<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Prospects and Applications of Quantum Technologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Hrytsyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olexii Babii</string-name>
          <email>oleksii.babii.mknm.2020@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Nazarkevych</string-name>
          <email>mariia.a.nazarkevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Chubaievsyi</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Astapenya</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19 Kyoto str., Kyiv, 02156</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>191</fpage>
      <lpage>199</lpage>
      <abstract>
        <p>In the 21st century, the world is full of rapid changes and constant development of technology. The modern rhythm of life requires innovations and revolutionary solutions that would ensure efficiency, safety, and stability in various spheres of activity. In this context, quantum technologies come to the fore and provide unparalleled opportunities to transform our world. The relevance of research and study of quantum technologies is growing every day. They already today have the potential to change our understanding of cleaning processes, cryptography, telecommunications, medicine, and other industries. Understanding the principles of quantum physics and the possibilities of their implementation in practical application becomes necessary due to the rapid progress of scientific research in this area. This research paper aims to review the literature and analyze the prospects and applications of quantum technologies. It will be a valuable source of information for researchers, scientists, engineers, and all those interested in the future development of these advanced technologies. In this framework, the main principles of quantum physics will be developed; its advantages differ from classical technologies and demonstrative application in various fields. Current challenges and obstacles to the introduction of quantum technologies, as well as ways to overcome them, will also be highlighted. It is expected that this work will help readers gain a deeper understanding of the essence of quantum technologies and their impact on the modern world. It will encourage further research, contributing to the development and improvement of these powerful tools.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Quantum technologies</kwd>
        <kwd>quantum generative adversarial neural networks</kwd>
        <kwd>quantum computing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The work aims to review the literature and
explore the prospects for the application of
quantum technologies to reveal their potential
and identify opportunities in important areas
such as computing power, data encryption,
sensors, and precision measurements.</p>
      <p>
        In the field of quantum technology,
quantum randomness generators are crucial
because they generate random sequences of
numbers for numerous applications. The
successful application of photoelectric
methods to generate quantum randomness at
high speed and protect quantum side
information has been demonstrated in recent
works [1]. The creation of quantum neural
networks [
        <xref ref-type="bibr" rid="ref2 ref3">2–3</xref>
        ] also opens up possibilities for
the scalable application of quantum
randomness in new models and methods. The
application of quantum randomness in
quantum computing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], quantum machine
learning [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], and quantum sensing [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
creates several opportunities for new
technological advances and scientific
discoveries. Quantum randomness is a topic of
ongoing research in the field of quantum quantum randomness into a variety of
materials [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and quantum computing for applications. For example, special algorithms
financial applications [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Scientific and must be used to process quantum random
military communities [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] are very interested numbers in quantum computing, and protocols
in the development potential of quantum must be used for secure transmission and use
technologies [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], which can have a significant of quantum randomness in cryptography. In
impact on several fields, including medical and general, the understanding and application of
biological sciences [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], space [13], image quantum randomness opens up a wide range of
processing [14] (in particular for recognition opportunities for the development of new
systems [15]) and defense [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. National technologies and scientific research. This is a
Quantum Program [16] and the US National very important topic that is of great interest to
Quantum Technology Initiative [17] are two the scientific and technical community and has
examples of international initiatives and the potential for significant progress in several
European standards that are actively areas of human activity.
developing this field and helping to provide When creating a quantum random number
research, technology development, and generator, the issue of quantum noise is also
infrastructure to realize the potential of taken into account [
        <xref ref-type="bibr" rid="ref2">1–2</xref>
        ]. The reliability of
quantum technologies [18]. random numbers is critical for most
      </p>
      <p>
        Ensuring the stability and quality of applications. These include, for example,
quantum randomness generation is one of the cryptographic keys generated by random
main problems of the industry. The security numbers.
and reliability of quantum systems may be at Post-Quantum Secure Communication—
risk due to the potential vulnerability of some Cryptography Research, Control, and Quality
ways of generating quantum randomness to Issues—Another active area of quantum
specific attacks or external influences. More technology research [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The huge cost of
research and development is needed to ensure control is the main obstacle to the successful
the reliability and safety of quantum launch of quantum algorithms. Achieving
faultrandomness generation. tolerant and reliable large quantum algorithms
is difficult due to quantum error corrections.
