[1]
“Post-Quantum Cryptography in Corporate Data Protection”, IJACMT, vol. 2, no. 2, pp. 61–73, Jun. 2025, Accessed: Feb. 07, 2026. [Online]. Available: https://ijacmt.com/index.php/j/article/view/29