{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T10:47:27Z","timestamp":1773398847295,"version":"3.50.1"},"reference-count":65,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:00:00Z","timestamp":1773360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CAIR project","award":["CSIR\/BEI\/HNP\/CAIR\/2020\/10"],"award-info":[{"award-number":["CSIR\/BEI\/HNP\/CAIR\/2020\/10"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Organizations have been moving on-premises data functionalities to cloud storage environments. The need for advanced hybrid cryptography is deemed a promising solution for securing data on cloud storage. This scoping review explores the application of hybrid cryptographic systems for data hiding in cloud storage. It focuses on identifying global research trends, technological approaches, and contextual gaps in implementation. The review systematically examines the literature from major scholarly databases to identify existing models that combine traditional and modern cryptographic techniques to enhance data confidentiality, integrity, and authenticity against cloud-based security threats. Out of the 8250 eligible papers, 24 were included in the review. The findings reveal that the majority of scholarly contributions originate from Asia, averaging 87.5%, as reflected in the distribution of included articles by continent. Particularly, India and China dominate in the space, with a complete absence of studies from Africa, including South Africa. This geographical disparity underscores a significant research gap in the contextualization of hybrid cryptographic frameworks suited to Africa\u2019s unique infrastructural and regulatory environments. The review further reveals a limited focus on the development of lightweight, scalable, and adaptable hybrid cryptographic schemes. Such approaches are essential for addressing challenges related to bandwidth limitations, computational efficiency, and regulatory compliance in developing regions. Consequently, this study contributes by establishing a comprehensive knowledge map of hybrid cryptography for cloud security, emphasizing the necessity for region-specific, context-aware frameworks. The findings provide a foundation for future investigations aimed at developing robust efficient hybrid cryptographic models that can strengthen data security in African cloud infrastructures.<\/jats:p>","DOI":"10.3390\/cryptography10020019","type":"journal-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:26:19Z","timestamp":1773390379000},"page":"19","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Scoping Analysis of the Literature on the Use of Hybrid Cryptographic Systems for Data Hiding in Cloud Storage"],"prefix":"10.3390","volume":"10","author":[{"given":"Luthando","family":"Mletshe","sequence":"first","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Sol Plaatje University, Kimberley 8301, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8307-3207","authenticated-orcid":false,"given":"Mnoneleli","family":"Nogwina","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Sol Plaatje University, Kimberley 8301, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6995-605X","authenticated-orcid":false,"given":"Colin","family":"Chibaya","sequence":"additional","affiliation":[{"name":"Faculty of Natural and Applied Sciences, Sol Plaatje University, Kimberley 8301, South Africa"}]}],"member":"1968","published-online":{"date-parts":[[2026,3,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.34190\/iccws.18.1.1038","article-title":"Secure cloud migration strategy (SCMS): A safe journey to the cloud","volume":"Volume 18","author":"Alharthi","year":"2023","journal-title":"Proceedings of the International Conference on Cyber Warfare and Security"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3111","DOI":"10.1016\/j.jksuci.2021.01.008","article-title":"A systematic literature Review: Risk analysis in cloud migration","volume":"34","author":"Gaol","year":"2022","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.46586\/tosc.v2020.i3.1-45","article-title":"Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols","volume":"2020","author":"Aly","year":"2020","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1134\/S1064226920120116","article-title":"An Information-Theoretic Approach for Reliable Distributed Storage Systems","volume":"65","author":"Kruglik","year":"2021","journal-title":"J. Commun. Technol. Electron."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhang, J., and Rashmi, K. (2025). Secure Convertible Codes for Passive Eavesdroppers. Proceedings of the 2025 IEEE International Symposium on Information Theory (ISIT), IEEE.","DOI":"10.1109\/ISIT63088.2025.11195603"},{"key":"ref_6","first-page":"1613","article-title":"A hybrid cryptography technique for data storage on cloud computing","volume":"24","author":"Bermani","year":"2021","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2578","DOI":"10.11591\/ijece.v9i4.pp2578-2584","article-title":"Hybrid cryptography security in public cloud using TwoFish and ECC algorithm","volume":"9","author":"Sankaran","year":"2019","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_8","first-page":"35","article-title":"Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication","volume":"6","author":"Subedar","year":"2020","journal-title":"Int. J. Math. Sci. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3996","DOI":"10.1016\/j.jksuci.2020.10.021","article-title":"A Review on Secure Data Deduplication: Cloud Storage Security Issue","volume":"34","author":"Prajapati","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_10","first-page":"448","article-title":"Emerging Challenges in Cloud Computing Security: A Comprehensive Review","volume":"1","author":"Kumar","year":"2024","journal-title":"Int. J. Adv. Eng. Technol. Innov."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"31805","DOI":"10.1109\/ACCESS.2021.3060317","article-title":"Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques","volume":"9","author":"Wahab","year":"2021","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chinnasamy, P., Padmavathi, S., Swathy, R., and Rakesh, S. (2020). Efficient Data Security Using Hybrid Cryptography on Cloud Computing. Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020, Springer.","DOI":"10.1007\/978-981-15-7345-3_46"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.jclinepi.2020.03.016","article-title":"Reporting scoping reviews-PRISMA ScR extension","volume":"123","author":"McGowan","year":"2020","journal-title":"J. Clin. Epidemiol."},{"key":"ref_14","unstructured":"Vyavahare, R.R. (2024). Exploring Hybrid Encryption for Enhanced Security of Electronic Health Record in Cloud Environment. [Doctoral Dissertation, National College of Ireland]."},{"key":"ref_15","first-page":"32","article-title":"Secure file storage using hybrid cryptography","volume":"6","author":"Karani","year":"2021","journal-title":"Int. J. Innov. Res. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s40537-021-00555-2","article-title":"Programming big data analysis: Principles and solutions","volume":"9","author":"Belcastro","year":"2022","journal-title":"J. Big Data"},{"key":"ref_17","first-page":"525","article-title":"An Efficient and Secured Big Data Storage in a Cloud-based Environment Using Hybrid Cryptography Algorithm and Rivest, Shamir, Adleman Algorithm","volume":"17","author":"Koppaka","year":"2023","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_18","first-page":"100870","article-title":"A hybrid ecliptic curve A hybrid elliptic curve cryptography (HECC) technique for fast encryption","volume":"29","author":"Rao","year":"2022","journal-title":"Meas. Sens."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"30867","DOI":"10.1038\/s41598-025-01315-5","article-title":"A hybrid ECC-AES encryption framework for secure and efficient cloud-based data protection","volume":"15","author":"Selvi","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comnet.2017.08.019","article-title":"A general framework to design secure cloud storage protocol using homomorphic encryption scheme","volume":"129","author":"Zhang","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1038\/s41598-024-70544-x","article-title":"Prediction of android ransomware with deep learning model using hybrid cryptography","volume":"14","author":"Kalphana","year":"2024","journal-title":"Sci. Rep."},{"key":"ref_22","first-page":"150","article-title":"A Hybrid Secure Cloud Platform Maintenance Based on Improved Attribute-Based Encryption Strategies","volume":"8","author":"Kumar","year":"2021","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shukla, S., and Patel, S.J. (2025). A Novel Pairing-Free ECC-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Secure Cloud Storage. Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), SCITEPRESS\u2014Science and Technology Publications, Lda.","DOI":"10.5220\/0013138600003899"},{"key":"ref_24","first-page":"324","article-title":"Geometric Cryptosystem Based Elliptic Curve Cryptography and Advanced Encryption Standard with Galois Counter Mode for Secure Cloud Storage","volume":"12","author":"Kumar","year":"2025","journal-title":"Int. J. Comput. Netw. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"da Rocha, M., Valadares, D.C.G., Perkusich, A., Gorg\u00f4nio, K.C., Pagno, R.T., and Will, N.C. (2020). Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment. arXiv.","DOI":"10.5220\/0009130600310043"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1007\/s11227-022-04751-6","article-title":"Secure cloud storage with anonymous deduplication using ID-based key management","volume":"79","author":"Gharib","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"46","DOI":"10.37934\/araset.32.1.4656","article-title":"Hybrid AES-Modified ECC Algorithm for Improved Data Security over Cloud Storage","volume":"32","author":"Jagadeesh","year":"2023","journal-title":"J. Adv. Res. Appl. Sci. Eng. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Jia, S., He, J., Zhao, X., Xia, L., Niu, Y., and Jing, J. (2020). Ensuring Data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer. Proceedings of the 2020 IEEE 5th International Conference on Cloud Computing and Big Data Analytics, IEEE.","DOI":"10.1109\/ICCCBDA49378.2020.9095700"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2","DOI":"10.33093\/jiwe.2022.1.2.1","article-title":"Secure File Storage On Cloud Using Hybrid Cryptography","volume":"1","author":"Lai","year":"2022","journal-title":"J. Inform. Web Eng."},{"key":"ref_30","first-page":"1355","article-title":"Enhanced Cloud File Security Using Hybrid Cryptographic Algorithms Learning","volume":"9","author":"Gaganswamy","year":"2025","journal-title":"Iconic Res. Eng. J."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Ali, A.M., Ghorpade, V.R., Pathak, N., and Sharma, N. (2022). Blockchain-Based Secure File Storage with Hybrid Cryptography and Machine Learning for Malware Detection. Advances in Information Communication Technology and Computing: Proceedings of AICTC 2021, Springer.","DOI":"10.1007\/978-981-19-0619-0_21"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Chinnasamy, P., and Deepalakshmi, P.D. (2018). Design of Secure Storage for Health-care Cloud using Hybrid Cryptography. Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 20\u201321 April 2018, IEEE.","DOI":"10.1109\/ICICCT.2018.8473107"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"86797","DOI":"10.1109\/ACCESS.2020.2991579","article-title":"Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1186\/s13673-019-0193-6","article-title":"An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case","volume":"9","author":"Zeng","year":"2019","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Adee, R., and Mouratidis, H. (2022). A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors, 22.","DOI":"10.3390\/s22031109"},{"key":"ref_36","first-page":"211","article-title":"Comprehensive Review of Cryptography and Steganography Algorithms","volume":"10","author":"Ahmed","year":"2025","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2607","DOI":"10.1007\/s10207-024-00853-9","article-title":"Evaluating the merits and constraints of cryptography-steganography fusion: A systematic analysis","volume":"4","author":"Haverkamp","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_38","first-page":"1","article-title":"An Approach of Securing Data using Combined Cryptography and Steganography","volume":"6","author":"Rosalina","year":"2020","journal-title":"Int. J. Math. Sci. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"20","DOI":"10.31181\/msa1120244","article-title":"A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance","volume":"1","author":"Baig","year":"2024","journal-title":"Manag. Sci. Adv."},{"key":"ref_40","first-page":"256","article-title":"Symmetric Encryption Algorithms: Review and Evaluation study","volume":"12","author":"Alenezi","year":"2020","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Hasija, U., Rustagi, P., Rathore, N., and Gupta, V. (2024). Cryptographic Foundations: A Comprehensive Review of Block Cipher and Stream Cipher Concepts. Proceedings of the 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), IEEE.","DOI":"10.23919\/INDIACom61295.2024.10498260"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"68","DOI":"10.47760\/ijcsmc.2024.v13i04.008","article-title":"A Survey on the Advanced Encryption Standard (AES): A Pillar of Modern Cryptography","volume":"13","author":"Sarkar","year":"2024","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"23427","DOI":"10.1109\/ACCESS.2024.3360412","article-title":"A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies","volume":"12","author":"Hasan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"7487","DOI":"10.30534\/ijatcse\/2020\/82952020","article-title":"An overview of Quantum Cryptography and Shor\u2019s Algorithm","volume":"9","author":"Ugwuishiwu","year":"2020","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bavdekar, R., Chopde, E.J., Agrawal, A., Bhatia, A., and Tiwari, K. (2023). Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations. Proceedings of the 2023 International Conference on Information Networking (ICON), IEEE.","DOI":"10.1109\/ICOIN56518.2023.10048976"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., and Xiong, N. (2023). Post-Quantum Security: Opportunities and Challenges. Sensors, 23.","DOI":"10.3390\/s23218744"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryprography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"key":"ref_48","first-page":"10292","article-title":"Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity","volume":"7","author":"Sunita","year":"2024","journal-title":"Int. J. Adv. Res. Comput. Sci. Technol."