top of page

Research Articles

Data Technology

Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey

by Teik Guan Tan, Pawel Szalachowski, and Jianying Zhou

Image by Luca Bravo

Vulnerabilities

Analyzing Quantum Vulnerabilities using the CWE Framework

by Xiaodong Ye, Teik Guan Tan, Jianying Zhou

Image by Alexandre Debiève

Post-Quantum Adversarial Modeling: A User’s Perspective

by Teik Guan Tan, Jianying Zhou, Vishal Sharma, Saraju Mohanty

Image by Ramón Salinero

Quantum Computing Threat Modelling on a Generic CPS Setup

by Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou

bottom of page