top of page
Research Articles

Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey
by Teik Guan Tan, Pawel Szalachowski, and Jianying Zhou

Vulnerabilities
Analyzing Quantum Vulnerabilities using the CWE Framework
by Xiaodong Ye, Teik Guan Tan, Jianying Zhou

Post-Quantum Adversarial Modeling: A User’s Perspective
by Teik Guan Tan, Jianying Zhou, Vishal Sharma, Saraju Mohanty

Quantum Computing Threat Modelling on a Generic CPS Setup
by Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou
bottom of page