edge IPs (e.g., HBM3, NOC, DDR5/4) and IC solutions for AI and HPC.
Advanced ASIC Development, New Product Introduction (NPI) Engineering, High Volume Manufacturing (HVM) Enablement
HBM3 PHY & Controller, Non-Coherent Network-on-Chip (NOC), Coherent Network-on-Chip (NOC), DDR5/4 PHY & Controller, Die-to-Die (D2D) Interconnect, Analog & Configurable I/Os
View vendor pageUSA
FortifyIQ develops HW security IP cores fortified against SCA/FIA, while preserving the original AES goals of speed, low latency, and low power usage. We also offer high-performance software libraries and EDA tools for pre- and post-silicon security assessment.
FortiCrypt, FortiMac, FortiPKA-RISC-V, FortiPKEx, EDA Tools
View vendor pageGermany
Creonic is the leader in ready-for-use IP cores, offering a rich product portfolio for wired, wireless, fiber and free-space optical communications.
IP Customization, Low power, small footprint Design Methodology, Integration Services on Customer FPGA Boards, System Design, Consulting
IEEE 802 Data Center and Wireless FEC , OpenZR+/ Open ROADM oFEC 800GbE, SDA, ITU High-Speed Optical Communication IP Cores, Full ETSI DVB-S2X Wideband Transmitter and Receiver, AWGN Channel, 3GPP Mobile Communications
View vendor pageIndia
Ambit offers semiconductor design and intellectual property design services to global clients and adopts Offshore Design Centre (ODC) approach in achieving this. ODC functions like an extended arm of the client and thus ensures close communication and coordination between the client's teams and ambitions.
Physical Design, RTL Synthesis and verification, STA
DDR
View vendor pageIntegrated Security Services Platform (iSSP) – Securyzr iSSP, Post silicon security evaluation tool - Analyzr, Software security evaluation tool - Catalyzr, Pre-silicon security evaluation tool - Virtualyzr, Support to Certification, Evaluation as a Service
Securyzr iSE, Digital TRNG, Digital PUF, Software Crypto Library, Digital Sensor – Smart Monitor powered by AI for Cybersecurity, Active Shield, Cyber Escort Unit, Hash Function, Cipher Function, PKC-RSA/ECC, Memory Ciphering
View vendor pageTry our free service and get free vendor
quotes, while remaining anonymous.
No thanks. Let me keep searching.