Download your Xiphera's ASIC-specific product brief here.

Product Brief

SHA-3

A High-Speed Versatile Core for SHA-3-224/256/384/512 and (c)SHAKE-128/256

Product code: XIP3030H

This IP Core from Xiphera is a high-speed IP core designed for versatile support of all variants of the SHA-3 hash function and related extendable-output function SHAKE as well as the SHA-3 derived function cSHAKE and its variants KMAC, TupleHash and ParallelHash (including their arbitrary-length output variants). Because of the versatile algorithm support, it can be used in various applications that require SHA-3 hashing or other supported SHA-3 based functionalities. 

We're committed to your privacy. Xiphera uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Proven security for ASIC designs

Xiphera’s cryptographic IP cores and security protocols provide support for ASIC designs. The IP cores are fully digital and therefore support in principle all ASIC process nodes.

Xiphera designs and implements cryptographic IP cores for FGPAs and ASICs.

Peace of mind in a dangerous world.

Xiphera protects your critical systems by designing security directly into hardware.

News
The indirect industrial participation project between a Finnish consortium and Lockheed Martin, related to the F-35 Program in Finland, is progressing as planned. Crosshill, DNV Cyber, Habilito, and Xiphera together with Lockheed Martin have reached the halfway point in a technology project that develops highly secure electronics for defense applications and builds cybersecurity testing laboratories with state-of-the-art capabilities.
2025 was a year that strengthened Xiphera’s position in hardware-based cryptography and delivered clear, steady progress. Our direction remained clear: to build a scalable and internationally focused business around hardware cryptography, delivered as Intellectual Property (IP) cores and security protocol engines for ASICs and FPGAs, and designed without hidden software elements.
Quantum computers will eventually break today’s public key encryption, and attackers may already capture and store sensitive data to decrypt in the future. Critical information must be protected in advance, before quantum technology becomes widely available.