Are we ready to start quantum-readiness migration?
by Teik Guan Tan, Jianying Zhou Blockchains use Elliptic Curve Digital Signature Algorithm (ECDSA) to secure […]
Software will save the Quantum World Pt 2
Post-quantum cryptography is about using new software algorithms running on existing computers to defend against quantum […]
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices by Teik Guan Tan, De Wen Soh, […]
What is an appropriate threat modelling method to understand your enterprise’s exposure to quantum threats? We […]
Is it possible to make ECDSA signatures quantum-secure? Yes. Layering Quantum-Resistance into Classical Digital Signature Algorithms […]
By Teik Guan Tan, Pawel Szalachowski, Jianying Zhou Public key cryptography is threatened by the advent […]