<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mathematical Modelling and Adaptation Strategies in the Confrontation between Cryptocurrencies and Quantum Computers⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valeriy Lakhno</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Аlona Desiatko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Chubaievskyi</string-name>
          <email>chubaievskyi_vi@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Roskladka</string-name>
          <email>a.roskladka@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Kaminskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>19/1 Horikhuvatskyi shliakh str., 03041 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19 Kyoto str., 02156 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>562</fpage>
      <lpage>569</lpage>
      <abstract>
        <p>The research is devoted to analyzing the stability of cryptocurrency systems under threats associated with the development of quantum computing. The paper proposes a differential game model to formalize the interaction between cryptocurrency systems and quantum computers (QCs). The methodology uses differential game theory to model the dynamics of the parties' resource allocation and evaluate their player strategies. During the modeling process, scenarios of confrontation between cryptocurrency technologies and quantum computing were analyzed to identify key patterns and factors affecting the effectiveness of cryptographic protection and the computational capabilities of attackers. The results obtained may become the basis for the development of new cryptographic security standards and the formation of adaptive strategies for the protection of digital assets in the context of the growing capabilities of quantum computing and quantum computers.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;quantum computing</kwd>
        <kwd>cryptocurrencies</kwd>
        <kwd>cryptographic stability</kwd>
        <kwd>post-quantum cryptography</kwd>
        <kwd>Shor's algorithm</kwd>
        <kwd>differential games</kwd>
        <kwd>mathematical modeling</kwd>
        <kwd>allocation resources</kwd>
        <kwd>quantum threats</kwd>
        <kwd>adaptive protection strategies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Modern challenges in the field of information security (referred to as IS), associated with the
development of quantum computing, threaten the stability of cryptographic methods that underlie
most digital systems, including cryptocurrencies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Cryptocurrencies (referred to as CCs),
according to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] may become particularly vulnerable in the face of the emergence of quantum
computers (referred to as QCs) capable of performing computations inaccessible to traditional
systems. The main problem is that quantum algorithms, such as Shor’s algorithm [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], can
efficiently solve problems on which asymmetric cryptographic schemes are based, such as
factorization of integers and calculation of discrete logarithms, which potentially will allow
attackers to use quantum computing power to bypass cryptographic protections and gain access to
confidential information or digital assets. With this in
mind, research into modeling the
interactions between CCs and QCs is relevant as it will predict the dynamics of the confrontation
between data protection technologies and threats caused by the development of quantum
computing. And, in particular, modeling using differential game theory methods provides a unique
tool to analyze the adaptive strategies of the parties, taking into account resource constraints and
dynamic changes in system parameters. In such models, the resources of the parties can be
classified into several categories, e.g., for CC, these are primarily cryptographic defense methods
and tools, including encryption algorithms that are resistant to attacks. This also includes resources
aimed at modernizing cryptographic mechanisms in response to new threats. Correspondingly, for
quantum computing, resources include QC computing power, as well as infrastructure and
research efforts aimed at developing this technology.
      </p>
      <p>The analysis methodology proposed in this research involves the construction of a
mathematical model describing the interaction between the parties, where the CCs and QCs act as
players. This model allows us to formalize the resource allocation processes and predict the
outcomes of the confrontation, taking into account different scenarios. This approach can open
new opportunities for developing adaptation and protection strategies aimed at minimizing the
risks associated with quantum threats to CCs.</p>
      <p>Thus, based on the above, the study of the problem of the stability of cryptocurrency systems
under quantum computing conditions not only has theoretical significance but also has a high
practical value, since the results of such an analysis can be subsequently used to develop new
standards of cryptographic security, create protocols for the protection of digital assets and form a
long-term strategy for adapting cryptocurrency systems to quantum threats.</p>
    </sec>
    <sec id="sec-2">
      <title>2. A review of prior research</title>
      <p>
        With the rapid development of quantum computing [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], there is an increasing need to investigate
mechanisms to counter the threats associated with the use of QC to attack existing cryptographic
systems [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. Quantum algorithms, such as Shor’s algorithm [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and Grover’s algorithm [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
provide significant advantages in solving factorization and search problems, which puts the
security of traditional cryptographic algorithms such as RSA, ECC, and AES under threat.
