Subject to all relevant United Kingdom export regulations, Chip Engineering Ltd has a number of IP cores that are available to license.
For specific information, please initiate all enquiries via the contact page.
Within security applications, Cryptographic Hash functions are used to generate a fixed size bit string from an arbitrary message. The Hash algorithms used are such that there is a high probability that the resultant bit string (i.e. the message digest) is unique to the given message.
Chip Engineering Ltd has developed cores to support the following configurations: