727:
47:
1261:
866:
880:
280:
527:
675:
152:
774:
1241:
1071:
402:
43:, and the current director is Professor Lizzie Coles-Kemp. Previous directors include Professors Peter Komisarczuk, Keith Martin, Keith Mayes, Chris Mitchell and Peter Wild.
751:
668:
579:
62:. It has also been awarded the status of Academic Centre of Excellence in Cyber Security Research (ACE-CSR) and hosts a Centre for Doctoral Training in cyber security.
166:
The ISG also includes a
Systems Security Research Lab (S2Lab), which was created in 2014, to investigate how to protect systems from software related threats, such as
39:. It has around 25 established academic posts, 7 visiting Professors or Fellows and over 90 research students. The Founder Director of the ISG was the late Professor
69:
in information security, being the first university in the world to offer a postgraduate course in the subject. In 2014 this course received full certification from
82:
1289:
924:
870:
661:
884:
841:
460:
70:
818:
684:
120:
512:
486:
427:
Ciechanowicz, Chez; Martin, Keith M.; Piper, Fred C.; Robshaw, Matthew J. B. (1 January 2003). Irvine, Cynthia; Armstrong, Helen (eds.).
147:, and general embedded/implementation system security. In 2008, the SCC was commissioned to perform a counter expertise review of the
119:
The ISG includes the Smart Card and IoT Security Centre (previously named Smart Card Centre, SCC) that was founded in
October 2002 by
917:
444:
797:
88:
Research topics addressed by the ISG include: the design and evaluation of cryptographic algorithms, protocols and key management;
554:
1120:
210:
136:
97:
716:
330:
155:. The SCC has received support from a number of industrial partners, such as Orange Labs (UK), the UK Cards Association,
910:
55:
726:
1236:
1191:
1004:
214:
116:(IoT); and human related aspects of cyber security. The current director of Research is Professor Stephen Wolthusen.
1115:
528:"20083843 Bijlage 1 OV Chipkaart 'Counter Expertise' Review of the TNO security analysis of the Dutch OV-Chipkaart"
1231:
1221:
1211:
1066:
823:
140:
1216:
1206:
1009:
969:
962:
952:
947:
957:
128:
1264:
1110:
1056:
746:
179:
109:
50:
Royal
Holloway's Founder's Building, where the ISG Smart Card and IoT Security Centre (SCC) was located.
813:
605:
1226:
1150:
761:
695:
224:
Royal
Holloway's Information Security Group has been mentioned in popular media, most notably in the
156:
59:
36:
163:. The current director of the Smart Card and IoT Security Centre is Dr. Konstantinos Markantonakis.
989:
255:
105:
1095:
1079:
1026:
431:. IFIP — The International Federation for Information Processing. Springer US. pp. 215–230.
375:
144:
113:
461:"Developing the Cyber Experts of the future - GCHQ certifies Master's Degrees in Cyber Security"
1155:
1145:
1016:
440:
230:
89:
66:
46:
305:
1090:
432:
194:
187:
183:
175:
851:
741:
387:
174:. The research in the lab covers many different Computer Science-related topics, such as
1165:
1085:
1046:
994:
979:
792:
653:
202:
198:
32:
28:
1283:
1246:
1201:
1160:
1140:
1036:
999:
974:
769:
31:. It is part of the Engineering, Physical Sciences and Mathematics School (EPMS) at
1196:
1041:
1031:
1021:
984:
933:
206:
148:
436:
1175:
356:
218:
1135:
1105:
1100:
1061:
132:
108:; mobile telecommunications security; authentication and identity management;
101:
93:
40:
403:"Information security: students aim to peer into the mind of the cyber thief"
1125:
648:
513:"Three universities gain recognition for their top cyber security education"
235:
1170:
1130:
160:
124:
27:) is one of the oldest academic departments focusing on Information and
167:
1051:
846:
171:
135:, applications and related technologies: its research topics include
45:
906:
657:
643:
355:
correspondent, Sean
Coughlan BBC News education (9 May 2013).
