{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T01:12:40Z","timestamp":1775524360601,"version":"3.50.1"},"reference-count":103,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Manipal University Jaipur"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01269-5","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T10:34:10Z","timestamp":1758882850000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact"],"prefix":"10.1186","volume":"12","author":[{"given":"Taniya","family":"Hasija","sequence":"first","affiliation":[]},{"given":"K. R.","family":"Ramkumar","sequence":"additional","affiliation":[]},{"given":"Amanpreet","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Malvinder Singh","family":"Bali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"key":"1269_CR1","doi-asserted-by":"crossref","unstructured":"Sharma S, Ramkumar K, Kaur A, Hasija T, Mittal S, Singh B. Post-quantum cryptography: a solution to the challenges of classical encryption algorithms, modern electronics devices and communication systems: select proceedings of MEDCOM 2021, pp. 23\u201338, 2023.","DOI":"10.1007\/978-981-19-6383-4_3"},{"issue":"7285","key":"1269_CR2","first-page":"45","volume":"464","author":"TD Ladd","year":"2010","unstructured":"Ladd TD, Jelezko F, Laflamme R, Nakamura Y, Monroe C, O\u2019Brien JL. Quantum Computers Nat. 2010;464(7285):45\u201353.","journal-title":"Quantum Computers Nat"},{"key":"1269_CR3","doi-asserted-by":"crossref","unstructured":"Hasija T, Ramkumar K, Kaur A, Mittal S, Singh B. A survey on nist selected third round candidates for post quantum cryptography, in 2022 7th International Conference on Communication and Electronics Systems (ICCES), 2022: IEEE, pp. 737\u2013743.","DOI":"10.1109\/ICCES54183.2022.9835864"},{"key":"1269_CR4","doi-asserted-by":"crossref","unstructured":"Ahn J et al. Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd). Energies. 2022;15(3):714.","DOI":"10.3390\/en15030714"},{"issue":"1","key":"1269_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1504\/IJCSM.2020.108787","volume":"12","author":"R Kumar","year":"2020","unstructured":"Kumar R, Naidu AS, Singh A, Tentu AN. McEliece cryptosystem: simulation and security vulnerabilities. Int J Comput Sci Math. 2020;12(1):64\u201381.","journal-title":"Int J Comput Sci Math"},{"key":"1269_CR6","doi-asserted-by":"crossref","unstructured":"Balamurugan C, Singh K, Ganesan G, Rajarajan M. Code-based post-quantum cryptography, 2021.","DOI":"10.20944\/preprints202104.0734.v1"},{"issue":"7","key":"1269_CR7","doi-asserted-by":"publisher","first-page":"6074","DOI":"10.1109\/JIOT.2022.3223576","volume":"10","author":"S Rani","year":"2022","unstructured":"Rani S, Babbar H, Srivastava G, Gadekallu TR, Dhiman G. Security framework for internet-of-things-based software-defined networks using blockchain. IEEE Internet Things J. 2022;10(7):6074\u201381.","journal-title":"IEEE Internet Things J"},{"key":"1269_CR8","unstructured":"Onuora A, Madubuike C, Otiko A, Nworie J. Post-Quantum cryptographic algorithm: A systematic review of round-2 candidates. Acad Inform Technol Profession AITP, 2020."},{"key":"1269_CR9","doi-asserted-by":"crossref","unstructured":"Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549(7671):188\u2013194.","DOI":"10.1038\/nature23461"},{"key":"1269_CR10","doi-asserted-by":"crossref","unstructured":"Ducas L et al. Crystals-dilithium: A lattice-based digital signature scheme, IACR transactions on cryptographic hardware and embedded systems, pp. 238\u201368, 2018.","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"1269_CR11","doi-asserted-by":"crossref","unstructured":"Micciancio D, Regev O. Lattice-based cryptography. In: Post-quantum cryptography. Springer; 2009. pp. 147\u201391.","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"1269_CR12","unstructured":"Chen L et al. Report on post-quantum cryptography. US Department of Commerce, National Institute of Standards and Technology."},{"key":"1269_CR13","doi-asserted-by":"crossref","unstructured":"Alagic G et al. Status report on the first round of the NIST post-quantum cryptography standardization process. 2019.","DOI":"10.6028\/NIST.IR.8240"},{"key":"1269_CR14","doi-asserted-by":"crossref","unstructured":"Saito T, Xagawa K, Yamakawa T. Tightly-secure key-encapsulation mechanism in the quantum random oracle model. In: Advances in cryptology\u2013EUROCRYPT 2018: 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part III 37, 2018: Springer, pp. 520\u2013551.","DOI":"10.1007\/978-3-319-78372-7_17"},{"key":"1269_CR15","doi-asserted-by":"crossref","unstructured":"Henrich J, Heinemann A, Wiesmaier A, Schmitt N. Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics, in International Conference on Information Security, 2023: Springer, pp. 267\u2013287.","DOI":"10.1007\/978-3-031-49187-0_14"},{"key":"1269_CR16","doi-asserted-by":"crossref","unstructured":"Alagic G, et al. Status report on the second round of the NIST post-quantum cryptography standardization process. Volume 2. US Department of Commerce, NIST; 2020. p. 69.","DOI":"10.6028\/NIST.IR.8240"},{"key":"1269_CR17","doi-asserted-by":"crossref","unstructured":"Shajahan R, Jain K, Krishnan P. A Survey on NIST 3 rd Round Post Quantum Digital Signature Algorithms. In: 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), 2024: IEEE, pp. 132\u2013140.","DOI":"10.1109\/ICMCSI61536.2024.00027"},{"key":"1269_CR18","doi-asserted-by":"crossref","unstructured":"Alagic G et al. Status report on the third round of the NIST post-quantum cryptography standardization process,., 2022.","DOI":"10.6028\/NIST.IR.8413"},{"issue":"6","key":"1269_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi H, Dutt N, Ray S, Regazzoni F, Banerjee I, Cammarota R. Post-quantum lattice-based cryptography implementations: A survey. ACM Comput Surv (CSUR). 2019;51(6):1\u201341.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1269_CR20","doi-asserted-by":"crossref","unstructured":"Singh S, Padhye S. Generalisations of NTRU cryptosystem. Security and Communication Networks. 2016;9(18):6315\u20136334.","DOI":"10.1002\/sec.1693"},{"key":"1269_CR21","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Howgrave-Graham N, Pipher J, Silverman JH, Whyte W. NTRUSIGN: Digital signatures using the NTRU lattice, in Cryptographers\u2019 track at the RSA conference, 2003: Springer, pp. 122\u2013140.","DOI":"10.1007\/3-540-36563-X_9"},{"key":"1269_CR22","unstructured":"Avanzi R et al. CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round. 2019;2(4):1\u201343."},{"key":"1269_CR23","doi-asserted-by":"crossref","unstructured":"Bos J et al. CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018: IEEE, pp. 353\u2013367.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"1269_CR24","doi-asserted-by":"crossref","unstructured":"Ma L, Wu X, Bai G. Parallel polynomial multiplication optimized scheme for CRYSTALS-KYBER Post-Quantum Cryptosystem based on FPGA, in 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), 2021: IEEE, pp. 361\u2013365.","DOI":"10.1109\/CISCE52179.2021.9445987"},{"issue":"4","key":"1269_CR25","first-page":"252","volume":"19","author":"T Hasija","year":"2023","unstructured":"Hasija T, Ramkumar K, Singh B, Kaur A, Mittal SK. A performance analysis of Root-Converging methods for developing post quantum cryptography algorithms to mitigate Key-Size-Based attacks. Int J Perform Eng. 2023;19(4):252.","journal-title":"Int J Perform Eng"},{"issue":"2","key":"1269_CR26","doi-asserted-by":"publisher","first-page":"04021008","DOI":"10.1061\/(ASCE)NH.1527-6996.0000447","volume":"22","author":"Sahil","year":"2021","unstructured":"Sahil, Sood SK. Scientometric analysis of natural disaster management research. Nat Hazards Rev. 2021;22(2):04021008.","journal-title":"Nat Hazards Rev"},{"key":"1269_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","volume":"133","author":"N Donthu","year":"2021","unstructured":"Donthu N, Kumar S, Mukherjee D, Pandey N, Lim WM. How to conduct a bibliometric analysis: an overview and guidelines. J Bus Res. 2021;133:285\u201396.","journal-title":"J Bus Res"},{"issue":"1","key":"1269_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17509\/ijcsne.v3i1.43181","volume":"3","author":"DN Al Husaeni","year":"2023","unstructured":"Al Husaeni DN, Nandiyanto ABD, Maryanti R. Bibliometric analysis of special needs education keyword using VOSviewer indexed by Google scholar. Indonesian J Community Special Needs Educ. 2023;3(1):1\u201310.","journal-title":"Indonesian J Community Special Needs Educ"},{"issue":"4","key":"1269_CR29","doi-asserted-by":"publisher","first-page":"305","DOI":"10.23919\/ICN.2023.0025","volume":"4","author":"S Garg","year":"2023","unstructured":"Garg S, Kaushal RK, Kumar N, Verma A. Bibliometric analysis of blockchain in the healthcare domain. Intell Converged Networks. 2023;4(4):305\u201312.","journal-title":"Intell Converged Networks"},{"issue":"3","key":"1269_CR30","doi-asserted-by":"publisher","first-page":"253","DOI":"10.5530\/jscires.9.3.33","volume":"9","author":"B Ghosh","year":"2020","unstructured":"Ghosh B, Dutta SP, Mallik A. Evolving trends of Indian research performance in cryptography: A bibliometric and computational investigation. J Sci Res. 2020;9(3):253\u201367.","journal-title":"J Sci Res"},{"issue":"2","key":"1269_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jdis-2017-0006","volume":"2","author":"C Chen","year":"2017","unstructured":"Chen C. Science mapping: a systematic review of the literature. J Data Inform Sci. 2017;2(2):1\u201340.","journal-title":"J Data Inform Sci"},{"issue":"1","key":"1269_CR32","first-page":"9","volume":"1","author":"NAHM Nordin","year":"2022","unstructured":"Nordin NAHM. Correlation between process engineering and special needs from bibliometric analysis perspectives. ASEAN J Community Special Needs Educ. 2022;1(1):9\u201316.","journal-title":"ASEAN J Community Special Needs Educ"},{"key":"1269_CR33","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1007\/s11192-015-1645-z","volume":"105","author":"O Ellegaard","year":"2015","unstructured":"Ellegaard O, Wallin JA. The bibliometric analysis of scholarly production: how great is the impact? Scientometrics. 2015;105:1809\u201331.","journal-title":"Scientometrics"},{"issue":"4","key":"1269_CR34","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/j.joi.2015.11.004","volume":"10","author":"R Williams","year":"2016","unstructured":"Williams R, Bornmann L. Sampling issues in bibliometric analysis. J Informetrics. 2016;10(4):1225\u201332.","journal-title":"J Informetrics"},{"key":"1269_CR35","doi-asserted-by":"crossref","unstructured":"Moral-Mu\u00f1oz JA, Herrera-Viedma E, Santisteban-Espejo A, Cobo MJ. Software tools for conducting bibliometric analysis in science: An up-to-date review. Profesional de la informaci\u00f3n\/Information Professional, 2020;29(1).","DOI":"10.3145\/epi.2020.ene.03"},{"issue":"2","key":"1269_CR36","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1177\/0312896219877678","volume":"45","author":"MK Linnenluecke","year":"2020","unstructured":"Linnenluecke MK, Marrone M, Singh AK. Conducting systematic literature reviews and bibliometric analyses. Aust J Manage. 2020;45(2):175\u201394.","journal-title":"Aust J Manage"},{"key":"1269_CR37","doi-asserted-by":"publisher","first-page":"102666","DOI":"10.1016\/j.artmed.2023.102666","volume":"144","author":"D Kumar","year":"2023","unstructured":"Kumar D, Sood SK, Rawat KS. Empowering elderly care with intelligent IoT-Driven smart toilets for home-based infectious health monitoring. Artif Intell Med. 2023;144:102666.","journal-title":"Artif Intell Med"},{"issue":"26","key":"1269_CR38","doi-asserted-by":"publisher","first-page":"18829","DOI":"10.1007\/s00521-023-08788-3","volume":"35","author":"SK Sood","year":"2023","unstructured":"Sood SK, Rawat KS, Kumar D. Scientometric analysis of ICT-assisted intelligent control systems response to COVID-19 pandemic. Neural Comput Appl. 2023;35(26):18829\u201349.","journal-title":"Neural Comput Appl"},{"issue":"4","key":"1269_CR39","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/EMR.2022.3195923","volume":"50","author":"SK Sood","year":"2022","unstructured":"Sood SK, Rawat KS, Sharma G. Role of enabling technologies in soft tissue engineering: a systematic literature review. IEEE Eng Manage Rev. 2022;50(4):155\u201369.","journal-title":"IEEE Eng Manage Rev"},{"issue":"4","key":"1269_CR40","first-page":"413","volume":"50","author":"C Baskaran","year":"2013","unstructured":"Baskaran C. Scientometric analysis of cryptography research output. SRELS J Inform Manage. 2013;50(4):413\u201321.","journal-title":"SRELS J Inform Manage"},{"key":"1269_CR41","doi-asserted-by":"crossref","unstructured":"Dewamuni Z, Shanmugam B, Azam S, Thennadil S. Bibliometric analysis of IoT lightweight cryptography. Information. 2023;14(12):635.","DOI":"10.3390\/info14120635"},{"key":"1269_CR42","doi-asserted-by":"crossref","unstructured":"Sharma P, Gupta V, Sood SK. Post-Quantum cryptography research landscape: A scientometric perspective. J Comput Inform Syst, pp. 1\u201322, 2023.","DOI":"10.1080\/08874417.2023.2260333"},{"key":"1269_CR43","doi-asserted-by":"crossref","unstructured":"Grooby S, Dargahi T, Dehghantanha A. A bibliometric analysis of authentication and access control in IoT devices, handbook of big data and IoT security, pp. 25\u201351, 2019.","DOI":"10.1007\/978-3-030-10543-3_3"},{"key":"1269_CR44","doi-asserted-by":"crossref","unstructured":"Chen Z, Hu G, Zheng M, Song X, Chen L. Bibliometrics of machine learning research using homomorphic encryption. Mathematics. 2021;9(21):2792.","DOI":"10.3390\/math9212792"},{"key":"1269_CR45","doi-asserted-by":"crossref","unstructured":"AlRyalat AS S., M L. W., M S. M. Comparing bibliometric analysis using pubmed, scopus, and web of science databases. JoVE (Journal Visualized Experiments). 2019;152:pe58494.","DOI":"10.3791\/58494"},{"key":"1269_CR46","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.jrurstud.2020.10.050","volume":"81","author":"PD Malanski","year":"2021","unstructured":"Malanski PD, Dedieu B, Schiavi S. Mapping the research domains on work in agriculture. A bibliometric review from scopus database. J Rural Stud. 2021;81:305\u201314.","journal-title":"J Rural Stud"},{"key":"1269_CR47","unstructured":"Bhat WA, Khan NL, Manzoor A, Dada ZA, Qureshi RA. How to conduct bibliometric analysis using R-studio: a practical guide. European Economic Letters (EEL). 2023;13(3):681\u2013700."},{"issue":"3","key":"1269_CR48","first-page":"164","volume":"13","author":"S B\u00fcy\u00fckk\u0131d\u0131k","year":"2022","unstructured":"B\u00fcy\u00fckk\u0131d\u0131k S. A bibliometric analysis: A tutorial for the bibliometrix package in R using IRT literature. J Meas Evaluation Educ Psychol. 2022;13(3):164\u201393.","journal-title":"J Meas Evaluation Educ Psychol"},{"issue":"3","key":"1269_CR49","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1108\/BIJ-07-2019-0342","volume":"27","author":"V Saha","year":"2020","unstructured":"Saha V, Mani V, Goyal P. Emerging trends in the literature of value co-creation: a bibliometric analysis. Benchmarking: Int J. 2020;27(3):981\u20131002.","journal-title":"Benchmarking: Int J"},{"key":"1269_CR50","doi-asserted-by":"publisher","first-page":"6586","DOI":"10.1007\/s11227-020-03520-7","volume":"77","author":"TK Bhatia","year":"2021","unstructured":"Bhatia TK, Ramachandran RK, Doss R, Pan L. Data congestion in vanets: research directions and new trends through a bibliometric analysis. J Supercomputing. 2021;77:6586\u2013628.","journal-title":"J Supercomputing"},{"issue":"4","key":"1269_CR51","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.joi.2017.08.007","volume":"11","author":"M Aria","year":"2017","unstructured":"Aria M, Cuccurullo C. Bibliometrix: an R-tool for comprehensive science mapping analysis. J Informetrics. 