Download your Xiphera's ASIC-specific product brief here.

Product Brief

NIST P-224/P-256/P-384/P-521 ECDH+ECDSA

Compact ECC IP Cores supporting ECDH and ECDSA on NIST P-224/P-256/P-384/P521

Product code: XIP41X3C

This IP Core from Xiphera are a family of compact Intellectual Property (IP) cores implementing Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA) on NIST prime curves. ECDH and ECDSA on NIST prime curves are widely used in various cryptographic protocols and systems. The XIP41x3C family currently includes two IP cores:

• XIP4123C for ECDH and ECDSA on the NIST P-256 elliptic curve and
• XIP4133C for ECDH and ECDSA on the NIST P-384 elliptic curve.

We're committed to your privacy. Xiphera uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Proven security for ASIC designs

Xiphera’s cryptographic IP cores and security protocols provide support for ASIC designs. The IP cores are fully digital and therefore support in principle all ASIC process nodes.

Xiphera designs and implements cryptographic IP cores for FGPAs and ASICs.

Peace of mind in a dangerous world.

Xiphera protects your critical systems by designing security directly into hardware.

News
The indirect industrial participation project between a Finnish consortium and Lockheed Martin, related to the F-35 Program in Finland, is progressing as planned. Crosshill, DNV Cyber, Habilito, and Xiphera together with Lockheed Martin have reached the halfway point in a technology project that develops highly secure electronics for defense applications and builds cybersecurity testing laboratories with state-of-the-art capabilities.
2025 was a year that strengthened Xiphera’s position in hardware-based cryptography and delivered clear, steady progress. Our direction remained clear: to build a scalable and internationally focused business around hardware cryptography, delivered as Intellectual Property (IP) cores and security protocol engines for ASICs and FPGAs, and designed without hidden software elements.
Quantum computers will eventually break today’s public key encryption, and attackers may already capture and store sensitive data to decrypt in the future. Critical information must be protected in advance, before quantum technology becomes widely available.