2. Materials For three different levels of maturity—
2.1. Generators of Quantum 5 years, 5–10 years, and more than 10 years—
the authors [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] have identified different
      </p>
      <sec id="sec-1-1">
        <title>Randomness</title>
        <p>current research directions in the field of
quality control based on recent research. In
Furthermore, the creation of efficient Fig. 1, they are marked as a cycle of hype
protocols and algorithms to exploit these around the development and potential use of
random sequences is necessary to incorporate quantum computing.</p>
      </sec>
      <sec id="sec-1-2">
        <title>2.2. Quantum Generative</title>
      </sec>
      <sec id="sec-1-3">
        <title>Antagonistic Neural Networks</title>
        <p>Using the principles of deep learning and
quantum physics, quantum Generative
Adversarial Neural Networks (GANs) are a
powerful tool for creating new material. We
can explore this exciting area of research in
more detail by using the links provided.</p>
        <p>GANs, often used in deep learning to
generate accurate images, sounds, and other
types of data, are the basis of quantum GANs.
However, the use of quantum GANs allows us
to increase the quality and generate potential
by taking advantage of quantum mechanics.</p>
        <p>Quantum GANs represent and process
information using quantum bits (qubits), as
opposed to ordinary bits. This allows us to
develop more complex and accurate
generation models using the concepts of
quantum entanglement and exclusivity.
Quantum GANs can change quantum states and
provide new data using quantum operators.</p>
        <p>Quantum GANs can be used to create
quantum sequences, images, chemical
structures, and many other things. Quantum
GANs, for example, can be used to create new
quantum states for quantum computing or the
analysis of quantum systems. Quantum GANs
can also help develop new materials with
special properties or expand the scope of
quantum chemistry.</p>
        <p>Despite the great promise of quantum
GANs, scientists are still working to overcome
technical obstacles and improve algorithms.
Collaboration between experts in deep
learning, quantum physics, and computing is
needed to gain a deep understanding of
quantum GANs.</p>
        <p>Quantum generative adversarial neural
networks, in general, are a new method that
combines the advantages of deep learning with
the characteristics of quantum physics. They
open up new possibilities for creating and
making sense of complex data, which could
have a major impact on a variety of fields,
including chemistry, medicine, and computer
science.
2.3.</p>
      </sec>
      <sec id="sec-1-4">
        <title>Quantum Computing</title>
        <p>In the discipline of quantum computing,
calculations that are more complex than those
possible with classical computing are
performed using the concepts of quantum
mechanics. They provide a fresh perspective
on solving complex problems that require a lot
of computer power.</p>
        <p>Instead of using traditional bits to describe
and process data, quantum computing uses
quantum bits or qubits. The ability of qubits to
superpose allows them to represent any linear
combination of 0 and 1, not just 0 or 1.
Quantum effects used in computing can also be
applied to qubits, including quantum
entanglement and quantum superposition.</p>
        <p>Maintaining qubits in a finite (coherent)
state and minimizing calculation errors are
two fundamental problems of quantum
computing. To ensure the reliability and
accuracy of calculations, scientists invent
quantum algorithms and quantum correction
codes.</p>
        <p>
          Quantum computing can benefit many
fields such as artificial intelligence, chemistry,
medicine [19], optimization [20], encryption
[21], biometric protection systems [22], and
machine learning [
          <xref ref-type="bibr" rid="ref13">23</xref>
          ]. Real-time calculations
are of particular interest [
          <xref ref-type="bibr" rid="ref14">24</xref>
          ] based on
quantum technologies. For example, it could
improve our ability to solve the complex
mathematical puzzles needed to secure data in
cryptography. Optimization problems that
arise in complex supply chains, financial
markets, and other industries can also be
solved using quantum computing.
        </p>
        <p>The development of quantum computing is
rapidly advancing, and the number of qubits is
increasing, making this technology more
accessible and promising. In addition to
developing new quantum devices and
algorithms, researchers are still working to
make quantum systems stable and reliable. In
general, quantum computing opens a new era
in the study of computer science, allowing us to
solve problems that were previously
considered beyond the capabilities of classical
computers. They can become the basis for new
technologies and deep transformations in
many spheres of life.</p>
        <p>In his study [1] Goering and his co-authors
presented a quantum homodyne-based
random number generator that can generate
random sequences at a rate of 2.9 Gbit/s. This
method, which can be applied to both
cryptography and information security, is
highly resistant to quantum information about
the state of the system.</p>
        <p>
          Scalable discrete Quantum
GenerativeAntagonistic Neural Networks (Q-GANs),
developed by researchers including Smith
Chaudhary and group [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], can create new
information structures and solve complex
machine learning problems. This research
aims to improve the efficiency and scalability
of Q-GANs for use in various fields, including
signal processing and artificial intelligence,
and aims to improve their performance and
scalability.
        </p>
        <p>
          A review of quantum computing by Gill and
colleagues [
          <xref ref-type="bibr" rid="ref15">25</xref>
          ] offers a detailed look at the
current state of affairs in this field. It provides
a taxonomy of quantum algorithms as well as a
brief overview of important advances in
quantum computing, quantum cryptography,
and quantum programming. This review
greatly advances the knowledge of the
possibilities of quantum computing and points
to potential directions for future research.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. The Problem of Quantum</title>
    </sec>
    <sec id="sec-3">
      <title>Noises, Applied Application of</title>
      <p>the Capabilities of Quantum</p>
    </sec>
    <sec id="sec-4">
      <title>Computing</title>
      <p>University research is now mostly about
adapting quantum computing. The general
goal is to create a comparison mechanism for
an unbiased assessment of the advantages of
using one or another location. An illustration is
a study of the possibilities of a quantum
algorithm of an artificial neural network. In
their paper, they compare the complexity of
their quantum technique with classical
approaches. Table 1 shows a summary of the
obtained results.</p>
    </sec>
    <sec id="sec-5">
      <title>4. The Structure of a Quantum</title>
    </sec>
    <sec id="sec-6">
      <title>Computer</title>
      <p>Quantum computers have a complex structure
and implement quantum bits and operations on
them using various methods. Quantum bits,
quantum gates (quantum logic gates), quantum
detectors, quantum registers, and other
elements make up quantum computers.</p>
      <p>Qubits: the main element of a quantum
computer is a qubit—the quantum analog of a
classical bit. In quantum computers, qubits can
be implemented using several technologies,
such as quantum dots, etc.</p>
      <p>Control system: the computer needs a
special control system to control the qubits and
perform quantum operations on them. In
simple Chinese quantum computers, this
system can be provided with the help of
microcontrollers and special electronic devices.</p>
      <p>Detectors: to measure the quantum state of
qubits and obtain the results of calculations, a
quantum computer must have detectors
capable of sensing the quantum state of qubits.</p>
      <p>Quantum gates: These are elements that
perform quantum operations on qubits, such
as conditional phase shift, conditional bit shift,
conditional addition, and others.</p>
      <p>
        Quantum algorithms: The last component is
a set of quantum algorithms that can be
executed on a quantum computer. The most
common quantum algorithm is Shor’s
algorithm, which is used to factor integers, and
Grover’s algorithm [
        <xref ref-type="bibr" rid="ref16">26</xref>
        ].
      </p>
      <p>Control unit: A device that controls the
operations of a quantum computer and
provides communication between the
quantum register and other components.</p>
      <p>Quantum logic gate: a device that performs
quantum information processing by
manipulating qubits.</p>
      <p>Quantum logic circuit: A combination of
quantum gates and qubits to perform certain
quantum calculations. These can be, for
example, quantum logic circuits for Shor,
Grover, or Deutsch-Josa algorithms.</p>
      <p>Quantum register: a set of qubits used to
store and process information. The size of a
quantum register can vary from a few qubits to
several tens.</p>
      <sec id="sec-6-1">
        <title>Control and measurement: devices that</title>
        <p>provide control and measurement of the state
of qubits. These can be different types of
sensors, such as resistive transducers or
photodetectors.</p>
        <p>Control system: software and hardware
used to control devices and perform quantum
computations. These can be different types of
devices, such as FPGA-based or ASIC-based
controllers.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>5. Quantum Machine Learning</title>
      <p>One of the most advanced fields that combines
machine learning techniques with quantum
computing capabilities is known as quantum
machine learning. Scientists and educators pay
close attention to this field of research because
it creates new opportunities for solving
complex data processing and pattern
recognition problems.</p>
      <p>Creating quantum algorithms for
combinatorial optimization problems is one of
the applications of quantum machine learning.
Examples of such problems include factoring
numbers, finding the shortest path on a graph,
placing objects on the plane with the least
amount of overlap, and superpositioning the
atoms in a molecule with the least amount of
energy.</p>
      <p>Quantum learning enhancement, which uses
quantum computing systems to improve the
efficiency and accuracy of training machine
learning models, is another research topic.
Natural language processing, computer vision,
data analysis, and other activities can benefit
from quantum-enhanced learning.</p>
      <p>In addition, data clustering and classification
problems can be solved using quantum machine
learning models. In the field of artificial
intelligence, the application of quantum
approaches to machine learning creates new
opportunities for processing huge amounts of
data and solving complex problems.</p>
      <p>The development of quantum machine
learning algorithms that can handle unbalanced
data and account for quantum processes such as
quantum correlation and quantum interference
is another area of research. This creates new
opportunities for improving the efficiency and
accuracy of machine-learning models in various
fields.</p>
    </sec>
    <sec id="sec-8">
      <title>6. Quantum Key Exchange</title>
      <p>One of the fundamental principles of quantum
cryptography, which uses quantum properties
to ensure the security of information
transmission, is quantum key exchange. This
method can be used to generate a random key
for data encryption and decryption. Quantum
key exchange, which is based on the idea that
quantum states are indistinguishable by
observation, ensures that any attempt to
intercept a key will be detected because any
observed change in the state of the key will
result in errors.</p>
      <p>Bennett-Brassard 1984 (BB84), one of the
famous quantum key exchange systems,
transmits data using polarized photons. Since
any attempt to intercept photons will break the
protocol, this protocol guarantees unwavering
security of key transmission.</p>
      <p>Information security and quantum
cryptography make extensive use of quantum
key exchange. It is used to ensure security in
electronic communications, financial
transactions, and other sectors where
information confidentiality is important, as it
offers robust protection against cryptanalytic
attacks.</p>
      <p>
        This approach is based on the use of
quantum states to generate random keys for
data encryption and decryption. One of the
most famous is the BB84 quantum key
exchange system, which transmits data using
polarized photons [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Since any attempt to
intercept photons will be detected, this
protocol provides a high level of security.
      </p>
      <p>
        The E91 protocol also uses the “Bell
experiment”, which consists of the interaction
of distant quantum particles [
        <xref ref-type="bibr" rid="ref17">27</xref>
        ]. Because any
attempt to intercept the particles will break the
protocol, this protocol also ensures the
confidentiality of the key transfer.
      </p>
      <p>
        The development of quantum key exchange
is a promising topic for cryptography and has
the potential to be applied to the security of
communication and information systems [
        <xref ref-type="bibr" rid="ref16">26</xref>
        ].
In the era of growing digital communication, its
application can offer reliable protection
against eavesdropping and data tampering.
      </p>
    </sec>
    <sec id="sec-9">
      <title>7. Quantum Steganography</title>
      <p>An advanced method of secret information
transmission, known as quantum
steganography, uses quantum systems and
principles to protect the confidentiality and
privacy of data. Future communication
systems can greatly benefit from the
development of cryptographic methods in this
field of research.</p>
      <p>The use of quantum data transmission
channels, such as Quantum Access Points
(QAP), is one of the methods used in quantum
steganography [16]. With this method,
information can be discretely added to the
transmitted quantum states and used for
covert communication.</p>
      <p>
        The use of quantum cryptography protocols
for the covert transmission of information is
another method of quantum steganography.
For example, secret information can be sent
securely by embedding it in quantum states
using quantum key exchange protocols such as
BB84 or E91 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        In the field of security of communication
systems, where the confidentiality and secrecy
of transmitted data are of crucial importance,
quantum steganography has the potential to be
used [
        <xref ref-type="bibr" rid="ref18">28</xref>
        ]. The use of quantum characteristics
makes it possible to achieve a high level of
security and protection against interception
and decoding of information.
      </p>
      <p>
        The security of future communication
networks and the development of
cryptographic methods receive new
opportunities thanks to quantum
steganography [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
    </sec>
    <sec id="sec-10">
      <title>8. Quantum Authentication</title>
      <p>To ensure a high level of identification and
authentication of people and devices in
communication systems, quantum
authentication is an important branch of
cryptography and security. It reliably
establishes and verifies identity using
quantum principles and protocols, reducing
the risk of cryptanalysis and data fraud.</p>
      <p>Using quantum cryptography protocols
such as BB84 and E91 to transfer quantum
states between sender and receiver is one of
the main strategies for quantum
authentication [16]. These protocols allow the
development of a shared secret key, which is
used to establish identity and guarantee the
confidentiality of communication. The high
level of security in these protocols is made
possible by quantum mechanical concepts
such as state continuity and the
indestructibility of quantum states.</p>
      <p>
        Quantum authentication uses additional
aspects of quantum physics in addition to
quantum protocols to ensure that an identity is
authentic. A high level of security is provided,
for example, by systems based on
singlephoton sources and detectors that can detect
any attempts to intercept or manipulate
quantum states [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Quantum authentication has several
potential applications in various fields where
security and privacy are important criteria. It
can be used in network systems to authenticate
users and prevent unauthorized access,
financial systems to protect transactions and
electronic payments, and data storage systems
to maintain the integrity and confidentiality of
information [
        <xref ref-type="bibr" rid="ref18">28</xref>
        ].
      </p>
      <p>Therefore, the development of secure and
reliable communication systems based on
quantum principles becomes possible thanks
to quantum authentication. The development
of this scientific direction and the application
of quantum authentication methods will help
to increase the level of security in the current
digital era.</p>
    </sec>
    <sec id="sec-11">
      <title>9. Prospects for the Development of Quantum Technologies</title>
      <p>Due to its special capabilities and innovative
potential, quantum technologies are attracting
more and more attention from the scientific
community and the business sector. They
provide a wide range of opportunities for the
development of many branches of industry and
will help in solving complex issues facing
modern society.</p>
      <p>One of the most important prospects is the
creation of quantum sensors. Quantum sensors
are capable of measuring physical quantities,
including magnetic field, temperature,
pressure, and chemical composition, with
exceptionally high sensitivity and precision.
They can be used in the oil and gas industry to
regulate production and transportation
processes, in medicine for early diagnosis of
diseases, and in scientific research to learn
new things about nature.</p>
      <p>The creation of quantum communication
networks is an additional point of view.
Quantum communication makes the exchange
of confidential information extremely secure,
guaranteeing that the transmission of
information cannot be intercepted. For
financial institutions, government
organizations, and other sectors where data
security is critical, the development of
quantum communication networks will create
a reliable and secure infrastructure for data
transmission.</p>
      <p>In addition, new materials and technologies
can be created with the help of quantum
technologies. Nanomaterials with quantum dot
defects can be used to create efficient solar
cells, LEDs, and quantum computers. In
addition, quantum dot defects can be used to
create incredibly precise sensors capable of
detecting even the smallest changes in the
environment.</p>
      <p>Therefore, the prospects for the
development of quantum technologies are very
broad and capable of transforming a wide
range of fields of science, business, and society.
They create new opportunities for the
development of new inventive products and
services, increasing the efficiency and security
of systems, and solving complex tasks.
10.</p>
    </sec>
    <sec id="sec-12">
      <title>Conclusion</title>
      <p>The potential and application of quantum
technologies is the main objective of the
evaluation and analysis of the literature in this
research paper. She emphasizes the need to
understand these advanced technologies in the
21st century, as rapid technological progress
creates new challenges that require creative
responses. Numerous industries, including
computing, cryptography, telecommunications,
and healthcare, can benefit from quantum
technologies. To ensure the further
development of these advanced technologies, it
is important to understand the concepts of
quantum physics and how they can be applied
in real-world settings. The fundamental ideas of
quantum physics are discussed, as well as the
advantages of quantum technologies over
classical ones and possible applications in
various fields. The book also identifies existing
problems and barriers to the application of
quantum technologies and suggests ways to
solve them. Researchers, scientists, engineers,
and anyone interested in the future
development of quantum technology will find
the conclusions of this article a useful source of
information. Research and development of
these powerful tools will be advanced through a
better understanding of the fundamentals of
these technologies and their impact on today’s
environment.</p>
      <p>The conclusions of the article emphasize that
quantum technologies open new horizons of
potential. They are becoming a crucial
component of technological progress that can
change the way we think about computing, data
encryption, sensors, and precision
measurements. Although there are still many
obstacles to be overcome and a lot of work to be
done before the full implementation of quantum
technologies, the future of their development is
quite bright. More active participation of
scientists, engineers, and financiers in this field
of research can accelerate the process of
inventions and change our world. Thus, the
report deepens the knowledge of quantum
technology in general and stimulates further
research and development. It will make
significant contributions to the field of modern
science and help in the development of future
strategies for using these advanced
technologies to take research, technology, and
progress to new heights.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Gehring</surname>
          </string-name>
          , et al.,
          <source>Homodyne-Based Quantum Random Number Generator at 2</source>
          .9
          <string-name>
            <given-names>Gbps</given-names>
            <surname>Secure Against Quantum</surname>
          </string-name>
          <string-name>
            <surname>SideInformation</surname>
          </string-name>
          , Nat. Commun.,
          <volume>12</volume>
          (
          <year>2021</year>
          )
          <article-title>605</article-title>
          . doi:
          <volume>10</volume>
          .1038/s41467-020-20813-w.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chaudhary</surname>
          </string-name>
          , et al.,
          <source>Towards a Scalable Methods</source>
          <volume>18</volume>
          (
          <year>2021</year>
          )
          <fpage>701</fpage>
          -
          <lpage>709</lpage>
          . doi: Discrete Quantum Generative Adver-
          <volume>10</volume>
          .1038/s41592-020-01004-3. sarial Neural Network, Quantum Sci. [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaltenbaek</surname>
          </string-name>
          , et al.,
          <source>Quantum Technol</source>
          .
          <volume>8</volume>
          (
          <issue>3</issue>
          ) (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1088/ Technologies in Space, Exp. Astron.
          <volume>51</volume>
          <fpage>2058</fpage>
          -
          <lpage>9565</lpage>
          /
          <year>acc4e4</year>
          . (
          <year>2021</year>
          )
          <fpage>1677</fpage>
          -
          <lpage>1694</lpage>
          . doi:
          <volume>10</volume>
          .1007/
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khorolska</surname>
          </string-name>
          , et al.,
          <source>Application of a s10686-021-09731-x. Convolutional Neural Network with a</source>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hrytsyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Nazarkevych, Research on Module of Elementary Graphic Primitive the Increase of Information Theory in Classifiers in the Problems of the Era of the Ending of Silicon Recognition of Drawing Documentation Electronics and New Types of Risks, in: and Transformation of 2D to 3D Models, 2nd Int</article-title>
          . Workshop Computational Inf.
          <source>Journal of Theoretical and Applied Technols. Risk-Inform. Systs</source>
          . (
          <year>2021</year>
          ).
          <source>Information Technology</source>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          ) [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hrytsyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Medykovskyy</surname>
          </string-name>
          , M.
          <fpage>Nazar7426</fpage>
          -7437. kevych, Estimation of Symmetry in the
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Alexeev</surname>
          </string-name>
          , et al.,
          <article-title>Quantum Computer Recognition System with Adaptive Systems for Scientific Discovery</article-title>
          ,
          <source>Application of Filters, Symmetry</source>
          <volume>14</volume>
          (
          <article-title>5) PRX Quantum 2 (</article-title>
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1103/ (
          <year>2022</year>
          )
          <article-title>903</article-title>
          . doi:
          <volume>10</volume>
          .3390/sym14050903. PRXQUANTUM.
          <volume>2</volume>
          .
          <fpage>017001</fpage>
          . [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Knight</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Walmsley</surname>
          </string-name>
          , UK National
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Ullah</surname>
          </string-name>
          , et al.,
          <source>Quantum Computing Quantum Technology Programme, for Smart Grid Applications, IET Quantum Sci. Technol</source>
          .
          <volume>4</volume>
          (
          <issue>4</issue>
          ) (
          <year>2019</year>
          ). Generation, Transmission &amp; Distri- doi:10.1088/2058-9565/ab4346. bution
          <volume>16</volume>
          (
          <issue>21</issue>
          ) (
          <year>2022</year>
          )
          <fpage>4239</fpage>
          -
          <lpage>4257</lpage>
          . [17]
          <string-name>
            <given-names>M.G.</given-names>
            <surname>Raymer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Monroe</surname>
          </string-name>
          ,
          <source>The US National doi:10.1049/gtd2</source>
          .12602.
          <string-name>
            <surname>Quantum</surname>
            <given-names>Initiative</given-names>
          </string-name>
          , Quantum Sci.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <source>Optimization of Machine Technol</source>
          .
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1088/ Learning Method to Improve the 2058-
          <volume>9565</volume>
          /ab0441. Management Efficiency of [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <source>Multifunctional CRS Heterogeneous Telecommunication Encryption Scheme on Isogenies of NonNetwork</source>
          , in: Workshop on Cybersecurity Supersingular Edwards Curves, in: Providing in Information and Workshop on Classic,
          <source>Quantum, and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          Post
          <string-name>
            <surname>-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3504</volume>
          (
          <year>2022</year>
          )
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          . (
          <year>2023</year>
          )
          <fpage>12</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C. L.</given-names>
            <surname>Degen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Reinhard</surname>
          </string-name>
          , P. Cappellaro, [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazarkevych</surname>
          </string-name>
          , et al.
          <source>The Impact of the Quantum Sensing, Reviers of Modern Covid-19 Pandemic on Students Physics</source>
          <volume>89</volume>
          (
          <issue>3</issue>
          ) (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1103/ Studying in High Education Institutions,
          <source>RevModPhys</source>
          .
          <volume>89</volume>
          .035002. in: Cybersecurity Providing in Infor-
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tesi</surname>
          </string-name>
          , et al.,
          <article-title>Modular Approach to mation and Telecommunication Systems Creating Functionalized Surface Arrays II</article-title>
          , vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>187</fpage>
          -
          <lpage>196</lpage>
          . of Molecular Qubits, Advanced Materials [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , P. Skladannyi,
          <volume>35</volume>
          (
          <issue>10</issue>
          ) (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1002/adma.
          <source>Security Rating Metrics for Distributed 202208998. Wireless Systems</source>
          , in: Workshop of the
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.J.</given-names>
            <surname>Egger</surname>
          </string-name>
          , et al.,
          <source>Quantum Computing for 8th International Conference on Finance: State-of-the-Art and Future “Mathematics. Information TechnoloProspects</source>
          , IEEE Transactions on gies.
