We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

More in this section About Us

CDT Students


Each year we will be awarding ten fully-funded studentships to qualified candidates to join the CDT in Cyber Security at Royal Holloway.

The multidisciplinarity nature of cyber security is reflected in the broad background of the CDT cohorts: while our typical students may have recently obtained their undergraduate or masters qualifications in a wide range of disciplines (e.g. mathematics, computer science, economics, geography), we also welcome students joining the CDT from industry or the public sector.

Please see below for information on our current students - listed by the year they joined the CDT.



 Peter Beaumont     
Pete graduated from the MSc in Information Security at Royal Holloway in 2016 with a distinction, he then joined the CDT.  Prior to this he had worked as a military engineer with the British Army where he specialised as an electrical and mechanical engineer.  He spent much of his time in the Army managing design teams and undertaking programme and project management roles. 
Pete’s academic interests lie in the security of Industrial Control Systems (ICS), his research aims to explore techniques for modelling and simulating threats that are suitable for use by security practitioners in the field.               

 Ashley Fraser                     

 Rory Hopcraft

Robert Markiewicz                        

 Feargus Pendlebury

Eamonn Postlethwaite  
Eamonn studied for four years at Imperial College London and received an MSci in Mathematics with First Class (Honours), specialising in Number Theory and Algebra. Since joining the CDT in September of 2016, he has taken an interest in lattices and the so called "needle finding" class of algorithms, participated in and led various reading groups and seminars and joined the department's "capture the flag" team. 

 Pallavi Sivakumaran

Fernando Virdia


Benjamin Curtis
Ben joined Royal Holloway after completing his Integrated Masters Degree in Mathematics (MMath) from the University of Manchester in June 2015, where he graduated with first class honours. During his time in Manchester Ben focused on pure mathematics, specifically algebra and number theory, which sparked his interest in Cryptography. At the Centre of Doctoral Training Ben hopes to continue with a strong mathematical focus, applied to real world Cryptography.                         

 Rikki Amit Deo
Amit graduated from the University of Cambridge with distinction in a Master's Degree in Mathematics (MMath) and subsequently joined the CDT.
He is currently looking at post quantum cryptography. In particular, he is interested in the underlying hard problems used in lattice-based cryptography. He has also carried out a summer project applying machine learning to malware detection.                       

 Lydia Garms
Lydia completed her Bachelors degree in Mathematics at the University of Cambridge in 2014, and then completed her Masters degree in Applicable Mathematics at the London School of Economics in 2015. Her interests are in the field of cryptography. She is currently looking at the use of group signature schemes to secure privacy in reputation schemes.

Torben Hansen  Torben
Torben received a BSc and MSc in Mathematics from Aarhus University, Denmark.His main interests are applied cryptography e.g. secure commuminaction protocols, but he has previously worked on other topics such as (non-perfect) secret sharing and number theoretic perspectives of cryptography. Torben is currently working on improving the cryptographic processing in SSH and implementing schemes that meets stronger security notions.  

 Blake Loring
Blake joined the CDT in September 2015. His research interests include language design, program analysis and vulnerability detection. He is currently working on a new approach to improve the security of JavaScript programs.

 Jake Massimo
Jake’s academic interests lie in cryptography and number theory and he will continue to pursue these under supervision from Professor Kenny Paterson during his studies at Royal Holloway.

 Taryn-Leigh Padmore 
Taryn-Leigh Padmore Image

Taryn graduated with a 1st class BA Hons degree in Criminology followed by an MA in Criminology with Cybercrime at Kingston University.  Before becoming a full-time student, Taryn worked in an IT support role at the Bank of New York Mellon in London.  Taryn’s research interest is in the application of data security, privacy and trust in mobile medical apps/devices (mHealth), and is being supervised by Ravinder Barn in the School of Law

 James Patrick-Evans
James joined the CDT in September 2015

 Nathan Ricketts
Nathan joined the CDT in September 2015

 Nicholas Robinson
After completing his Bachelors degree in Human Geography and International Nick Robinson

Politics (BA) at Aberystwyth University in 2014, Nick joined Royal Holloway where he received a distinction in Geopolitics and Security (MSc), before joining the CDT in September 2015.  

