Applied research

Frontier research on foundational model training, private AI deployment, and enterprise-grade security for sovereign organizations.

Privacy

Confidential computing

We build frameworks that convert standard transformer architectures into their private counterparts. These frameworks enable inference and fine-tuning while preserving privacy for data and model owners.

Performance

Novel permutation and factorization techniques for privacy-preserving AI with minimal computational overhead.

Performance

Novel permutation and factorization techniques for privacy-preserving AI with minimal computational overhead.

Performance

Novel permutation and factorization techniques for privacy-preserving AI with minimal computational overhead.

Security Guarantee

Secure multi-party computation to guarantee privacy across distributed datasets.

Security Guarantee

Secure multi-party computation to guarantee privacy across distributed datasets.

Security Guarantee

Secure multi-party computation to guarantee privacy across distributed datasets.

Data Protection

Differential privacy integration to mathematically prevent data leakage and model memorisation.

Data Protection

Differential privacy integration to mathematically prevent data leakage and model memorisation.

Data Protection

Differential privacy integration to mathematically prevent data leakage and model memorisation.

Trade-off

Fine-grained privacy controls to perfectly balance cryptographic security with inference speed.

Trade-off

Fine-grained privacy controls to perfectly balance cryptographic security with inference speed.

Trade-off

Fine-grained privacy controls to perfectly balance cryptographic security with inference speed.

Specialization

Foundational model training

We build the architectural primitives that power next-generation AI systems. From pre-training dynamics and data curation to scaling laws and emergent capabilities.

Data

Scalable data curation pipelines for high-signal, diverse pre-training corpora.

Data

Scalable data curation pipelines for high-signal, diverse pre-training corpora.

Data

Scalable data curation pipelines for high-signal, diverse pre-training corpora.

Compute

Adaptive compute allocation to balance model depth, width, and training efficiency.

Compute

Adaptive compute allocation to balance model depth, width, and training efficiency.

Compute

Adaptive compute allocation to balance model depth, width, and training efficiency.

Evaluation

Emergent capability benchmarking for systematic evaluation across capability thresholds.

Evaluation

Emergent capability benchmarking for systematic evaluation across capability thresholds.

Evaluation

Emergent capability benchmarking for systematic evaluation across capability thresholds.

Frameworks

Architecture-agnostic training frameworks with modular, configurable training objectives.

Frameworks

Architecture-agnostic training frameworks with modular, configurable training objectives.

Frameworks

Architecture-agnostic training frameworks with modular, configurable training objectives.

Research by

The state of private LLM Inference

We surveyed the landscape of privacy-preserving inference for Transformer-based LLMs. Discover our comparative analysis of cryptographic techniques, performance trade-offs, and practical deployability for real-world enterprise architectures.

Intelligence in Service

Crocicchio Cortogna 6, 6900 Lugano, Switzerland

901 N Market Street, Suite 100, Wilmington, Delaware 19801

Via Giuseppe Verdi 6, 70017 Putignano, Bari, Italia

© 2026 Prem AI. All rights reserved.

Intelligence in Service

Crocicchio Cortogna 6, 6900 Lugano, Switzerland

901 N Market Street, Suite 100, Wilmington, Delaware 19801

Via Giuseppe Verdi 6, 70017 Putignano, Bari, Italia

© 2026 Prem AI. All rights reserved.

Intelligence in Service

Crocicchio Cortogna 6, 6900 Lugano, Switzerland

901 N Market Street, Suite 100, Wilmington, Delaware 19801

Via Giuseppe Verdi 6, 70017 Putignano, Bari, Italia

© 2026 Prem AI. All rights reserved.