2017;11(4):959\u201375.","journal-title":"J Informetrics"},{"key":"1269_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12528-011-9044-9","volume":"24","author":"J-L Hung","year":"2012","unstructured":"Hung J-L, Zhang K. Examining mobile learning trends 2003\u20132008: A categorical meta-trend analysis using text mining techniques. J Comput High Educ. 2012;24:1\u201317.","journal-title":"J Comput High Educ"},{"issue":"15","key":"1269_CR53","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1080\/09500690802314876","volume":"31","author":"MH Lee","year":"2009","unstructured":"Lee MH, Wu YT, Tsai CC. Research trends in science education from 2003 to 2007: A content analysis of publications in selected journals. Int J Sci Educ. 2009;31(15):1999\u20132020.","journal-title":"Int J Sci Educ"},{"issue":"2","key":"1269_CR54","doi-asserted-by":"publisher","first-page":"025008","DOI":"10.1103\/RevModPhys.94.025008","volume":"94","author":"C Portmann","year":"2022","unstructured":"Portmann C, Renner R. Security in quantum cryptography. Rev Mod Phys. 2022;94(2):025008.","journal-title":"Rev Mod Phys"},{"key":"1269_CR55","doi-asserted-by":"crossref","unstructured":"Ogutu H, Archi YE, D\u00e9nes D\u00e1vid L. Current trends in sustainable organization management: A bibliometric analysis. Oeconomia Copernicana. 2023;14(1):11\u201345.","DOI":"10.24136\/oc.2023.001"},{"key":"1269_CR56","doi-asserted-by":"crossref","unstructured":"Nicolaisen J. Citation analysis. Annual review of information science and technology. 2007;41(1):609\u2013641.","DOI":"10.1002\/aris.2007.1440410120"},{"issue":"1","key":"1269_CR57","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1108\/00220410810844150","volume":"64","author":"L Bornmann","year":"2008","unstructured":"Bornmann L, Daniel HD. What do citation counts measure? A review of studies on citing behavior. J Doc. 2008;64(1):45\u201380.","journal-title":"J Doc"},{"issue":"4","key":"1269_CR58","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.joi.2013.08.002","volume":"7","author":"L Waltman","year":"2013","unstructured":"Waltman L, van Eck NJ. A systematic empirical comparison of different approaches for normalizing citation impact indicators. J Informetrics. 2013;7(4):833\u201349.","journal-title":"J Informetrics"},{"key":"1269_CR59","unstructured":"Shen L. Shanghai Institute of Microsystem and Information Technology. Chinese Academy of Sciences. 2016;69."},{"issue":"12","key":"1269_CR60","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1109\/TC.2018.2835480","volume":"67","author":"Y Todo","year":"2018","unstructured":"Todo Y, Isobe T, Hao Y, Meier W. Cube attacks on non-blackbox polynomials based on division property. IEEE Trans Comput. 2018;67(12):1720\u201336.","journal-title":"IEEE Trans Comput"},{"key":"1269_CR61","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1007\/s11227-019-03009-y","volume":"76","author":"A Shahid","year":"2020","unstructured":"Shahid A, et al. Insights into relevant knowledge extraction techniques: a comprehensive review. J Supercomputing. 2020;76:1695\u2013733.","journal-title":"J Supercomputing"},{"issue":"1","key":"1269_CR62","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Rev Mod Phys. 2002;74(1):145.","journal-title":"Rev Mod Phys"},{"key":"1269_CR63","doi-asserted-by":"crossref","unstructured":"Gisin N, Thew R. Quantum communication. Nature photonics. 2007;1(3):165\u2013171.","DOI":"10.1038\/nphoton.2007.22"},{"issue":"23","key":"1269_CR64","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2007","unstructured":"Ac\u00edn A, Brunner N, Gisin N, Massar S, Pironio S, Scarani V. Device-independent security of quantum cryptography against collective attacks. Phys Rev Lett. 2007;98(23):230501.","journal-title":"Phys Rev Lett"},{"key":"1269_CR65","doi-asserted-by":"crossref","unstructured":"Lo H-K, Chau HF. Unconditional security of quantum key distribution over arbitrarily long distances. Science. 