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Iavich, M., and Kuchukhidze, T. (2024). Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. Cryptography, 8.","DOI":"10.3390\/cryptography8020015"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ojetunde, B., Kurihara, T., Yano, K., Sakano, T., and Yokoyama, H. (2025). A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication. Network, 5.","DOI":"10.20944\/preprints202505.0990.v1"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Jackson, K.A., Miller, C.A., and Wang, D. (2024). Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer Nature.","DOI":"10.1007\/978-3-031-58751-1_15"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Dziechcaiarz, D., and Niemiec, M. (2024). Efficiency Analysis of NIST-Standardized Post-Quantum Cryptographic Algorithms for Digital Signatures in Various Environments. Electronics, 14.","DOI":"10.3390\/electronics14010070"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Gonzalez, R. (2025). Stateless Hash-Based Signatures for Post-Quantum Security Keys. Proceedings of the International Conference on Applied Cryptography and Network Security, Springer Nature.","DOI":"10.1007\/978-3-032-01806-9_10"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Kerimbayeva, A., Iavich, M., Begimbayeva, Y., Gnatyuk, S., Tynymbayev, S., Temirbekova, Z., and Ussatova, O. (2025). A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature Quantum Digital Signature. Information, 16.","DOI":"10.3390\/info16070564"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"23206","DOI":"10.1109\/ACCESS.2024.3364520","article-title":"Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography","volume":"12","author":"Ricci","year":"2024","journal-title":"IEEE Access"},{"key":"ref_56","first-page":"1","article-title":"Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution","volume":"Volume 24","author":"Aquina","year":"2024","journal-title":"Proceedings of the 2024 24th International Conference on Transparent Optical Networks (ICTON)"},{"key":"ref_57","first-page":"35","article-title":"The Quantum Security Deadline: Building Crypto-Agility Against Harvest Now Decrypt Later Threats","volume":"13","author":"Jena","year":"2025","journal-title":"Eur. J. Comput. Sci. Inf. Technol."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"14739","DOI":"10.1109\/ACCESS.2022.3147201","article-title":"Authenticated Encryption Schemes: A Systematic Review","volume":"10","author":"Jimale","year":"2022","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Bhati, A.S., Andreeva, E., and Viz\u2019ar, D. (2024). OAE-RUP: A Strong Online AEAD Security Notion and its Application to SAEF. Proceedings of the International Conference on Security and Cryptography for Networks, Springer Nature.","DOI":"10.1007\/978-3-031-71073-5_6"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Hirose, S., and Minematsu, K. (2024). A Formal Treatment of Envelope Encryption. Proceedings of the International Conference on Information Security and Cryptology, Springer.","DOI":"10.1007\/978-981-96-5566-3_6"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"82","DOI":"10.54097\/hset.v1i.431","article-title":"An Overview of RSA and OAEP Padding","volume":"1","author":"Zhong","year":"2022","journal-title":"Highlights Sci. Eng. Technol."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Dhokrat, J., Pulgam, N., Mane, V., and Maktum, T. (2024). Analyzing RSA and Paillier Encryption Schemes: Secure Multiplication in Homomorphic Environments. Proceedings of the 2024 International Conference on Computer, Electronics, Electrical Engineering & Their Applications, IEEE.","DOI":"10.1109\/IC2E362166.2024.10827028"},{"key":"ref_63","unstructured":"Ebrahimi, E. (2022). From Plaintext-extractability to IND-CCA Security. Proceedings of the International Conference on Selected Areas in Cryptography, Springer."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Ebrahimi, E. (2022). Post-quantum Security of Plain OAEP. Proceedings of the IACR International Conference on Public-Key Cryptography, Springer.","DOI":"10.1007\/978-3-030-97121-2_2"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"467","DOI":"10.7326\/M18-0850","article-title":"PRISMA Extension for Scoping Reviews (PRISMAScR): Checklist and Explanation","volume":"169","author":"Tricco","year":"2018","journal-title":"Ann. Intern. Med."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/2\/19\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T09:06:39Z","timestamp":1773392799000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/2\/19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,13]]},"references-count":65,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["cryptography10020019"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10020019","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,13]]}}}