653:
63:
751:
347:
522:
Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasised the human, social, and political dimension of security. On online voting, for example, he wrote "When you move from voting in person to voting at home (whether by post, by phone
548:
Anderson was well-known among
Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He was engaged in the "Campaign for Cambridge Freedoms" and had been an elected member of Cambridge University Council since 2002. In
441:
440:
718:
Anderson met his wife, Shireen, while he was working in
Johannesburg and they were married in Cambridge in 1992. Shireen Anderson is the coordinator of the Christina Kelly Association, of Churchill College, Cambridge. They have one daughter, Bavani, and four grandchildren.
1406:
1363:
Anderson's Rule means you cannot construct a database with scale, functionality and security because if you design a large system for ease of access it becomes insecure, while if you make it watertight it becomes impossible to
580:
will never be free of abuse by breaches of security. He said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as
1410:
1239:
384:
250:
1929:
442:
649:
Ross
Anderson was a pioneer and world leader in security engineering, and is distinguished for starting a number of new areas of research in hardware, software and systems.
523:
or over the
Internet) it vastly expands the scope for vote buying and coercion", making the point that it's not just a question of whether the encryption can be cracked.
371:
48:
375:
52:
1460:
1914:
1539:
639:
686:, which not only illuminates where the most effective attacks and defences may be found, but is also of fundamental importance to making policy for the
573:
Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."
1919:
1904:
1884:
1909:
1375:
1337:
623:
is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.
695:
667:
Anderson made trailblazing contributions that helped establish a number of new research topics, including security usability, hardware
527:
367:
44:
1939:
905:
363:
40:
607:
beginning in June 2013, Anderson suggested one way to begin stamping out the
British state's unaccountable involvement in this
1924:
1204:
1155:
872:
600:
567:
1350:
1894:
1260:
993:
Anderson, R. J. (1999). "Information technology in medical practice: Safety and privacy lessons from the United
Kingdom".
1889:
1220:
980:
611:
spying scandal was to entirely end the domestic secret services. Anderson: "Were I a legislator, I would simply abolish
1522:
1390:
306:
939:
676:
1468:
301:
1040:
1934:
646:
Professor Ross
Anderson, Personal Chair in Security Engineering, Computer Laboratory, University of Cambridge.
20:
1769:
1764:
790:
1603:
1428:
703:
508:
404:
1899:
1531:
359:
36:
1083:
938:– "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, August 2007
615:". Anderson noted the only way this kind of systemic data collection was made possible was through the
412:
1338:
http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/$ FILE/tcpa_rebuttal.pdf
1131:
1701:
722:
Anderson died unexpectedly at home with his family in
Cambridge on 28 March 2024, at the age of 67.
454:
at
Cambridge in 1995. In addition to teaching at the University of Cambridge, he also taught at the
1853:
1593:
1553:
1686:
1633:
1292:
1288:
824:
455:
424:
408:
379:(15 September 1956 – 28 March 2024) was a British researcher, author, and industry consultant in
245:
132:
1515:
1500:
957:
396:
122:
813:
683:
542:
490:
1062:
271:
1879:
1874:
416:
380:
832:
8:
1735:
1448:
1308:
888:
750:
742:
687:
660:
His early work on how systems fail established a base of empirical evidence for building
551:
1189:, Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, pp. 346–352,
1006:
619:
of private industry. The value of information-driven Web companies such as
Facebook and
346:
1837:
1786:
1713:
1696:
1691:
1018:
707:
672:
1583:
1424:
1113:
652:
62:
1817:
1807:
1508:
1200:
1151:
1050:
1010:
868:
819:
668:
559:
470:
229:
1388:
The Foundation for Information Policy Research Consultation response on Smart Meters
1325:
1022:
976:
1667:
1655:
1628:
1190:
1143:
1002:
828:
592:, which was initially published by Wiley in 2001. He was the founder and editor of
504:
400:
283:
211:
155:
1084:"Ross Anderson, professor and famed author of 'Security Engineering,' passes away"
839:
1827:
1752:
1725:
1608:
1563:
1394:
1264:
943:
1257:
1832:
1812:
1643:
1638:
1598:
1491:
1235:
1171:
769:
746:
616:
604:
311:
190:
1868:
1618:
1578:
1568:
1535:
1387:
1195:
1147:
786:
516:
512:
493:
486:
482:
466:
431:
and start his career as an academic researcher. He received his PhD in 1995.
