@inbook{b1c4328b4af74b9b9a9dd1053adaba48,
title = "Power-analysis attacks on an FPGA - First experimental results",
abstract = "Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and the size of the circuit are important, but also their security against implementation attacks such as side-channel attacks. Power-analysis attacks are typical examples of side-channel attacks, that have been demonstrated to be effective against implementations without special countermeasures. The flexibility of FPGAs is an important advantage in real applications but also in lab environments. It is therefore natural to use FPGAs to assess the vulnerability of hardware implementations to power-analysis attacks. To our knowledge, this paper is the first to describe a setup to conduct power-analysis attacks on FPGAs. We discuss the design of our hand-made FPGA-board and we provide a first characterization of the power consumption of a Virtex 800 FPGA. Finally we provide strong evidence that implementations of elliptic curve cryptosystems without specific countermeasures are indeed vulnerable to simple power-analysis attacks.",
keywords = "Elliptic Curve Cryptosystems, FPGA, Power Analysis",
author = "{\"O}rs, {Siddika Berna} and Elisabeth Oswald and Bart Preneel",
year = "2003",
doi = "10.1007/978-3-540-45238-6_4",
language = "English",
isbn = "3540408339",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "35--50",
editor = "Walter, {Colin D.} and Koc, {Cetin K.} and Christof Paar",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
address = "Germany",
}