1999;283(5410):2050\u20132056.","DOI":"10.1126\/science.283.5410.2050"},{"issue":"23","key":"1269_CR66","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo H-K, Ma X, Chen K. Decoy state quantum key distribution. Phys Rev Lett. 2005;94(23):230504.","journal-title":"Phys Rev Lett"},{"key":"1269_CR67","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo H-K, Chau HF, Ardehali M. Efficient quantum key distribution scheme and a proof of its unconditional security. J Cryptol. 2005;18:133\u201365.","journal-title":"J Cryptol"},{"issue":"2","key":"1269_CR68","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1103\/RevModPhys.81.865","volume":"81","author":"R Horodecki","year":"2009","unstructured":"Horodecki R, Horodecki P, Horodecki M, Horodecki K. Quantum entanglement. Rev Mod Phys. 2009;81(2):865.","journal-title":"Rev Mod Phys"},{"issue":"4","key":"1269_CR69","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1109\/TIT.2008.2009798","volume":"55","author":"K Horodecki","year":"2009","unstructured":"Horodecki K, Horodecki M, Horodecki P, Oppenheim J. General paradigm for distilling classical key from quantum States. IEEE Trans Inf Theory. 2009;55(4):1898\u2013929.","journal-title":"IEEE Trans Inf Theory"},{"key":"1269_CR70","doi-asserted-by":"crossref","unstructured":"Scarani V, Bechmann-Pasquinucci H, Cerf NJ, Du\u0161ek M, L\u00fctkenhaus N, Peev M. The security of practical quantum key distribution. Reviews of modern physics. 2009;81(3):1301.","DOI":"10.1103\/RevModPhys.81.1301"},{"issue":"6660","key":"1269_CR71","first-page":"575","volume":"390","author":"D Bouwmeester","year":"1997","unstructured":"Bouwmeester D, Pan J-W, Mattle K, Eibl M, Weinfurter H, Zeilinger A. Experimental Quantum Teleportation Nat. 1997;390(6660):575\u20139.","journal-title":"Experimental Quantum Teleportation Nat"},{"key":"1269_CR72","doi-asserted-by":"crossref","unstructured":"Yin J et al. Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature. 2020;582(7813):501\u20135.","DOI":"10.1038\/s41586-020-2401-y"},{"issue":"6","key":"1269_CR73","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert AK. Quantum cryptography based on bell\u2019s theorem. Phys Rev Lett. 1991;67(6):661.","journal-title":"Phys Rev Lett"},{"issue":"3","key":"1269_CR74","doi-asserted-by":"publisher","first-page":"030502","DOI":"10.1103\/PhysRevLett.110.030502","volume":"110","author":"A Leverrier","year":"2013","unstructured":"Leverrier A, Garc\u00eda-Patr\u00f3n R, Renner R, Cerf NJ. Security of continuous-variable quantum key distribution against general attacks. Phys Rev Lett. 2013;110(3):030502.","journal-title":"Phys Rev Lett"},{"issue":"2","key":"1269_CR75","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl M, K\u00f6nig R, Renner R. Postselection technique for quantum channels with applications to quantum cryptography. Phys Rev Lett. 2009;102(2):020504.","journal-title":"Phys Rev Lett"},{"key":"1269_CR76","doi-asserted-by":"crossref","unstructured":"Joseph D et al. Transitioning organizations to post-quantum cryptography. Nature. 2022;605(7909):237\u2013243.","DOI":"10.1038\/s41586-022-04623-2"},{"issue":"6","key":"1269_CR77","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1038\/nphoton.2015.83","volume":"9","author":"S Pirandola","year":"2015","unstructured":"Pirandola S, et al. High-rate measurement-device-independent quantum cryptography. Nat Photonics. 2015;9(6):397\u2013402.","journal-title":"Nat Photonics"},{"key":"1269_CR78","doi-asserted-by":"crossref","unstructured":"Pirandola S et al. Advances in quantum cryptography. Advances in optics and photonics. 2020;12(4):1012\u20131236.","DOI":"10.1364\/AOP.361502"},{"key":"1269_CR79","doi-asserted-by":"crossref","unstructured":"Xu F, Ma X, Zhang Q, Lo H-K, Pan J-W. Secure quantum key distribution with realistic devices. Reviews of modern physics. 2020;92(2):025002.","DOI":"10.1103\/RevModPhys.92.025002"},{"issue":"19","key":"1269_CR80","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","volume":"117","author":"H-L Yin","year":"2016","unstructured":"Yin H-L, et al. Measurement-device-independent quantum key distribution over a 404 Km optical fiber. Phys Rev Lett. 2016;117(19):190501.","journal-title":"Phys Rev Lett"},{"key":"1269_CR81","unstructured":"Alkim E, Ducas L, P\u00f6ppelmann T, Schwabe P. Post-quantum key {Exchange\u2014A} new hope, in 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 327\u2013343."},{"issue":"3","key":"1269_CR82","doi-asserted-by":"publisher","first-page":"030501","DOI":"10.1103\/PhysRevLett.120.030501","volume":"120","author":"S-K Liao","year":"2018","unstructured":"Liao S-K, et al. Satellite-relayed intercontinental quantum network. Phys Rev Lett. 2018;120(3):030501.","journal-title":"Phys Rev Lett"},{"key":"1269_CR83","doi-asserted-by":"crossref","unstructured":"Diamanti E, Lo H-K, Qi B, Yuan Z. Practical challenges in quantum key distribution. npj Quantum Information. 2016;2(1):1\u201312.","DOI":"10.1038\/npjqi.2016.25"},{"issue":"3","key":"1269_CR84","doi-asserted-by":"publisher","first-page":"033033","DOI":"10.1088\/1367-2630\/17\/3\/033033","volume":"17","author":"M Mirhosseini","year":"2015","unstructured":"Mirhosseini M, et al. High-dimensional quantum cryptography with twisted light. New J Phys. 2015;17(3):033033.","journal-title":"New J Phys"},{"issue":"22","key":"1269_CR85","doi-asserted-by":"publisher","first-page":"220501","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang W, Ding D-S, Sheng Y-B, Zhou L, Shi B-S, Guo G-C. Quantum secure direct communication with quantum memory. Phys Rev Lett. 2017;118(22):220501.","journal-title":"Phys Rev Lett"},{"issue":"19","key":"1269_CR86","doi-asserted-by":"publisher","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","volume":"121","author":"A Boaron","year":"2018","unstructured":"Boaron A, et al. Secure quantum key distribution over 421 Km of optical fiber. Phys Rev Lett. 2018;121(19):190502.","journal-title":"Phys Rev Lett"},{"issue":"3","key":"1269_CR87","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht MR, Player R, Scott S. On the concrete hardness of learning with errors. J Math Cryptol. 2015;9(3):169\u2013203.","journal-title":"J Math Cryptol"},{"key":"1269_CR88","doi-asserted-by":"crossref","unstructured":"Flamini F, Spagnolo N, Sciarrino F. Photonic quantum information processing: a review. Reports on Progress in Physics. 2018;82(1):016001.","DOI":"10.1088\/1361-6633\/aad5b2"},{"issue":"3","key":"1269_CR89","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1038\/nphoton.2014.327","volume":"9","author":"B Korzh","year":"2015","unstructured":"Korzh B, et al. Provably secure and practical quantum key distribution over 307 Km of optical fibre. Nat Photonics. 2015;9(3):163\u20138.","journal-title":"Nat Photonics"},{"issue":"1","key":"1269_CR90","doi-asserted-by":"publisher","first-page":"015002","DOI":"10.1103\/RevModPhys.89.015002","volume":"89","author":"PJ Coles","year":"2017","unstructured":"Coles PJ, Berta M, Tomamichel M, Wehner S. Entropic uncertainty relations and their applications. Rev Mod Phys. 2017;89(1):015002.","journal-title":"Rev Mod Phys"},{"issue":"8","key":"1269_CR91","doi-asserted-by":"publisher","first-page":"083001","DOI":"10.1088\/2040-8978\/18\/8\/083001","volume":"18","author":"B Javidi","year":"2016","unstructured":"Javidi B, et al. Roadmap on optical security. J Opt. 2016;18(8):083001.","journal-title":"J Opt"},{"issue":"8","key":"1269_CR92","doi-asserted-by":"publisher","first-page":"080201","DOI":"10.1088\/1367-2630\/aad1ea","volume":"20","author":"A Ac\u00edn","year":"2018","unstructured":"Ac\u00edn A, et al. The quantum technologies roadmap: a European community view. New J Phys. 2018;20(8):080201.","journal-title":"New J Phys"},{"key":"1269_CR93","doi-asserted-by":"crossref","unstructured":"Sit A et al. High-dimensional intracity quantum cryptography with structured photons. Optica. 