[1]
Mohammed Hasan Al-Dulaimi and Suha Kamal Al-Dulaimi, “A Comparative Study of Post-Quantum Cryptographic Algorithms Assessing Security and Performance Trade-offs”, Cybersys. J, vol. 2, no. 2, pp. 82–90, Dec. 2025, doi: 10.57238/csj.2025.1016.