Nick’s research is primarily grounded in Estonia, focussing on government initiatives such as Estonian e-Residency, Virtual Data Embassy and experimentations with blockchain technology - with the aim of developing a greater understanding of their impacts upon our traditional understandings of nation-state, border and embassy. 


Simon Bell
Received his first class BSc (Hons) in Computer Science from the University of Sussex (2014).


His final year project entitled: "Building a Honeypot to Research Cyber-Attack Techniques" involved creating an SSH honeypot in C and the analysis of various types of malicious software. This project was awarded the British Computer Society's Best Final Year Project.
He joined Royal Holloway's CDT in Cyber Security in 2014 and is being supervised by Prof Kenny Paterson and Dr Lorenzo Cavallaro, conducting research involving a measurement study on the lifecycle of phishing websites. His main interests include malware, honeypots, phishing and machine learning. 

Elizabeth Berners-Lee
Completed her BSc Mathematics degree at Royal Holloway in June 2013 with a First Class Honours, after which she studied MSc Information Security. She joined the second CDT cohort at Royal Holloway. Her past projects have included pseudo-random number generation, and flexibility within cryptographic primitives, focusing on the SHA-3 cryptographic hash standard.  

Giovanni Cherubin CherubinG
Received a BSc in Mechatronics and Computer Engineering from University of Pavia in 2013, and an MSc in Machine Learning from Royal Holloway, University of London in 2014. He joined the CDT at RHUL in 2014.

His research focuses in applying results of the Machine Learning theory (e.g., classical Statistical Learning theory, confident prediction models) to security problems. For instance, he is developing a practical framework to provide security guarantees to network protocols with respect to a class of traffic analysis attacks (Website Fingerprinting attacks). He also worked on improving Machine Learning-based attacks and/or proposing new defences (e.g., Website Fingerprinting, Membership Inference)."

Alex Davidson
Graduated from the University of Warwick with a BSc Mathematics degree, receiving first class honours.


He is supervised by Prof Carlos Cid and conducts reserach into the development of cryptographic constructions -  examples being constructions of efficient secure computation protocols and theoretical primitives such as cryptographic obfuscation.


Gregory Fenn
His research interests are in fenn-g_smgame-theoretic cyber security and financial security. In particular he is interested in the role of cyber-insurance as a means to manage business risks associated with computer and interest activities. His current research is looking at means to efficiently and accurately price cyber-insurance policies. His BA was in Mathematics and Philosophy at King’s College London, with a focus on abstract algebra, formal logic and epistemology.

Andreas Haggman  haggman-a_sm
Completed his undergraduate and masters degrees in the War Studies department at King's College London before joining the CDT in the autumn of 2014. His research interests lie in non-technical cyber security topics pertaining to military and government applications of cyber technologies, and organisational and policy responses to cyber security issues.

Suleman Ibrahim ibrahim-s_sm
He previously was awarded an MSc in Criminal Justice Policy at LSE and a BSc (Hons) in Sociology & Psychology from the University of Greenwich. His research interests are rooted in the sociology of cyber security.


Carlton Shepherd 
Graduated from Newcastle University with a first-class honours degree in B.Sc. (Hons) Computer Science in June 2013. He joined the second cohort of Centre for Doctoral Training students in September 2014, where he is being provisionally supervised by Dr. Kostas Markantonakis.

Joanne Woodage 
Joannne graduated from the University of Manchester with an Joanne WoodageMMaths Mathematics degree in  2013, and joined the second CDT cohort in September 2014. Joanne is interested in all aspects of theoretical and applied cryptography, in particular randomness in cryptography and post-Snowden cryptography. 



