803  | 0.911 | Satrya G.B.; Agus Y.M.; Mnaouer A.B. | A Comparative Study Of Post-Quantum Cryptographic Algorithm Implementations For Secure And Efficient Energy Systems Monitoring | Electronics (Switzerland), 12, 18 (2023) |
47756  | 0.89 | Khan M.A.; Khan M.A. | Securing Iot In The Post-Quantum Era: Implementation, Challenges And Future Directions | IEEE Communications Standards Magazine (2025) |
21837  | 0.883 | Minhas N.N.; Mansoor K. | Edge-Computing-Based Scheme For Post-Quantum Iot Security For E-Health | IEEE Internet of Things Journal, 11, 19 (2024) |
57480  | 0.88 | Kumari S.; Singh M.; Singh R.; Tewari H. | To Secure The Communication In Powerful Internet Of Things Using Innovative Post-Quantum Cryptographic Method | Arabian Journal for Science and Engineering, 47, 2 (2022) |
4323  | 0.875 | Chawla D.; Mehra P.S. | A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And Solutions | Internet of Things (Netherlands), 24 (2023) |
42432  | 0.865 | Obaid A.H.; Al-Husseini K.A.O.; Al-Shareeda M.A.; Almaiah M.A.; Shehab R. | Post-Quantum Secure Anonymous Authentication For Smart Cities | International Journal of Innovative Research and Scientific Studies, 8, 3 (2025) |
35232  | 0.862 | Ebrahimi S.; Bayat-Sarmadi S. | Lightweight And Dpa-Resistant Post-Quantum Cryptoprocessor Based On Binary Ring-Lwe | Proceedings - 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020 (2020) |
44005  | 0.854 | Mujlid H.M.; Alshahrani R. | Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly Detection | Journal of Supercomputing, 81, 9 (2025) |
5322  | 0.851 | Mishra N.; Hafizul Islam S.K.; Zeadally S. | A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-Things | Internet of Things (Netherlands), 25 (2024) |