“…Network Layer [37], [38], [47], [39]- [46] 4 Data Layer [48], [49], [58]- [65], [50] Quantum Properties [18], [21], [89], [26], [28], [31], [41], [44], [46], [70], [88] 2 Hash Based Signature [24], [25], [50], [56], [58], [59], [71] 3 Code-Based Cryptography [22] 4 Lattice Based Cryptography [20], [23], [53], [54], [57], [62], [63], [90], [38]- [40], [43], [45], [49], [51], [52] 5 Multivariate Cryptography [37], [55], [64] 6 Directed Acyclic Graph [66], [67] 7 Quantum Blind Signature…”