Naomi Farley
Naomi is currently working under the supervision of Prof. Jason Crampton farley-n_sm
(Information Security) and Dr. Gregory Gutin (Computer Science). Her primary research interests are Key Assignment Schemes and Access Control mechanisms.


Steven Hersee
Following completion of his undergraduate degree in Computer Science at the University of Nottingham in 2003 he joined as an Officer in the Royal Air Force and served for 7 1/2 years. Following his departure from the service he worked for the Metropolitan Police in a security based role for the London Olympics. He was then employed by Direct Line Group to establish an Intelligence section during its divestment from Royal Bank of Scotland. He is interested in all areas of Cyber Security but in particular he is interested in the geopolitics of Cyber Security and the diferent and often contrasting approaches taken by nation states, businesses and hacktivist groups.

 Jonathan Hoyland
Was awarded a masters degree in Computer Science from the University of Oxford. His research interests are model checking, verification of security protocols and formal methods.

 Thalia Laing lang-t_sm
Thalia received a BSc in Mathematics at Imperial College London, followed by an MSc in Mathematics of Communications and Cryptography from Royal Holloway. Completed Maters dissertation on Combinatorial Designs and their application to Key Predistribution in Wireless Sensor Networks. Current research focuses on secret sharing schemes and their application.


Robert Lee
 He studied for a Masters of Engineering in Computer Systems and
Software Enlee-r_smgineering at the University of York, graduating with Upper Second Class honours in 2013. He is currently supervised by Prof. Kostas Markantonakis. His research interests include Cryptography and Embedded System Security.


 Dusan Repel
Graduated from Plymouth University with 1stclass honours in Comrepel-dputer Science. His research interests lie mainly in the area of software security, including reverse engineering, malware and vulnerability detection and exploitation.



 Sam Scott scott-s
His background is in Mathematics and Cryptography: he obtained a BSc in Mathematics from Warwick, and an MSc in the Mathematics of Cryptography and Communications from Royal Holloway.His interests primarily lie in the ways in which Maths can be applied to information security in new and novel ways. In particular, he has recently been looking at the use of lattices in cryptographic constructions.

 Philippa Thornton  thornton-p_sm
 Pip came to the CDT from a professional background in the police and the military. She has BA degrees in History and Politics (Liverpool) and English Literature (Open University), and a Masters in English from King's College London. Her research interests are in the agency of search algorithms and their effect on language and the wider discourse. Her thesis - entitled Language in the Age of Algorithmic Reproduction - will be jointly supervised by Keith Martin from the ISG and Pete Adey from the Geography department. Pip maintains a blog to accompany her research. Linguistic Geographies can be found here.

Thyla Van Der Merwe   VDMerwe-t_sm   

Thyla received a BCom in Mathematics, Statistics and Economics, a BSc (Hons) in Mathematics and an MSc in Mathematics from the University of Cape Town, South Africa. She completed an MSc in Information Security at Royal Holloway as a FirstRand Laurie Dippenaar scholar before embarking on a PhD. Prior to starting at Royal Holloway, Thyla spent four years at an engineering firm, Tellumat (PTY) Ltd, as part of the security team. Thyla represented South Africa on the ISO/IEC JTC 1 SC 27 standards committee for five years, where her activities involved the standardization of cryptographic mechanisms and protocols. Thyla’s primary research focus is protocol analysis and she has recently completed two industry placements at the Mozilla Corporation (USA) where her work covered both Internet and messaging protocols.

 Conrad Williams williams-c
Studied Pure Mathematics (Bsc) at Royal Holloway University of London, and graduated with a 1st Class Honours in 2013. He received the Thewlis/Wilks prize and an IMA prize in his final year for exceptional grades and effort. He is part of the CDT Cohort and his research interests include Key Management and Cryptographically Enforced Access Control, and the applications of such theory to cloud computing. He is currently supervised by Prof Jason Crampton. Before starting his PhD he worked at a software company as a Technical Business Analyst.













Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback