Quantum
Compute-In Memory
QCIM
QCIM is a soft IP cryptographic accelerator architecture that combines symmetric and asymmetric encryption engines into a compact, low-power block optimized for both classical and post-quantum cryptography (PQC). Designed for integration across a variety of process nodes, QCIM redefines secure element performance with cryptographic compute-in-memory (CIM) capabilities, crypto agility, and unmatched efficiency.
Key QCIM Features
Crypto-Agile & Reprogrammable
The world's first reprogrammable, crypto-agile cryptographic accelerator. Seamlessly supports traditional algorithms like AES and ECDSA, and post-quantum standards including ML-KEM and ML-DSS (Kyber & Dilithium).
Soft IP for Seamless Integration
Delivered as synthesizable soft IP, compatible with leading foundry nodes (TSMC 40nm, 28nm, GF 22FDX, and below) and off-the-shelf SRAM macros. Adaptable across process nodes for ASIC or FPGA deployment.
Minimal Area Footprint
Fewer gates and SRAM than comparable PQ accelerators. Reduces die area, BOM cost, and improves thermal performance.
Compute-In-Memory (CIM)
Cryptographic operations are executed inside the memory subsystem, reducing latency, power consumption, and data movement.
Ultra-Low Power
Sub-microjoule energy usage per cryptographic operation. Ideal for constrained environments like smart cards, wearables, and edge devices.
Why QCIM?
Secure & Future-Proof
Integrates post-quantum readiness with backwards compatibility. Ideal for long-lifecycle products with evolving security needs.
Smaller. Faster. Greener.
Optimized for lower power and smaller die area than all known post-quantum cryptographic cores in-market.
Flexible Deployment
Whether you're building secure MCUs, payment chips, or custom ASICs, QCIM adapts to your needs and roadmap.
Table of contents
Performance Benchmarks
AES Acceleration
Outperforms leading crypto coprocessors with ~5x faster parallel execution.
SHA-3 Throughput
Achieves 6 cycles/byte in parallel mode, offering high-speed hashing with minimal power.
ECDSA P-256
Sustains 1M signing ops/sec, with base point randomization included.
Supported Cryptographic Primitives
Algorithm
mode
Operation
Cycle Count
ML-KEM-1024
Kyber
Keygen / Encaps / Decaps
550k / 700k / 550k
ML-DSS-44
Dilithium
Keygen / Sign / Verify
550k / 2.4M / 600k
ML-DSS-87
Dilithium
Keygen / Sign / Verify
800k / 3.9M / 900k
P-256 (ECDSA)
Classical
Keygen / Sign / Verify
540k / 1M / 1M
AES (128-bit)
Serial / Parallel
Encryption
56 / 11 cycles per byte
SHA-3
Serial / Parallel
Hashing
56 / 6 cycles per byte
QCIM Performance Estimates
ML-DSS (Dilithium)
Cycle Counts (est.)
Keygen
Sign
Verify
ML-DSS-44
500,000
2,400,000
600,000
ML-DSS-87
800,000
3,900,000
900,000
ML-DSS-44 (dedicated hash)
100,000
1,000,000
200,000
ML-DSS-87 (dedicated hash)
100,000
1,200,000
200,000
ML-KEM (Kyber)heading
Cycle Counts (est.)
Keygen
Sign
Verify
ML-KEM-1024
550,000
700,000
550,000
ML-KEM-1024
(dedicated hash)150,000
150,000
150,000
ECDSA heading
Cycle Counts (est.)
Keygen
Sign
Verify
P-256
480,000 / 1,000,000 (with base point randomization)
540,000
1,000,000
ML-DSS-87
800,000
3,900,000
900,000
ML-DSS-44 (dedicated hash)
100,000
1,000,000
200,000
ML-DSS-87 (dedicated hash)
100,000
1,200,000
200,000
Applications
QCIM enables quantum-secure cryptographic acceleration across diverse applications, from smart cards to enterprise systems.
Smart Cards
Ultra-compact, low-power cryptographic acceleration for next-generation payment, identity, and access smart cards — ready for a post-quantum world.
Secure Elements
Drop-in crypto agility for mobile devices, embedded systems, and payment terminals. Reprogrammable to evolve with future standards.
Edge IoT Devices
High-speed, low-latency security at the network edge. QCIM extends battery life and delivers quantum-secure communications for billions of connected devices.
Hardware Wallets
Bulletproof private key protection in a tiny footprint. QCIM brings quantum resistance to wallets without compromising speed or portability.
Post-Quantum PKI
Hardware-accelerated key generation, signing, and encryption for enterprise and government PKI systems migrating to post-quantum security.
Learn More About QCIM
Fill out form below, and a member of our team will connect with you soon. Your journey into the future of quantum secure technology starts here.
General Inquiries
Investor Relations