Worcester Polytechnic Institute

Homomorphic Encryption

Towards practical fully homomorphic encryption

Learn more

RAIN

Analyzing information leakage in the cloud

Learn more

Vernam Group on GitHub

Some of our source code is published and distributed under the terms of the The MIT License (MIT).

GitHub

About Us

Open MSc/PhD positions, contact information

Learn more

Upcoming Seminar: Andreas Zankl

Upcoming Seminar: Andreas Zankl

Tuesday, October 11 at 2pm in AK 218: Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors Presenter: Andreas Zankl (Fraunhofer AISEC) Abstract: Software implementations of block ciphers are widely used to perform critical operations such as disk encryption or TLS traffic protection. To speed up cipher execution, many implementations rely on pre-computed […]

WPI wins first MITRE embedded CTF

WPI wins first MITRE embedded CTF

WPI team wins the first MITRE embedded Capture the Flag! The Collegiate eCTF competition was organized by MITRE and had five competing teams from local universities: Northeastern University, TUFTS University, University of Massachusetts Amherst and WPI. WPI’s team We’re Probably Insecure included graduate and undergraduate students from ECE and CS departments, including Christopher Byrne, Benjamin […]

Upcoming Seminar: Jintai Ding

Upcoming Seminar: Jintai Ding

Friday, September 2 at 11am in AK 218 : Post Quantum Key Exchange based on the learning with errors problems Presenter: Jintai Ding (U. of Cincinnati) Abstract: Public key cryptosystems  (PKC) are critical part of the  foundation of modern communication systems, in particular, Internet. However Shor’s algorithm shows that the existing PKC like Diffie-Hellmann key […]

NETWORKWORLD article on our work

NETWORKWORLD article on our work

The Register article on our cross-VM ...

The Register article on our cross-VM RSA attack

To read article click here

Upcoming Seminar: Yossef Oren

Upcoming Seminar: Yossef Oren

Monday, July 20 at 11am in AK 218: The Spy in the Sandbox: Practical Cache Attacks in Javascript and their Implications Presenter: Yossef Oren (Columbia University) Abstract: Side channel analysis is a remarkably powerful cryptanalytic technique. It allows attackers to extract secret information hidden inside a secure device, by analyzing the physical signals (e.g., power, […]

Upcoming Seminar: Jens-Peter Kaps

Upcoming Seminar: Jens-Peter Kaps

Thursday, July 2 at 3pm in AK 218: Comparison of Multi-Purpose Cores of Keccak and AES on FPGAs Presenter: Jens-Peter Kaps (George Mason University) Abstract: Most widely used security protocols, such as Internet Protocol Security (IPSec), Secure Socket Layer (SSL), and Transport Layer Security (TLS), provide several cryptographic services, which include authentication, confidentiality, integrity, and […]

Upcoming Seminar: Yuval Yarom

Upcoming Seminar: Yuval Yarom

Monday, May 25 at 2pm in AK 218: Last-level cache side-channel attacks are practical Presenter: Yuval Yarom (University of Adelaide) Abstract: System virtualisation increases hardware utilisation by sharing the hardware resources between several virtual machines. While these virtual machines are supposed to be isolated from each other, the shared use of the hardware creates side […]

Upcoming Seminar: Christof Paar

Upcoming Seminar: Christof Paar

Wednesday, April 29 at 11 am in AK 218: How to build Trojans Presenter: Christof Paar (Ruhr-Universität Bochum & UMASS Amherst) Abstract: Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). A surprisingly large number of such systems are already security critical, e.g., medical devices, automotive electronics, or SCASA […]

Upcoming Seminar: Dan Walters

Upcoming Seminar: Dan Walters

Thursday, March 5 at 3pm in AK 233: SLEAK: A Side-channel Leakage Evaluator and Analysis Kit Presenter: Dan Walters (MITRE) Abstract: Side-channel attacks (SCA) present a major threat to secure embedded systems. Effective software countermeasures against SCA are well known in theory, but in practice are difficult to implement properly due to issues such as […]