Return to Article Details Cryptographic algorithm optimization for defense data security using quantum inspired algorithms Download Download PDF