428:
288:
224:
1054:
1802:
1613:
1358:
1312:
1014:
862:
661:
501:
497:
474:
462:
219:
1780:
1758:
1741:
1719:
1707:
1680:
1673:
1661:
1649:
1276:
935:
1822:
1774:
1747:
1730:
1588:
1573:
922:
710:
in 2015. Anderson was elected to the Royal Society of Edinburgh in 2023.
627:
1172:"Serpent: A Candidate Block Cipher for the Advanced Encryption Standard"
864:
Security engineering: a guide to building dependable distributed systems
1623:
1296:
630:, writing that there are various privacy and energy security concerns.
555:
declared Anderson to be Cambridge University's "most powerful person".
531:
385:
Department of Computer Science and Technology, University of Cambridge
1139:
1109:
563:
478:
102:
577:
535:
451:
420:
329:
255:
682:
Anderson was also one of the founders of the study of information
541:
Anderson was also a founder of the UK-Crypto mailing list and the
1530:
1114:"Two Practical and Provably Secure Block Ciphers: BEAR and LION"
1185:
Anderson, Ross J. (1995), "On Fibonacci keystream generators",
961:
699:
620:
265:
1221:"Why electronic voting isn't secure – but may be safe enough"
1058:
664:
for a wide range of applications from banking to healthcare.
427:
in 1992, to work on his doctorate under the supervision of
1930:
Members of the University of Cambridge Computer Laboratory
1258:
Why information security is hard – an economic perspective
906:"The Royal Academy of Engineering Annual Report 2009/2010"
612:
608:
1104:
1449:
https://rse.org.uk/fellowship/professor-ross-anderson/
387:
where he was part of the University's security group.
1376:
Cambridge's Head of Cryptography: I Would Abolish MI5
1142:: Springer-Verlag Berlin Heidelberg. pp. 89–97.
853:
851:
849:
576:
For years Anderson argued that by their nature large
846:
812:
511:competition. He also discovered weaknesses in the
383:. He was Professor of Security Engineering at the
1351:"Nine sacked for breaching core ID card database"
917:
915:
900:
898:
1866:
889:"Fellowship of the RSE: Professor Ross Anderson"
656:Ross Anderson in his office in Cambridge in 2018
461:Anderson's research interests were in security,
1212:
738:
736:
734:
588:Anderson was the author of several editions of
423:and banking industry before moving back to the
415:, and subsequently received a qualification in
1326:'Trusted Computing' Frequently Asked Questions
912:
895:
857:
1516:
1240:Department of Computer Science and Technology
1129:
251:Department of Computer Science and Technology
1218:
1078:
1076:
1074:
1072:
731:
594:Computer and Communications Security Reviews
1915:Fellows of the Royal Academy of Engineering
1409:. London: The Royal Society. Archived from
1523:
1509:
1034:
1032:
782:
780:
778:
749:
713:
696:Fellow of the Royal Academy of Engineering
558:In 2002, he became an outspoken critic of
528:Foundation for Information Policy Research
345:
19:For other people named Ross Anderson, see
1920:Fellows of the Royal Society of Edinburgh
1489:
1417:
1233:
1194:
1069:
953:
951:
806:
804:
802:
800:
798:
640:Fellow of the Royal Society (FRS) in 2009
411:where he was an undergraduate student of
1184:
1038:
992:
651:
538:group on information-technology policy.
496:primitives, and co-wrote with Biham and
438:
1905:Fellows of Churchill College, Cambridge
1049:(PhD thesis). University of Cambridge.
1029:
827: ed.). A & C Black.
775:
1867:
1348:
948:
795:
515:cipher and designed the stream cipher
434:
16:British computer scientist (1956–2024)
1504:
1399:
633:
1885:Alumni of Trinity College, Cambridge
1483:
1425:"Professor Ross Anderson FRS, FREng"
1234:Beresford, Alastair (3 April 2024).
810:
765:
763:
761:
759:
549:January 2004, the student newspaper
1910:Fellows of the Institute of Physics
1130:Anderson, Ross; Biham, Eli (1996).
1007:10.5694/j.1326-5377.1999.tb127721.x
970:
881:
833:10.1093/ww/9780199540884.013.U70837
13:
677:application programming interfaces
509:Advanced Encryption Standard (AES)
14:
1951:
1287:Election to the Council: Notices
1132:"Tiger: A Fast New Hash Function"
756:
995:The Medical Journal of Australia
770:Curriculum Vitae – Ross Anderson
160:University of Cambridge politics
61:
1940:People from Sandy, Bedfordshire
1453:
1442:
1381:
1369:
1342:
1331:
1318:
1301:
1281:
1277:Campaign for Cambridge Freedoms
1270:
1250:
1227:
1178:
1164:
1123:
1098:
986:
958:Ross J. Anderson's publications
601:global surveillance disclosures
399:. In 1978, he graduated with a
1219:Nicole Kobie (30 March 2015).
929:
526:In 1998, Anderson founded the
507:, one of the finalists in the
21:Ross Anderson (disambiguation)
1:
1297:Cambridge University Reporter
1134:. In Gollmann, Dieter (ed.).
791:Mathematics Genealogy Project
725:
395:Anderson was educated at the
1925:Fellows of the Royal Society
1492:"Ross Anderson, 1956 - 2024"
1490:Beresford, Alastair (2024).
1465:Churchill College, Cambridge
1429:Churchill College, Cambridge
1407:"EC/2009/02: Anderson, Ross"
1039:Anderson, Ross John (2014).
840:UK public library membership
704:Churchill College, Cambridge
694:Anderson was also elected a
390:
7:
1895:Computer security academics
1086:. The Record. 29 March 2024
979:author profile page at the
814:"Anderson, Prof. Ross John"
10:
1956:
1890:British technology writers
1246:. University of Cambridge.
1236:"Ross Anderson, 1956–2024"
698:(FREng) in 2009. He was a
446:Anderson on Malware (2010)
413:Trinity College, Cambridge
18:
1846:
1795:
1546:
1461:"Professor Ross Anderson"
626:Anderson was a critic of
570:operating system vision.
562:proposals, in particular
450:Anderson was appointed a
419:. Anderson worked in the
324:
320:
294:
282:
264:
238:
204:
197:
186:
178:
170:
163:Security Engineering book
139:
128:
118:
110:
91:
72:
60:
30:
1854:William, Prince of Wales
1378:, Forbes, 3 January 2013
1196:10.1007/3-540-60590-8_26
1187:Fast Software Encryption
1148:10.1007/3-540-60865-6_46
1136:Fast Software Encryption
1042:Robust Computer Security
964:bibliographic database.
867:. New York: John Wiley.
745:publications indexed by
642:. His nomination reads:
272:Robust Computer Security
1263:11 October 2006 at the
966:(subscription required)
825:Oxford University Press
714:Personal life and death
638:Anderson was elected a
456:University of Edinburgh
425:University of Cambridge
409:University of Cambridge
246:University of Cambridge
133:University of Cambridge
1349:Porter, Henry (2009).
692:
675:, and the analysis of
657:
447:
397:High School of Glasgow
123:High School of Glasgow
1935:Modern cryptographers
1393:13 March 2016 at the
1307:Cambridge Power 100,
942:5 August 2012 at the
655:
644:
543:economics of security
445:
823:(online edition via
590:Security Engineering
417:computer engineering
381:security engineering
1736:Henning Sirringhaus
688:information society
477:, he designed with
435:Research and career
401:Bachelor of Arts in
1900:Copyright scholars
1838:Steven D. Tanksley
1714:Richard Passingham
1697:Arthur B. McDonald
1650:Christopher Hunter
1063:uk.bl.ethos.338198
708:BCS Lovelace Medal
684:security economics
673:information hiding
658:
634:Awards and honours
448:
356:Ross John Anderson
152:Information policy
149:Security economics
77:Ross John Anderson
1862:
1861:
1818:Roger D. Kornberg
1808:H. Robert Horvitz
1765:Jonathan Tennyson
1674:Dimitris Kioussis
1315:, 16 January 2004
1206:978-3-540-60590-4
1157:978-3-540-60865-3
923:"List of Fellows"
874:978-0-470-06852-6
838:(Subscription or
669:tamper-resistance
560:trusted computing
545:research domain.
471:technology policy
443:
353:
352:
295:Doctoral students
230:Technology policy
199:Scientific career
87:15 September 1956
1947:
1759:Jesper Svejstrup
1742:Maurice Skolnick
1668:Jonathan Keating
1656:Graham Hutchings
1629:Nicholas Harberd
1559:Ross J. Anderson
1554:Robert Ainsworth
1525:
1518:
1511:
1502:
1501:
1496:
1495:
1487:
1481:
1480:
1478:
1476:
1467:. Archived from
1457:
1451:
1446:
1440:
1439:
1437:
1435:
1421:
1415:
1414:
1403:
1397:
1385:
1379:
1373:
1367:
1366:
1346:
1340:
1335:
1329:
1322:
1316:
1305:
1299:
1285:
1279:
1274:
1268:
1254:
1248:
1247:
1231:
1225:
1224:
1216:
1210:
1209:
1198:
1182:
1176:
1175:
1168:
1162:
1161:
1127:
1121:
1120:
1118:
1102:
1096:
1095:
1093:
1091:
1080:
1067:
1066:
1036:
1027:
1026:
990:
984:
977:Ross J. Anderson
974:
968:
967:
955:
946:
933:
927:
926:
919:
910:
909:
902:
893:
892:
885:
879:
878:
855:
844:
843:
836:
816:
808:
793:
787:Ross J. Anderson
784:
773:
767:
754:
753:
743:Ross J. Anderson
740:
706:and awarded the
444:
403:mathematics and
378:
349:
344:
341:
339:
337:
335:
333:
331:
284:Doctoral advisor
278:
212:Computer science
174:Shireen Anderson
156:Serpent (cipher)
146:Banking security
98:
86:
84:
67:Anderson in 2008
65:
55:
32:Ross J. Anderson
28:
27:
1955:
1954:
1950:
1949:
1948:
1946:
1945:
1944:
1865:
1864:
1863:
1858:
1842:
1828:Joseph Stiglitz
1791:
1753:Malcolm Stevens
1726:Wolfram Schultz
1609:James Gimzewski
1584:Michel Chrétien
1564:Michael Ashfold
1542:
1529:
1499:
1488:
1484:
1474:
1472:
1459:
1458:
1454:
1447:
1443:
1433:
1431:
1423:
1422:
1418:
1413:on 7 July 2019.
1405:
1404:
1400:
1395:Wayback Machine
1386:
1382:
1374:
1370:
1355:theguardian.com
1347:
1343:
1336:
1332:
1324:Ross Anderson:
1323:
1319:
1306:
1302:
1293:7 November 2006
1289:2 December 2002
1286:
1282:
1275:
1271:
1265:Wayback Machine
1256:Ross Anderson:
1255:
1251:
1232:
1228:
1217:
1213:
1207:
1183:
1179:
1170:
1169:
1165:
1158:
1128:
1124:
1116:
1103:
1099:
1089:
1087:
1082:
1081:
1070:
1037:
1030:
991:
987:
983:Digital Library
975:
971:
965:
960:indexed by the
956:
949:
944:Wayback Machine
934:
930:
921:
920:
913:
904:
903:
896:
887:
886:
882:
875:
856:
847:
837:
809:
796:
785:
776:
768:
757:
741:
732:
728:
716:
636:
617:business models
599:After the vast
583:Anderson's Rule
439:
437:
405:natural science
393:
358:
328:
316:
276:
260:
234:
166:
129:Alma mater
106:
100:
96:
82:
80:
79:
78:
68:
56:
35:
33:
24:
17:
12:
11:
5:
1953:
1943:
1942:
1937:
1932:
1927:
1922:
1917:
1912:
1907:
1902:
1897:
1892:
1887:
1882:
1877:
1860:
1859:
1857:
1856:
1850:
1848:
1844:
1843:
1841:
1840:
1835:
1833:Rashid Sunyaev
1830:
1825:
1820:
1815:
1813:Thomas Kailath
1810:
1805:
1799:
1797:
1793:
1792:
1790:
1789:
1784:
1777:
1772:
1767:
1762:
1755:
1750:
1745:
1738:
1733:
1728:
1723:
1720:Guy Richardson
1716:
1711:
1704:
1699:
1694:
1689:
1684:
1681:Stephen Larter
1677:
1670:
1665:
1662:Peter Isaacson
1658:
1653:
1646:
1644:Christine Holt
1641:
1639:Brian Hemmings
1636:
1631:
1626:
1621:
1616:
1611:
1606:
1601:
1596:
1591:
1586:
1581:
1576:
1571:
1566:
1561:
1556:
1550:
1548:
1544:
1543:
1528:
1527:
1520:
1513:
1505:
1498:
1497:
1482:
1452:
1441:
1416:
1398:
1380:
1368:
1341:
1330:
1317:
1300:
1280:
1269:
1249:
1226:
1211:
1205:
1177:
1163:
1156:
1122:
1097:
1068:
1028:
985:
969:
947:
928:
911:
894:
880:
873:
859:Anderson, Ross
845:
794:
774:
755:
747:Google Scholar
729:
727:
724:
715:
712:
635:
632:
605:Edward Snowden
436:
433:
392:
389:
351:
350:
326:
322:
321:
318:
317:
315:
314:
312:George Danezis
309:
304:
298:
296:
292:
291:
286:
280:
279:
268:
262:
261:
259:
258:
253:
248:
242:
240:
236:
235:
233:
232:
227:
222:
217:
214:
208:
206:
202:
201:
195:
194:
191:Lovelace Medal
188:
184:
183:
180:
176:
175:
172:
168:
167:
165:
164:
161:
158:
153:
150:
147:
143:
141:
140:Known for
137:
136:
130:
126:
125:
120:
116:
115:
112:
108:
107:
101:
99:(aged 67)
93:
89:
88:
76:
74:
70:
69:
66:
58:
57:
34:
31:
15:
9:
6:
4:
3:
2:
1952:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1876:
1873:
1872:
1870:
1855:
1852:
1851:
1849:
1845:
1839:
1836:
1834:
1831:
1829:
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1809:
1806:
1804:
1801:
1800:
1798:
1794:
1788:
1785:
1783:
1782:
1778:
1776:
1773:
1771:
1768:
1766:
1763:
1761:
1760:
1756:
1754:
1751:
1749:
1746:
1744:
1743:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1721:
1717:
1715:
1712:
1710:
1709:
1705:
1703:
1702:Angela McLean
1700:
1698:
1695:
1693:
1690:
1688:
1685:
1683:
1682:
1678:
1676:
1675:
1671:
1669:
1666:
1664:
1663:
1659:
1657:
1654:
1652:
1651:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1625:
1622:
1620:
1619:Chris Goodnow
1617:
1615:
1612:
1610:
1607:
1605:
1602:
1600:
1599:Richard Ellis
1597:
1595:
1592:
1590:
1587:
1585:
1582:
1580:
1579:Peter Buneman
1577:
1575:
1572:
1570:
1569:Michael Batty
1567:
1565:
1562:
1560:
1557:
1555:
1552:
1551:
1549:
1545:
1541:
1537:
1536:Royal Society
1533:
1526:
1521:
1519:
1514:
1512:
1507:
1506:
1503:
1493:
1486:
1471:on 8 May 2024
1470:
1466:
1462:
1456:
1450:
1445:
1430:
1426:
1420:
1412:
1408:
1402:
1396:
1392:
1389:
1384:
1377:
1372:
1365:
1360:
1356:
1352:
1345:
1339:
1334:
1328:, August 2003
1327:
1321:
1314:
1310:
1304:
1298:
1294:
1290:
1284:
1278:
1273:
1267:, ACSAC 2001.