256:"Royal Holloway | Staff Directory | Information Security home"
153:
Dutch
Ministry of Transport, Public Works and Water Management
638:
633:
306:"Academic Centres of Excellence in Cyber Security Research"
775:
List of
Principals of Royal Holloway, University of London
487:"Royal Holloway wins Best Cyber Security Education Award"
1072:
Cryptographically secure pseudorandom number generator
357:"£7.5m university fund to train cybersecurity experts"
77:
at SC Awards Europe 2017 and in 2021 it was awarded
898:
429:
1184:
940:
834:
806:
785:
752:
List of Royal
Holloway, University of London people
734:
704:
193:Current and former associated academics include
918:
669:
8:
649:Royal Holloway, University of London website
555:"Phone invaders: The rise of mobile malware"
131:, for training and research in the field of
58:in recognition of its work in the field of
925:
911:
903:
899:
676:
662:
654:
331:"CDT in Cyber Security at Royal Holloway"
842:Association of Commonwealth Universities
526:Waterstaat, Ministerie van Verkeer en.
247:
75:Best Cyber Security Education Programme
383:
373:
644:Systems Security Research Lab website
83:National Cyber Security Centre (NCSC)
7:
1290:Royal Holloway, University of London
879:
686:Royal Holloway, University of London
606:"Write-up boost for Royal Holloway"
73:. In 2017 it won the award for the
16:Academic information security group
634:Information Security Group website
14:
1260:
1259:
878:
865:
864:
725:
401:Davidson, Max (23 March 2012).
65:In 1992, the ISG introduced an
1121:Information-theoretic security
798:Royal Holloway Students' Union
54:In 1998 the ISG was awarded a
1:
717:Institute of Musical Research
580:"Honorary and visiting staff"
437:10.1007/978-0-387-35694-5_21
285:royalanniversarytrust.org.uk
1237:Message authentication code
1192:Cryptographic hash function
1005:Cryptographic hash function
1306:
1116:Harvest now, decrypt later
712:Information Security Group
584:Information Security Group
21:Information Security Group
1255:
1232:Post-quantum cryptography
902:
860:
723:
693:
639:Smart Card Centre website
56:Queen's Anniversary Prize
1222:Quantum key distribution
1212:Authenticated encryption
1067:Random number generation
281:"Previous Prize-winners"
141:Near Field Communication
1217:Public-key cryptography
1207:Symmetric-key algorithm
1010:Key derivation function
970:Cryptographic primitive
963:Authentication protocol
953:Outline of cryptography
948:History of cryptography
143:(NFC), mobile devices,
129:Giesecke & Devrient
958:Cryptographic protocol
110:cyber-physical systems
51:
1111:End-to-end encryption
1057:Cryptojacking malware
747:Elizabeth Jesser Reid
553:Campbell, MacGregor.
180:computer architecture
112:; embedded security;
49:
19:Founded in 1990, the
1227:Quantum cryptography
1151:Trusted timestamping
697:University of London
157:Transport for London
60:information security
37:University of London
990:Cryptographic nonce
491:royalholloway.ac.uk
260:royalholloway.ac.uk
106:security management
102:electronic commerce
1096:Subliminal channel
1080:Pseudorandom noise
1027:Key (cryptography)
814:Founder's Building
762:The Princess Royal
386:has generic name (
114:Internet of Things
52:
1277:
1276:
1273:
1272:
1156:Key-based routing
1146:Trapdoor function
1017:Digital signature
896:
895:
604:Macleod, Donald.
231:The Da Vinci Code
176:operating systems
90:provable security
1297:
1263:
1262:
1091:Insecure channel
927:
920:
913:
904:
900:
887:
882:
881:
873:
868:
867:
729:
698:
687:
678:
671:
664:
655:
621:
620:
618:
616:
601:
595:
594:
592:
590:
576:
570:
569:
567:
565:
550:
544:
543:
541:
539:
532:rijksoverheid.nl
523:
517:
516:
509:
503:
502:
500:
498:
483:
477:
476:
474:
472:
457:
451:
450:
424:
418:
417:
415:
413:
398:
392:
391:
385:
381:
379:
371:
369:
367:
352:
346:
345:
343:
341:
327:
321:
320:
318:
316:
302:
296:
295:
293:
291:
277:
271:
270:
268:
266:
252:
195:Whitfield Diffie
188:machine learning
184:program analysis
1305:
1304:
1300:
1299:
1298:
1296:
1295:
1294:
1280:
1279:
1278:
1269:
1251:
1180:
936:
931:
897:
892:
885:
871:
856:
852:Universities UK
830:
824:Bedford College
802:
781:
742:Thomas Holloway
730:
721:
700:
696:
689:
685:
682:
630:
625:
624:
614:
612:
603:
602:
598:
588:
586:
578:
577:
573:
563:
561:
552:
551:
547:
537:
535:
525:
524:
520:
511:
510:
506:
496:
494:
485:
484:
480:
470:
468:
467:(Press release)
459:
458:
454:
447:
426:
425:
421:
411:
409:
407:Telegraph.co.uk
400:
399:
395:
382:
372:
365:
363:
354:
353:
349:
339:
337:
329:
328:
324:
314:
312:
304:
303:
299:
289:
287:
279:
278:
274:
264:
262:
254:
253:
249:
244:
17:
12:
11:
5:
1303:
1301:
1293:
1292:
1282:
1281:
1275:
1274:
1271:
1270:
1268:
1267:
1256:
1253:
1252:
1250:
1249:
1244:
1242:Random numbers
1239:
1234:
1229:
1224:
1219:
1214:
1209:
1204:
1199:
1194:
1188:
1186:
1182:
1181:
1179:
1178:
1173:
1168:
1166:Garlic routing
1163:
1158:
1153:
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1086:Secure channel
1083:
1077:
1076:
1075:
1064:
1059:
1054:
1049:
1047:Key stretching
1044:
1039:
1034:
1029:
1024:
1019:
1014:
1013:
1012:
1007:
997:
995:Cryptovirology
992:
987:
982:
980:Cryptocurrency
977:
972:
967:
966:
965:
955:
950:
944:
942:
938:
937:
932:
930:
929:
922:
915:
907:
894:
893:
891:
890:
876:
861:
858:
857:
855:
854:
849:
844:
838:
836:
832:
831:
829:
828:
827:
826:
816:
810:
808:
804:
803:
801:
800:
795:
793:Insanity Radio
789:
787:
783:
782:
780:
779:
778:
777:
764:
755:
754:
749:
744:
738:
736:
732:
731:
724:
722:
720:
719:
714:
708:
706:
702:
701:
694:
691:
690:
683:
681:
680:
673:
666:
658:
652:
651:
646:
641:
636:
629:
628:External links
626:
623:
622:
596:
571:
545:
518:
504:
478:
452:
445:
419:
393:
347:
322:
297:
272:
246:
245:
243:
240:
226:New York Times
211:Michael Walker
203:David Naccache
199:Kenny Paterson
121:Royal Holloway
81:status by the
33:Royal Holloway
29:Cyber Security
15:
13:
10:
9:
6:
4:
3:
2:
1302:
1291:
1288:
1287:
1285:
1266:
1258:
1257:
1254:
1248:
1247:Steganography
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1202:Stream cipher
1200:
1198:
1195:
1193:
1190:
1189:
1187:
1183:
1177:
1174:
1172:
1169:
1167:
1164:
1162:
1161:Onion routing
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1141:Shared secret
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1081:
1078:
1073:
1070:
1069:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1048:
1045:
1043:
1040:
1038:
1037:Key generator
1035:
1033:
1030:
1028:
1025:
1023:
1020:
1018:
1015:
1011:
1008:
1006:
1003:
1002:
1001:
1000:Hash function
998:
996:
993:
991:
988:
986:
983:
981:
978:
976:
975:Cryptanalysis
973:
971:
968:
964:
961:
960:
959:
956:
954:
951:
949:
946:
945:
943:
939:
935:
928:
923:
921:
916:
914:
909:
908:
905:
901:
889:
888:
877:
875:
874:
863:
862:
859:
853:
850:
848:
845:
843:
840:
839:
837:
833:
825:
822:
821:
820:
817:
815:
812:
811:
809:
805:
799:
796:
794:
791:
790:
788:
784:
776:
773:
772:
771:
770:Julie Sanders
768:
765:
763:
760:
757:
756:
753:
750:
748:
745:
743:
740:
739:
737:
733:
728:
718:
715:
713:
710:
709:
707:
703:
699:
692:
688:
679:
674:
672:
667:
665:
660:
659:
656:
650:
647:
645:
642:
640:
637:
635:
632:
631:
627:
611:
607:
600:
597:
585:
581:
575:
572:
560:
559:New Scientist
556:
549:
546:
533:
529:
522:
519:
514:
508:
505:
493:. 7 June 2017
492:
488:
482:
479:
466:
462:
456:
453:
448:
446:9781475764918
442:
438:
434:
430:
423:
420:
408:
404:
397:
394:
389:
377:
362:
358:
351:
348:
336:
332:
326:
323:
311:
307:
301:
298:
286:
282:
276:
273:
261:
257:
251:
248:
241:
239:
237:
233:
232:
227:
222:
220:
216:
212:
208:
204:
200:
196:
191:
189:
185:
181:
177:
173:
169:
164:
162:
158:
154:
150:
146:
142:
138:
134:
130:
126:
122:
117:
115:
111:
107:
103:
99:
95:
91:
86:
84:
80:
76:
72:
68:
63:
61:
57:
48:
44:
42:
38:
34:
30:
26:
22:
1197:Block cipher
1042:Key schedule
1032:Key exchange
1022:Kleptography
985:Cryptosystem
934:Cryptography
883:
869:
786:Student life
766:
758:
711:
705:Subdivisions
613:. Retrieved
610:The Guardian
609:
599:
587:. Retrieved
583:
574:
562:. Retrieved
558:
548:
536:. Retrieved
531:
521:
507:
495:. Retrieved
490:
481:
469:. Retrieved
464:
455:
428:
422:
410:. Retrieved
406:
396:
364:. Retrieved
360:
350:
338:. Retrieved
334:
325:
313:. Retrieved
309:
300:
288:. Retrieved
284:
275:
263:. Retrieved
259:
250:
229:
225:
223:
207:Matt Robshaw
192:
165:
149:OV-chipkaart
118:
87:
78:
74:
64:
53:
24:
20:
18:
1185:Mathematics
1176:Mix network
759:Chancellor:
465:gchq.gov.uk
384:|last=
335:epsrc.ac.uk
310:epsrc.ac.uk
228:bestseller
219:Igor Muttik
215:Sean Murphy
133:Smart cards
94:smart cards
1136:Ciphertext
1106:Decryption
1101:Encryption
1062:Ransomware
835:Affiliates
767:Principal:
534:(in Dutch)
242:References
41:Fred Piper
1126:Plaintext
376:cite news
236:Dan Brown
1284:Category
1265:Category
1171:Kademlia
1131:Codetext
1074:(CSPRNG)
872:Category
564:11 March
538:11 March
471:11 March
412:11 March
366:11 March
361:BBC News
340:11 March
315:11 March
290:11 March
125:Vodafone
941:General
886:Commons
819:History
497:28 July
265:7 March
172:botnets
168:malware
151:by the
1052:Keygen
847:SEPnet
735:People
589:20 May
443:
186:, and
1082:(PRN)
807:Other
615:9 May
617:2019
591:2019
566:2016
540:2016
499:2019
473:2016
441:ISBN
414:2016
388:help
368:2016
342:2016
317:2016
292:2016
267:2016
217:and
170:and
161:ITSO
159:and
137:RFID
127:and
98:RFID
79:gold
71:GCHQ
433:doi
234:by
145:IoT
67:MSc
25:ISG
1286::
608:.
582:.
557:.
530:.
489:.
463:.
439:.
405:.
380::
378:}}
374:{{
359:.
333:.
308:.
283:.
258:.
238:.
221:.
213:,
209:,
205:,
201:,
197:,
190:.
182:,
178:,
139:,
123:,
104:;
100:;
96:;
92:;
85:.
35:,
926:e
919:t
912:v
677:e
670:t
663:v
619:.
593:.
568:.
542:.
515:.
501:.
475:.
449:.
435::
416:.
390:)
370:.
344:.
319:.
294:.
269:.
23:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.