PQSecure-HW™

High-Assurance, Side-Channel-Protected Cryptographic Hardware IP

PQSecure-HW™ delivers silicon-ready cryptographic IP cores for FPGA, ASIC, and SoC integration. Our portfolio spans Post-Quantum, Classical, Symmetric, and Lightweight primitives, engineered with integrated side-channel countermeasures and rigorous verification.

Secure Boot & Root-of-Trust Defense & Aerospace Secure Enclaves & HSMs 5G / Edge Infrastructure IoT & Constrained Devices Supply-Chain-Assured Silicon

Complete Cryptographic Hardware Suite

Post-Quantum (NIST Standards)

ML-KEM (FIPS 203)

ML-DSA (FIPS 204)

SLH-DSA (FIPS 205)

FN-DSA / Falcon (FIPS 206 – coming soon)

* Supports NIST security levels 1, 3, and 5.

Stateful Hash-Based Signatures

XMSS (RFC 8391)

LMS / HSS (RFC 8554)

NIST SP 800-208

* Optimized for secure boot and firmware authentication.

Classical Public-Key

ECC: ECDSA, ECDH, Curve25519, Curve448, Ed25519, Ed448

RSA: 2048 / 3072 / 4096 (CRT Acceleration)

* Optional side-channel protection available.

Symmetric, Lightweight & Entropy

Symmetric: AES (GCM/CTR/CBC), SHA-2, SHA-3, HMAC

Lightweight: ASCON (AEAD/Hash/XOF), Trivium

Entropy: TRNG (SP 800-90B/C), DRBG

Deployment Targets

FPGA-Optimized IP

AMD / Xilinx (Artix, Kintex, UltraScale+, Versal) | Intel / Altera | Microchip | Menta-eFPGA | Analog Devices /Flex-Logix eFPGA

FPGA-proven and side-channel evaluated.

ASIC-Ready RTL

  • Synthesizable Verilog / SystemVerilog
  • Area, timing, and power optimized
  • Technology-node portable
  • EDA-flow compatible

SoC / Secure Enclave

  • AXI / APB / TileLink interfaces
  • RISC-V co-design ready
  • Secure Boot integration
  • Key provisioning interfaces

Built-In Side-Channel Protections

Security is embedded into the microarchitecture — not added afterward.

  • Differential Power Analysis (DPA) resistance
  • Correlation Power Analysis (CPA) mitigation
  • First-order masking & shuffling techniques
  • Constant-time hardware datapaths
  • Fault injection countermeasures
  • Glitch & EM-aware design
  • FIPS-140-3 Ready: “non-invasive attacks” level 3+

Verification & Validation

  • UVM-based verification environments
  • RTL regression & constrained testing
  • FPGA validation platforms
  • TVLA-oriented leakage evaluation
  • ACVP / CAVP algorithm compliance
  • NIST-KAT Test Vectors Benchmark

Hardware / Software Co-Design

Seamless integration with libpqsecure-C and libpqsecure-rs enabling:

  • Hardware acceleration with secure software fallback
  • Unified Root-of-Trust architectures
  • Hybrid Classical + PQC deployments

Configurable Architecture Profiles

Select the optimal balance of area, power, performance, and security.

Tiny Tier
Ultra-Low Area | Constrained Devices
  • Smallest silicon area
  • Reduced memory usage
  • IoT endpoints
Compact Tier
Low Area | Efficient | Embedded
  • Area-optimized
  • Moderate throughput
  • Power-sensitive
Balanced Tier
Area–Performance Optimized
  • Optimized tradeoff
  • Secure gateways
  • Defense platforms
High-Perf Tier
Maximum Throughput | SoC Optimized
  • Parallel engines
  • Deep pipelining
  • Data center/cloud systems

Independent Third-Party Evaluation

PQSecure-HW™ IP cores undergo independent evaluation through Keysight Device Vulnerability Analysis Services, a globally recognized provider of security validation and side-channel assessment.

Through third-party testing, PQSecure™ hardware implementations are evaluated for:

  • Functional correctness validation
  • Differential Power Analysis (DPA) assessment
  • Correlation Power Analysis (CPA) leakage testing
  • Electromagnetic (EM) side-channel analysis
  • Fault injection susceptibility testing
  • Implementation robustness under adversarial conditions

These independent evaluations complement our internal UVM verification, FPGA validation, and TVLA methodologies — providing additional assurance for defense, aerospace, and high-security deployments.

NIST Certification/Compliance