Worcester Polytechnic Institute

Homomorphic Encryption

Towards practical fully homomorphic encryption

Learn more

RAIN

Analyzing information leakage in the cloud

Learn more

Vernam Group on GitHub

Some of our source code is published and distributed under the terms of the The MIT License (MIT).

GitHub

About Us

Open MSc/PhD positions, contact information

Learn more

Beehive: Large-Scale Log Analysis for...

Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks

Thursday, Nov. 14 at 4 pm in AK-219: Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Presenter: Dr. Alina Oprea (RSA Laboratories) Abstract: Currently, many organizations keep large volumes of log data collected by various security products. This data is mostly used today for forensic analysis once an attack has been discovered […]

Enabling Practical Secure Computing t...

Enabling Practical Secure Computing through Fully Homomorphic Encryption

On Wednesday, Nov. 6 at 3 pm in AK 233: Enabling Practical Secure Computing through Fully Homomorphic Encryption Presenter: Dr. Kurt Rohloff (Raytheon BBN Technologies) Abstract: The first major breakthrough of theoretical computer science in the 21st century was the discovery of Fully Homomorphic Encryption (FHE). This breakthrough has provided the possibility for secure computation […]

Applied Crypto Seminar: Advances in I...

Applied Crypto Seminar: Advances in Implementations of Code-based Cryptography on Embedded Systems

On Wednesday, Sept. 25 at 10 am in AK 233 Tim Güneysu (Ruhr-Universität Bochum, Germany) will talk on: Advances in Implementations of Code-based Cryptography on Embedded Systems Abstract: Recent public-key schemes are either based on the factorization or the discrete logarithm problem. Since both problems are closely related, a major breakthrough in cryptanalysis (e.g., with […]

On Thursday, Sept. 19 at 10 am in AK 233, Christof Paar (Ruhr-Universität Bochum & UMASS Amherst) will talk on: Embedded Security for the Internet of Things Abstract: Through the prevalence of interconnected embedded systems, the vision of ubiquitous computing has become reality over the last few years. As part of this development, embedded security […]

Seminar: On the complexity of computi...

Seminar: On the complexity of computing discrete logarithms in the field GF(3^{6·509})

On Tuesday, Sept. 17 at 10 am in AK 233 Francisco Rodríguez-Henríquez (CINVESTAV-IPN, Mexico) will talk on: On the complexity of computing discrete logarithms in the field GF(3^{6·509}) Abstract: In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thomé, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. In […]

Upcoming Seminar Talk: Side-Channel C...

Upcoming Seminar Talk: Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel?

On Wednesday, Sept. 11 at 1 pm in AK 219 Amir Moradi (Ruhr-Universität Bochum) will talk on: SIDE-CHANNEL COUNTERMEASURES FOR HARDWARE: IS THERE A LIGHT AT THE END OF THE TUNNEL? Abstract: Counteracting side-channel attacks (DPA), known as a serious threat to cryptographic devices, is a must for today’s security-related products. Due to the less […]

VERNAM Lab is Co-organizing CHES 2013...

VERNAM Lab is Co-organizing CHES 2013 in Santa Barbara

The 15th Workshop on Cryptographic Hardware and Embedded Systems will be held at UC Santa Barbara, California, USA on August 20 – 23, 2013 in conjunction with CRYPTO 2013. Find the call for papers here.