76 results found
USA
Rydev provides high quality IP and services in digital and analog VLSI design and verification to clients across the world.
RTL Design, Design Verification, Physical Design, Analog Design
RISC-V Ultra-Low Power Core, Configurable Clock-Gated 32-bit Bus Manager
View vendor pageIntegrated Security Services Platform (iSSP) – Securyzr iSSP, Post silicon security evaluation tool - Analyzr, Software security evaluation tool - Catalyzr, Pre-silicon security evaluation tool - Virtualyzr, Support to Certification, Evaluation as a Service
Securyzr iSE, Digital TRNG, Digital PUF, Software Crypto Library, Digital Sensor – Smart Monitor powered by AI for Cybersecurity, Active Shield, Cyber Escort Unit, Hash Function, Cipher Function, PKC-RSA/ECC, Memory Ciphering
View vendor pageFrance
Presto Engineering, provides ASIC design and outsourced operations for semiconductor and IoT device companies, helping its customers minimize overhead, reduce risk and accelerate time-to-market.
ASIC Design , Testing and Packaging, Qualification and Failure Analysis, Supply Chain Management, IoT Operations Outsourcing Solutions, RF and Mixed-Signal Test, Front-end Tape-out, Mask and Wafer Procurement, Back-end Manufacturing and Test, GLOBALFOUNDRIES Channel Partner
RFID analog front-end
View vendor pageSweden
Specialists in developing silicon designs (ASIC) for portable and wireless applications. Focus on low power and miniaturization with a broad portfolio of IP building blocks.
Custom ASIC Design, ASIC Design Services, Silicon IP Licensing and Design, Supply Chain Services (Turnkey), Product Design (Hardware & Software), Antenna Design
RF & PLL, Analog – PLL, Analog - ADC, Analog – Interface, Analog – Misc, Power, Digital
View vendor pageFinland
Xiphera develops hardware-based cryptographic IP cores, with a portfolio of 30+ solutions delivering high-performance, future-proof security for mission-critical systems.
xQlave® Post-Quantum Cryptography, nQrux® Hardware Trust Engines, Security Protocols, Random Number Generation, Symmetric Encryption, Asymmetric Cryptography
View vendor pageTry our free service and get free vendor
quotes, while remaining anonymous.
No thanks. Let me keep searching.