Chip IP

The richest directory of Chip IP worldwide. Find the Chip IP vendor that matches your needs.

78 results found

ELECTRA IC

TURKIYE

ElectraIC develops ASIC / FPGA, microchip and embedded software/systems, electronic circuit design and verification projects.

Services

ADVANCED VERIFICATION, ASIC/FPGA/HW, EMBEDDED SYSTEMS AND SOFTWARE DESIGN, FUNCTIONAL SAFETY, TRAINING, EIC ACADEMY

IP Cores

TRNG IP Cores, SHA3 IP Cores, RSA Keygen IP Cores, RSA IP Cores, ECDSA IP Cores, DRBG IP Cores, AES GCM IP Cores, MIL-STD-1553-IP CORE, ARINC664 END SYSTEM IP CORE, ARINC664 SWITCH IP CORE, ARINC429 IP CORE, PRACH IP Suite

View vendor page

intoPIX

Belgium

Technology leader in compression and cryptography, intoPIX delivers cost-effective silicon IP-cores answering specific and advanced AV applications.

View vendor page

Faraday Technology Corporation

Taiwan

A leading fabless ASIC / SoC design service and silicon IP provider with 20 years of experience.

Services

Intellectual Property (IP) & Process Technology, SoC/ASIC Development Platform, Design Flow, Packaging & Testing, Production Service, Application-Oriented Value-Added Services

IP Cores

USB3.1 Gen1 IP Solutions, Technology Optimized Standard Cell Library, ESD Robust Multi-Voltage I/O, Low Power SRAM with High Production Yield

View vendor page

Racyics

Germany

Racyics is an experienced integrated circuit design service provider and GLOBALFOUNDRIES channel partner with focus on advanced semiconductor nodes.

Services

Design Services, Foundry Access, Custom IP, Turnkey Solution, makeChip Hosted Design Service Platform

IP Cores

0.4V Standard Cell Library for 22FDX (22nm FDSOI), Adaptive Body Bias Solution for 22FDX (22nm FDSOI)

View vendor page

Xiphera

Finland

Xiphera develops hardware-based cryptographic IP cores, with a portfolio of 30+ solutions delivering high-performance, future-proof security for mission-critical systems.

IP Cores

xQlave® Post-Quantum Cryptography, nQrux® Hardware Trust Engines, Security Protocols, Random Number Generation, Symmetric Encryption, Asymmetric Cryptography

View vendor page
Logo Image
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.