Skip to content

   We secure embedded systems

IP Cores

KiviCore develops IP cores for secure embedded systems across FPGA and ASIC platforms. All cores are designed and developed entirely in-house in Europe, ensuring full control, transparency, and a reliable supply chain. The portfolio covers essential cryptographic building blocks, including hashing, encryption, authentication, and post-quantum cryptography.

The IP cores are built for straightforward integration into embedded systems via a standard AXI4-Lite interface and are delivered with a complete package including HAL, drivers, and reference designs to enable fast deployment.

Beyond the IP itself, KiviCore supports customers with hands-on expertise in designing secure and compliant embedded solutions.

 

IP Core Evaluation Portal

Evaluating cryptographic IP is often difficult. Long NDAs, delayed deliveries, and incomplete documentation slow down technical decision-making. KiviCore addresses this with its IP Core Evaluation Portal. By registering you get access to: 

  • Free evaluation packages for FPGA (netlist, time-bombed)

  • Resource utilization data

  • Detailed datasheets

  • Integration examples and documentation

  • IP Core web support

KiviCore IP Cores

KiviCore’s employees bring more than 20 years of experience in RTL and IP core development, including the design and productization of cryptographic IP cores.

Money
Cost-efficient Licensing Model

Low license fees and free evaluation licenses make hash IP Cores accessible even for mid-size FPGA projects with limited budgets. 

Long-term
Fast Availability and direct Support

Evaluation packages are available via download, with rapid responsive web support to keep your project moving. 

Customized
Easy integration into SoC Designs
AXI4-Lite interfaces, platform-agnostic C source code (HAL + API), and clear documentation enable fast integration into hardware–software co-design flows. 
Shield-dark
European Technology with reliable Access 
Developed in Germany, with direct access to evaluation packages and predictable availability giving design teams transparency, control, and long-term planning security.

KiviPQC | Post Quantum (PQC) IP Core Family

KiviPQC-KEM

 

Supports the ML-KEM Algorithm. Lays the foundation for encrypted communication by allowing two parties to securely establish a shared secret key over a public channel.

KiviPQC-DSA

 

Supports the ML-DSA Algorithm. Enables the creation of digital signatures to verify the origin of a message and protect it from undetected modifications.

KiviPQC-Box

 

Supports the ML-KEM and the ML-DSA algorithm. Creates digital signatures for integrity and authenticity, and enables secure key exchange for encrypted communication.

KiviHash | Hash Functions IP Core Family

KiviHash-SHA3

 

Supports SHA-3 hash functions SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512 and extendable output functions (XOF), SHAKE-128 & SHAKE-256 compliant to NIST´s FIPS 202 standard.

KiviHash-SHA256

 

Supports SHA-256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.

KiviHash-SHA512/384

 

Supports SHA-384, SHA-512 and SHA512/256 cryptographic algorithm, an one-way hash function compliant to NIST’s FIPS 180-4 standard.

KiviHash-HMAC-SHA256

 

Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-256 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.

KiviHash-HMAC-SHA512

 

Supports secure Keyed-Hash Message Authentication Code (HMAC) generation using the SHA-512 algorithm. It is compliant to NIST FIPS 198-1 and NIST SP 800-224.