          <source>Education:” Modern Machine Quantum Engineering</source>
          <volume>1</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          .
          <source>Learning Technologies and Data Science, doi:0</source>
          .1109/TQE.
          <year>2020</year>
          .
          <volume>3030314</volume>
          . vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Krelina</surname>
          </string-name>
          , Quantum Technology for [21]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , Military Applications,
          <source>EPJ Quantum Stability Verification of Self-Organized Technol</source>
          .
          <volume>8</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
          <article-title>24</article-title>
          . doi: Wireless
          <source>Networks with Block</source>
          <volume>10</volume>
          .1140/epjqt/s40507-021-00113-y. Encryption, in: 5th International
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Eaton</surname>
          </string-name>
          ,
          <source>Science &amp; Technology Trends Workshop on Computer Modeling and 2020-2040, NATO Sci. Technol. Organ. Intelligent Systems</source>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          ) (
          <year>2020</year>
          ).
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Emani</surname>
          </string-name>
          , et al., Quantum Computing at [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazarkevych</surname>
          </string-name>
          , et al.,
          <source>Identification of the Frontiers of Biological Sciences, Nat. Biometric Images by Machine Learning, IEEE 12th Int. Conf. Electrons. Inform. Technols. (ELIT)</source>
          , Lviv, Ukraine, (
          <year>2021</year>
          ).
          <source>doi:10.1109/ELIT53502</source>
          .
          <year>2021</year>
          .
          <volume>9501064</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazarkevych</surname>
          </string-name>
          , et al.,
          <article-title>Evaluation of the Effectiveness of Different Image Skeletonization Methods in Biometric Security Systems</article-title>
          ,
          <source>Int. J. Sens. Wirel. Communs. Control</source>
          <volume>11</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          )
          <fpage>542</fpage>
          -
          <lpage>552</lpage>
          . doi:
          <volume>10</volume>
          .2174/22103279106662012 10151809.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hrytsyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nazarkevych</surname>
          </string-name>
          ,
          <string-name>
            <surname>Real-Time</surname>
            <given-names>Sensing</given-names>
          </string-name>
          ,
          <source>Reasoning and Adaptation for Computer Vision Systems, Lecture Notes Data Eng. Communs. Technols. Springer</source>
          <volume>77</volume>
          (
          <year>2022</year>
          )
          <fpage>573</fpage>
          -
          <lpage>585</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -82014-5_
          <fpage>39</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Gill</surname>
          </string-name>
          , et al.,
          <source>Quantum Computing: A Taxonomy</source>
          ,
          <article-title>Systematic Review</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          , Softw: Pract. Exper.
          <volume>52</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>66</fpage>
          -
          <lpage>114</lpage>
          . doi:
          <volume>10</volume>
          .1002/ spe.3039.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>N.</given-names>
            <surname>Gisin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Thew</surname>
          </string-name>
          , Quantum Communication,
          <source>Nat. Photonics</source>
          ,
          <volume>1</volume>
          (
          <issue>3</issue>
          ) (
          <year>2007</year>
          )
          <fpage>165</fpage>
          -
          <lpage>171</lpage>
          . doi:
          <volume>10</volume>
          .1038/nphoton.
          <year>2007</year>
          .
          <volume>22</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Cacciapuoti</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Quantum</surname>
            <given-names>Internet</given-names>
          </string-name>
          :
          <article-title>Networking Challenges in Distributed Quantum Computing</article-title>
          ,
          <source>IEEE Network 34(1)</source>
          (
          <year>2020</year>
          )
          <fpage>137</fpage>
          -
          <lpage>143</lpage>
          . doi:
          <volume>10</volume>
          .1109/MNET.001.1900092.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.A.</given-names>
            <surname>Iyengar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.B.</given-names>
            <surname>Puthirath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Swaminathan</surname>
          </string-name>
          , Realizing Quantum Technologies in Nanomaterials and Nanoscience, Adv. Maters.
          <volume>35</volume>
          (
          <issue>27</issue>
          ) (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1002/ adma.202107839.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>