Worcester Polytechnic Institute

Homomorphic Encryption

Towards practical fully homomorphic encryption

Learn more

RAIN

Analyzing information leakage in the cloud

Learn more

Vernam Group on GitHub

Some of our source code is published and distributed under the terms of the The MIT License (MIT).

GitHub

About Us

Open MSc/PhD positions, contact information

Learn more

Upcoming Seminar: Yuval Yarom

Upcoming Seminar: Yuval Yarom

Friday, May 26 at 11am in AK 218: Amplifying Side Channels Through Performance Degradation Presenter: Yuval Yarom (University of Adelaide and DATA61, CSIRO) Abstract: Interference between processes executing on shared hardware can be used to mount performance degradation attacks. However, in most cases, such attacks offer little benefit for the adversary. In this talk, I […]

CARDIS 2017 – CfP now available

CARDIS 2017 – CfP now available

CARDIS 2017 The Sixteenth Smart Card Research and Advanced Application Conference will be held in Lugano, Switzerland, 13 – 15 November 2017. Submissions are due July 21, 2017. We are looking forward to your high-quality submissions on all aspects of the security of smart cards and embedded systems as well as their applications.

Upcoming Seminar: Dmitry Ponomarev

Upcoming Seminar: Dmitry Ponomarev

Tuesday, April 18 at 11am in AK 218: Exploiting and Mitigating Timing Channels in Microprocessors Presenter: Dmitry Ponomarev (Binghamton University) Abstract: In this talk, we will overview our recent research on exploiting and mitigating timing channels in modern microprocessors. In the first part of the talk, we will present two new covert channels – one […]

Upcoming Seminar: Andreas Zankl

Upcoming Seminar: Andreas Zankl

Tuesday, October 11 at 2pm in AK 218: Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors Presenter: Andreas Zankl (Fraunhofer AISEC) Abstract: Software implementations of block ciphers are widely used to perform critical operations such as disk encryption or TLS traffic protection. To speed up cipher execution, many implementations rely on pre-computed […]

WPI wins first MITRE embedded CTF

WPI wins first MITRE embedded CTF

WPI team wins the first MITRE embedded Capture the Flag! The Collegiate eCTF competition was organized by MITRE and had five competing teams from local universities: Northeastern University, TUFTS University, University of Massachusetts Amherst and WPI. WPI’s team We’re Probably Insecure included graduate and undergraduate students from ECE and CS departments, including Christopher Byrne, Benjamin […]

Upcoming Seminar: Jintai Ding

Upcoming Seminar: Jintai Ding

Friday, September 2 at 11am in AK 218 : Post Quantum Key Exchange based on the learning with errors problems Presenter: Jintai Ding (U. of Cincinnati) Abstract: Public key cryptosystems  (PKC) are critical part of the  foundation of modern communication systems, in particular, Internet. However Shor’s algorithm shows that the existing PKC like Diffie-Hellmann key […]

NETWORKWORLD article on our work

NETWORKWORLD article on our work

For the link click here.

The Register article on our cross-VM ...

The Register article on our cross-VM RSA attack

To read article click here

Upcoming Seminar: Yossef Oren

Upcoming Seminar: Yossef Oren

Monday, July 20 at 11am in AK 218: The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications Presenter: Yossef Oren (Columbia University) Abstract: Side channel analysis is a remarkably powerful cryptanalytic technique. It allows attackers to extract secret information hidden inside a secure device, by analyzing the physical signals (e.g., power, […]

Upcoming Seminar: Jens-Peter Kaps

Upcoming Seminar: Jens-Peter Kaps

Thursday, July 2 at 3pm in AK 218: Comparison of Multi-Purpose Cores of Keccak and AES on FPGAs Presenter: Jens-Peter Kaps (George Mason University) Abstract: Most widely used security protocols, such as Internet Protocol Security (IPSec), Secure Socket Layer (SSL), and Transport Layer Security (TLS), provide several cryptographic services, which include authentication, confidentiality, integrity, and […]