Threat Modelling Quantum Computing Threat Modelling on a Generic CPS Setup || by Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou
Digital Signatures Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey || by Teik Guan Tan, Pawel Szalachowski, and Jianying Zhou
Vulnerabilities Analyzing Quantum Vulnerabilities using the CWE Framework || by Xiaodong Ye, Teik Guan Tan, Jianying Zhou
Adversarial Modelling Post-Quantum Adversarial Modeling: A User’s Perspective || by Teik Guan Tan, Jianying Zhou, Vishal Sharma, Saraju Mohanty