1266:
1262:
1259:
1253:
1245:
1241:
1237:
1230:
1222:
1215:
1208:
1202:
1197:
1192:
1188:
1181:
1173:
1167:
1159:
1153:
1149:
1145:
1141:
1137:
1133:
1126:
1115:
1111:
1107:
1106:Ross Anderson
1101:
1085:
1079:
1077:
1075:
1073:
1064:
1060:
1056:
1052:
1048:
1044:
1043:
1035:
1033:
1024:
1020:
1016:
1012:
1008:
1004:
1000:
996:
989:
982:
978:
973:
963:
959:
954:
952:
945:
941:
937:
936:The Blue Book
932:
924:
918:
916:
907:
901:
899:
890:
884:
876:
870:
866:
865:
860:
854:
852:
850:
841:
834:
830:
826:
822:
821:
815:
811:Anon (2014).
807:
805:
803:
801:
799:
792:
788:
783:
781:
779:
771:
766:
764:
762:
760:
752:
748:
744:
739:
737:
735:
730:
723:
720:
711:
709:
705:
701:
697:
691:
689:
685:
680:
678:
674:
670:
665:
663:
662:threat models
654:
650:
647:
643:
641:
631:
629:
624:
622:
618:
614:
610:
606:
602:
597:
595:
591:
586:
584:
579:
574:
571:
569:
565:
561:
556:
554:
553:
546:
544:
539:
537:
533:
529:
524:
520:
518:
514:
510:
506:
503:
499:
495:
494:cryptographic
492:
488:
484:
480:
476:
472:
468:
467:dependability
464:
459:
457:
453:
432:
430:
429:Roger Needham
426:
422:
418:
414:
410:
406:
402:
398:
388:
386:
382:
377:
373:
369:
365:
361:
357:
348:
343:
327:
323:
319:
313:
310:
308:
307:Robert Watson
305:
303:
300:
299:
297:
293:
290:
289:Roger Needham
287:
285:
281:
274:
273:
269:
267:
263:
257:
254:
252:
249:
247:
244:
243:
241:
237:
231:
228:
226:
225:Dependability
223:
221:
218:
215:
213:
210:
209:
207:
203:
200:
196:
192:
189:
185:
181:
177:
173:
169:
162:
159:
157:
154:
151:
148:
145:
144:
142:
138:
134:
131:
127:
124:
121:
117:
113:
109:
104:
95:28 March 2024
94:
90:
75:
71:
64:
59:
54:
50:
46:
42:
38:
29:
26:
22:
1803:John Holdren
1781:John Vederas
1779:
1757:
1740:
1718:
1706:
1692:David MacKay
1679:
1672:
1660:
1648:
1614:David Glover
1594:Michael Duff
1558:
1485:
1473:. Retrieved
1469:the original
1464:
1455:
1444:
1432:. Retrieved
1419:
1411:the original
1401:
1383:
1371:
1362:
1359:The Guardian
1354:
1344:
1333:
1320:
1303:
1283:
1272:
1252:
1243:
1229:
1214:
1186:
1180:
1166:
1135:
1125:
1105:
1100:
1088:. Retrieved
1046:
1041:
1001:(4): 181–4.
