[1]
T. N. A. Al Attar, M. A. Mohammed, and R. N. Mohammed, “Exploring Post-Quantum Cryptography: Evaluating Algorithm Resilience against Global Quantum Threats”, UHD J SCI TECH, vol. 9, no. 1, pp. 18–28, Jan. 2025.