Post-Quantum Silicon IP

Hardware-Accelerated Security
for the Post-Quantum Era

Purpose-built PQC silicon IP with hardware-accelerated cryptographic cores. Designed for integration into the systems that matter most.

NTT Hardware Accelerator
Keccak Cryptographic Core
Threshold ML-DSA
FIPS 204 / FIPS 203 Algorithms
Patent-Protected Architecture
NTT Hardware Accelerator
Keccak Cryptographic Core
Threshold ML-DSA
FIPS 204 / FIPS 203 Algorithms
Patent-Protected Architecture

Core Silicon IP

NTT Core
Hardware-Accelerated Lattice Operations
Keccak Core
SHA-3 & SHAKE Hardware Engine
Threshold Engine
Arbitrary T-of-N Architecture
FIPS 204 / 203
ML-DSA & ML-KEM Algorithms
Multi-Platform
x86, ARM, RISC-V
Patent-Protected
Extensive IP Portfolio

Why Now is the Time for Codebat

1

The Invisible Security Gap

Firewalls protect data at rest. TLS protects data in transit. But data being processed in CPU and memory is completely exposed. We provide runtime encryption to eliminate this last attack surface.

2

Quantum Countdown

Q-day is approaching — the moment quantum computers break RSA and ECC. Adversaries are already running "harvest now, decrypt later" campaigns, capturing encrypted data today to crack it tomorrow. Hardware-accelerated PQC is the countermeasure.

3

The Hardware Imperative

Software-only crypto can't keep pace. Purpose-built hardware accelerators deliver throughput and security without the performance penalty.

Not Just Defense—
A Computing Revolution

Our patent-protected PQC silicon IP features dedicated NTT and Keccak hardware cores, delivering lattice-based cryptography at wire speed. Platform-agnostic: x86, ARM, RISC-V.

Encrypted Upload

Data encrypted before leaving your environment using post-quantum algorithms

Isolated Execution

Processing in chip-level physical isolation with zero shared resources

Verifiable Evidence

Fixed-length cryptographic proof generated for complete audit trail

Lattice Acceleration

NTT Hardware Core

Dedicated Number Theoretic Transform engine accelerates the polynomial arithmetic at the heart of lattice-based cryptography. ML-DSA signing and ML-KEM encapsulation run at wire speed — off the critical path of your main processor.

FIPS 204 ML-DSA Accelerated
Software-only NTT on general-purpose CPUs competes for cycles with your application workload.
Hash Engine

Keccak Hardware Core

Purpose-built SHA-3 and SHAKE engine handles the hash-intensive operations that lattice schemes demand. Constant-time execution in silicon eliminates timing side-channels by design.

SHA-3 Constant-Time Silicon
Software hash implementations are vulnerable to timing analysis and consume significant CPU overhead.

Protect Your Core Digital Assets

Semiconductor

Chip Design Protection

EDA tools and chip design IP worth billions, often under ITAR export controls. Leakage causes catastrophic losses.

Hardware-rooted threshold signing ensures firmware integrity with multi-party authorization, while cryptographic evidence provides tamper-proof audit trails for every design operation.

Finance

Trading Algorithm Security

HFT algorithms are core secrets. SEC requires immutable records of every trading decision.

Cryptographic evidence provides undeniable audit trails for every trading decision, while threshold signing enforces multi-party authorization on critical operations.

Healthcare

Patient Data Privacy

Highly sensitive PHI data faces strict HIPAA requirements and ransomware threats.

Immutable cryptographic evidence supports regulatory audit requirements, while distributed key custody protects patient data with post-quantum encryption.

Building the Post-Quantum Silicon Ecosystem

Partnering with system architects and silicon designers to embed PQC at the hardware layer.

Sovereign Computing Partners

Governments and enterprises embedding PQC silicon IP into sovereign infrastructure. Hardware-rooted security that keeps sensitive computation within national boundaries.

Become a Partner

RISC-V Edge Integration

Collaborating with RISC-V chip designers to integrate native PQC acceleration at the silicon level. Post-quantum security for edge and IoT from the ground up.

Explore Tech Partnership

SoC Integration Partners

SoC designers and system integrators embedding our cryptographic IP cores into next-generation platforms. Turnkey PQC acceleration for your silicon.

Join the Ecosystem

Frequently Asked Questions

Everything you need to know about our technology

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against attacks from quantum computers. As quantum computing advances, traditional encryption methods like RSA and ECC will become vulnerable. Our silicon IP implements NIST-standardized PQC algorithms — ML-DSA and ML-KEM — in dedicated hardware.

Lattice-based algorithms like ML-DSA and ML-KEM are computationally intensive — especially the NTT and hash operations they rely on. Dedicated hardware cores handle these operations off the main processor, delivering cryptographic throughput without competing for application cycles. Constant-time silicon execution also eliminates timing side-channels by design.

Threshold cryptography splits a private key across multiple parties so that no single party ever holds the complete key. A configurable T-of-N quorum is required to sign or decrypt — eliminating single points of failure. Our silicon IP supports arbitrary threshold configurations, accelerated by dedicated hardware cores.

Our silicon IP implements ML-DSA (FIPS 204) for digital signatures and ML-KEM (FIPS 203) for key encapsulation — the NIST-standardized post-quantum algorithms. Designed to support customers building toward their own regulatory requirements.

We provide an FPGA-based reference design and dedicated engineering support throughout the integration process. Our team works alongside your architects to adapt the IP cores to your target platform — whether x86, ARM, or RISC-V.

Build Post-Quantum Security into Your Architecture

Technology Evaluation

Get hands-on with our FPGA reference design and explore integration with your architecture.

Request Evaluation Kit

Business Development

Explore licensing models and partnership structures for your platform.

Contact BD Team

Partnership

SoC designers, system integrators, and platform architects building next-generation security.

Explore Opportunities