{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T10:03:46Z","timestamp":1779357826609,"version":"3.51.4"},"reference-count":86,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2025,1,2]]},"DOI":"10.1080\/08874417.2023.2260333","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T19:20:46Z","timestamp":1696015246000},"page":"119-140","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":11,"title":["Post-Quantum Cryptography Research Landscape: A Scientometric Perspective"],"prefix":"10.1080","volume":"65","author":[{"given":"Priya","family":"Sharma","sequence":"first","affiliation":[{"name":"NIT Kurukshetra, Haryana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vrinda","family":"Gupta","sequence":"additional","affiliation":[{"name":"NIT Kurukshetra, Haryana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sandeep Kumar","family":"Sood","sequence":"additional","affiliation":[{"name":"NIT Kurukshetra, Haryana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997651"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/61\/2\/002"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.200"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2972288"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/kpm.203"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00145"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20317"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.23919\/PICMET.2017.8125288"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SCIE.0000037368.31217.34"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102168"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-005-0255-6"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20274"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02461131"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00091"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017919924342"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014892106059"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20891"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12145-019-00408-w"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)NH.1527-6996.0000447"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-020-01061-y"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-021-04512-3"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1661-z"},{"key":"e_1_3_3_32_1","first-page":"131","article-title":"Research output on cryptography: a bibliometric study","volume":"2","author":"Devasena T","year":"2017","unstructured":"Devasena T, Rao PN. Research output on cryptography: a bibliometric study. IP Indian J Libr Sci Inf Technol. 2017;2:131\u201340.","journal-title":"IP Indian J Libr Sci Inf Technol"},{"key":"e_1_3_3_33_1","first-page":"413","article-title":"Scientometric analysis of cryptography research output","volume":"50","author":"Baskaran C","year":"2013","unstructured":"Baskaran C. Scientometric analysis of cryptography research output. SRELS J Inf Manag. 2013;50:413\u201321.","journal-title":"SRELS J Inf Manag"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-015-1708-1"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-022-04478-4"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_11"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.28991\/esj-2018-01147"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2022.3175633"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2022.2110056"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0190646"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/0194262X.2021.1892563"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jengtecman.2021.101658"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.121456"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-008-0216-y"},{"key":"e_1_3_3_45_1","unstructured":"Scopus. Scopus is the largest abstract and citation database of peer-reviewed literature: scientific journals books and conference proceedings. https:\/\/www. scopus. com."},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.5539\/ass.v9n5p18"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-009-0146-3"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04384-7"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098679"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22688"},{"key":"e_1_3_3_51_1","unstructured":"United Nation Organization. 2022. https:\/\/www.un.org\/development\/desa\/dpad\/wp- content\/uploads\/sites\/45\/WESP2022_ANNEX.pdf."},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978425"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133997"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0016"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_42"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"e_1_3_3_65_1","first-page":"182","article-title":"Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles","volume":"6061","author":"R\u00fcckert M","year":"2010","unstructured":"R\u00fcckert M. Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles. PQCrypto. 2010;6061:182\u2013200.","journal-title":"PQCrypto"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_29"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2611561"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700330"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090354"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_6"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_32"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_25"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49384-7_15"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_12"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898420.2898421"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_4"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_19"},{"key":"e_1_3_3_80_1","unstructured":"Announcement of the nist\u2019s call for proposals for public-key postquantum cryptography algorithms. accessed 2023 Mar. [Online]."},{"key":"e_1_3_3_81_1","unstructured":"Nist\u2019s second round announcement on the call for proposals of post-quantum cryptosystems. accessed 2023 Mar. [Online]."},{"key":"e_1_3_3_82_1","volume-title":"Status report on the third round of the nist post-quantum cryptography standardization process","author":"Alagic G","year":"2022","unstructured":"Alagic G, Apon D, Cooper D, Dang Q, Dang T, Kelsey J, Lichtinger J, Miller C, Moody D, Peralta R, et al. Status report on the third round of the nist post-quantum cryptography standardization process. US Department Of Commerce, NIST; 2022."},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014848323806"},{"key":"e_1_3_3_84_1","unstructured":"Pqcrypto project official. accessed 2023 Mar. [Online]."},{"key":"e_1_3_3_85_1","unstructured":"Safecrypto project official. accessed 2023 Mar. [Online]."},{"key":"e_1_3_3_86_1","unstructured":"Cryptomathcrest project. Accessed 2023 Mar. [Online]."},{"key":"e_1_3_3_87_1","unstructured":"Prometheus official. [accessed 2023 Mar]. [Online]."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2023.2260333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T18:47:52Z","timestamp":1736534872000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2023.2260333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":86,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,2]]}},"alternative-id":["10.1080\/08874417.2023.2260333"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2023.2260333","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,29]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}