998:
994:
988:
972:
931:
883:
863:
858:
818:
721:
717:
693:
681:
666:
659:
648:
645:
637:
628:smart meters
625:
598:
593:
589:
587:
582:
575:
572:
557:
550:
547:
540:
525:
521:
502:block cipher
498:Lars Knudsen
475:cryptography
460:
449:
394:
355:
354:
270:
239:Institutions
198:
97:(2024-03-28)
25:
1880:2024 deaths
1875:1956 births
1823:Yakov Sinai
1775:Burt Totaro
1748:Karen Steel
1731:Keith Shine
1687:David Leigh
1589:Jenny Clack
1574:Martin Buck
302:Markus Kuhn
111:Nationality
1869:Categories
1708:David Owen
1634:John Hardy
1624:Wendy Hall
1604:Jeff Ellis
1357:. London:
842:required.)
772:, May 2007
726:References
603:leaked by
532:think tank
463:cryptology
220:Cryptology
83:1956-09-15
1787:John Wood
1770:John Todd
1313:Issue 591
1244:cam.ac.uk
1140:Cambridge
1110:Eli Biham
1047:cam.ac.uk
820:Who's Who
578:databases
568:Palladium
564:Microsoft
479:Eli Biham
407:from the
391:Education
135:(MA, PhD)
119:Education
105:, England
103:Cambridge
1538:elected
1475:16 April
1391:Archived
1261:Archived
1090:29 March
1055:53659223
1023:16255335
1015:10078187
940:Archived
861:(2008).
536:lobbying
452:lecturer
421:avionics
256:Ferranti
216:Security
179:Children
1796:Foreign
1547:Fellows
1540:in 2009
1534:of the
1532:Fellows
1309:Varsity
789:at the
552:Varsity
505:Serpent
340:/~rja14
325:Website
114:British
1434:14 May
1203:
1154:
1061:
1053:
1021:
1013:
962:Scopus
871:
700:Fellow
621:Google
277:(1995)
275:
266:Thesis
205:Fields
193:(2015)
187:Awards
171:Spouse
1847:Royal
1117:(PDF)
1059:EThOS
1019:S2CID
491:Tiger
473:. In
374:
370:
368:FREng
366:
362:
51:
47:
45:FREng
43:
39:
1477:2024
1436:2021
1291:and
1201:ISBN
1152:ISBN
1108:and
1092:2024
1051:OCLC
1011:PMID
869:ISBN
534:and
530:, a
517:Pike
513:FISH
500:the
489:and
487:LION
483:BEAR
481:the
469:and
376:FIET
372:FIMA
364:FRSE
334:.cam
92:Died
73:Born
53:FIET
49:FIMA
41:FRSE
1364:use
1191:doi
1144:doi
1003:doi
999:170
981:ACM
829:doi
702:of
613:MI5
609:NSA
566:'s
360:FRS
338:.uk
336:.ac
332:.cl
330:www
182:One
37:FRS
1871::
1463:.
1427:.
1361:.
1353:.
1311:,
1295:,
1242:.
1238:.
1199:,
1150:.
1138:.
1112:.
1071:^
1057:.
1045:.
1031:^
1017:.
1009:.
997:.
950:^
914:^
897:^
848:^
817:.
797:^
777:^
758:^
733:^
679:.
671:,
596:.
585:.
519:.
485:,
465:,
458:.
1524:e
1517:t
1510:v
1494:.
1479:.
1438:.
1223:.
1193::
1174:.
1160:.
1146::
1119:.
1094:.
1065:.
1025:.
1005::
925:.
908:.
891:.
877:.
835:.
831::
690:.
342:/
85:)
81:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.