2017;4(9):1006\u20131010.","DOI":"10.1364\/OPTICA.4.001006"},{"issue":"1","key":"1269_CR94","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1021\/acs.nanolett.5b03724","volume":"16","author":"TB Hoang","year":"2016","unstructured":"Hoang TB, Akselrod GM, Mikkelsen MH. Ultrafast room-temperature single photon emission from quantum Dots coupled to plasmonic nanocavities. Nano Lett. 2016;16(1):270\u20135.","journal-title":"Nano Lett"},{"issue":"3","key":"1269_CR95","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1080\/14778238.2021.1945963","volume":"20","author":"I Bernatovi\u0107","year":"2022","unstructured":"Bernatovi\u0107 I, Slavec A, Gomezel, \u010cerne M. Mapping the knowledge-hiding field and its future prospects: a bibliometric co-citation, co-word, and coupling analysis. Knowl Manage Res Pract. 2022;20(3):394\u2013409.","journal-title":"Knowl Manage Res Pract"},{"issue":"1","key":"1269_CR96","doi-asserted-by":"publisher","first-page":"2124594","DOI":"10.1080\/23311975.2022.2124594","volume":"9","author":"L Phan Tan","year":"2022","unstructured":"Phan Tan L. Bibliometrics of social entrepreneurship research: cocitation and bibliographic coupling analyses. Cogent Bus Manage. 2022;9(1):2124594.","journal-title":"Cogent Bus Manage"},{"key":"1269_CR97","doi-asserted-by":"crossref","unstructured":"Van Eck N, Waltman L. Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics. 2010;84(2):523\u2013538.","DOI":"10.1007\/s11192-009-0146-3"},{"key":"1269_CR98","unstructured":"Van Eck NJ, Waltman L. VOSviewer manual, ed, 2016."},{"key":"1269_CR99","doi-asserted-by":"crossref","unstructured":"Yu J, Mu\u00f1oz-Justicia J. A bibliometric overview of twitter-related studies indexed in web of science. Future Internet. 2020;12(5):91.","DOI":"10.3390\/fi12050091"},{"key":"1269_CR100","doi-asserted-by":"crossref","unstructured":"Alkhammash R. Bibliometric, network, and thematic mapping analyses of metaphor and discourse in COVID-19 publications from 2020 to 2022. Frontiers in Psychology. 2023;13:1062943.","DOI":"10.3389\/fpsyg.2022.1062943"},{"issue":"7","key":"1269_CR101","first-page":"1382","volume":"62","author":"MJ Cobo","year":"2011","unstructured":"Cobo MJ, L\u00f3pez-Herrera AG, Herrera\u2010Viedma E, Herrera F. Science mapping software tools: review, analysis, and cooperative study among tools. J the. 2011;62(7):1382\u2013402. American Society for information Science and Technology.","journal-title":"J the"},{"key":"1269_CR102","doi-asserted-by":"crossref","unstructured":"Callon M, Courtial JP, Laville F. Co-word analysis as a tool for describing the network of interactions between basic and technological research: the case of polymer chemsitry. Scientometrics. 1991;22:155\u2013205.","DOI":"10.1007\/BF02019280"},{"key":"1269_CR103","doi-asserted-by":"crossref","unstructured":"M. Callon, J. P. Courtial, and F. Laville, \"Co-word analysis as a tool for describing the network of interactions between basic and technological research: The case of polymer chemsitry,\" Scientometrics, vol. 22, pp. 155-205, 1991.","DOI":"10.1007\/BF02019280"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01269-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01269-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01269-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T11:03:11Z","timestamp":1758884591000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01269-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,26]]},"references-count":103,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1269"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01269-5","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,26]]},"assertion":[{"value":"28 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"225"}}