      </p>
      <p>
        On the other hand, the development of post-quantum algorithms [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and the modernization of
cryptographic systems, as shown in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref9">9–18</xref>
        ], provide an active counter to these threats. However,
the dynamics of the confrontation between defenses and attacking technologies require careful
mathematical modeling to predict the behavior of both sides in different scenarios. Therefore, new
research in this direction is relevant.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Purpose, object, and subject of the study</title>
      <p>The study aims to develop a mathematical model of interaction between cryptocurrency systems
and quantum computers based on differential game theory to analyze the dynamics of the parties’
resource allocation and to form effective strategies for adapting cryptographic mechanisms to
quantum threats.</p>
      <p>The object of the study is cryptographic and computing systems interacting in the context of
quantum computing development, focusing on cryptocurrency platforms as the most vulnerable to
attack by quantum computers.</p>
      <p>The subject of the study is the mechanisms of resource allocation between parties
(cryptocurrencies and quantum computers) in dynamic interaction, including adaptive strategies
for cryptographic security and increasing computing power.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methods and models</title>
      <sec id="sec-4-1">
        <title>4.1. SLAM algorithms</title>
        <p>
          The research methodology is based on applying differential game theory [
          <xref ref-type="bibr" rid="ref15 ref16 ref17">15–21</xref>
          ] to model the
interaction between two parties—CC systems and QCs. Differential games, as a section of optimal
control theory, allow for the description of dynamic processes, where the strategic behavior of
participants is determined by the change of system parameters over time. Using the system of
differential equations proposed in this paper to describe the state of resources of the parties
provides the possibility of taking into account such factors as the limited resources, their
purposeful distribution, and time characteristics of adaptation. Within the framework of the
constructed model, CC systems and QCs are considered players pursuing opposite goals. For CCs,
the goal is to maximize the level of protection by applying stable cryptographic algorithms and
upgrading security mechanisms. For QCs, the goal is to achieve computing power sufficient to
bypass cryptographic barriers successfully.
        </p>
        <p>In this paper, the interaction process between the parties is described by a set of control
functions that characterize the expenditure of resources on the corresponding strategies. The
dynamics of parameter changes are represented as a system of ordinary differential equations,
where each model variable reflects the level of resources of the party (e.g., the level of
cryptographic protection, modernization resources of CC, quantum computing power, and
infrastructure resources). Numerical analysis and programming techniques are applied to
determine the optimal strategies, allowing us to study the system’s evolution in different scenarios.
The computational experiment results were visualized using cybernetic modeling tools, which
allowed us to interpret the obtained dependencies and identify key patterns in the parties’
confrontation.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. A differential game model of cryptographic resistance to quantum threats</title>
        <p>For a detailed analysis of the players’ confrontation, it is necessary to consider the key variables
describing the active cryptographic security and quantum computers and their mutual influence.</p>
        <p>For cryptocurrencies and quantum computers, let’s define variables.</p>
        <p>For the CC:
CC Active Means:
• z1(t) is the effectiveness of the current cryptographic algorithm.
• z2(t) is resources for modernization (e.g. transition to post-quantum algorithms).
Active means of quantum computers:
• z3(t) is computing power of a quantum computer.
• z4(t) is resources to increase computing power.</p>
        <p>Active cryptographic defenses characterize the current and potential capabilities of
cryptographic defense systems in countering threats, including attacks by quantum computers.
Two main aspects describe them. The first is the effectiveness of the current cryptographic
algorithm. This variable reflects how resistant the current cryptographic algorithm is to attacks,
including those using quantum computing. For example, RSA and ECC (elliptic curve) algorithms
resist classical attacks but are vulnerable to attacks using quantum computers, such as Shor’s
algorithm. The effectiveness can be expressed in bits of cryptographic strength, e.g. 128-bit AES is
considered resistant to most attacks, but its strength must be re-evaluated in the face of a quantum
threat. If a system uses the 256-bit AES algorithm to encrypt sensitive data, the effectiveness of the
algorithm is judged by its ability to prevent attacks in a given time under existing quantum
computing power. The second aspect is the resources for modernizing cryptographic algorithms.
These resources include the costs (time, computational, financial) to move to more secure
cryptographic standards. For example, introducing post-quantum algorithms such as lattice-based
cryptography [22] will require significant investments in training [23], hardware upgrades, and
software modifications [24–27]. Let us illustrate this with a small example. Say an organization is
considering a move to the CRYSTALS-Kyber algorithm [28], certified by NIST as a post-quantum
standard, this, consequently, will require the purchase of new hardware encryption modules and
updates to communication protocols.</p>
        <p>The same reasoning holds true for active QC tools. These variables describe the ability of the
attacker (e.g., the QC) to perform the computations required to break existing cryptographic
algorithms. Two key aspects can also be distinguished here. The first aspect is the computational
power of the QC. This variable reflects the current state of quantum computing, including the
number of qubits and their coherence level. Thus, the more qubits and higher their coherence, the
greater the capacity to perform complex computations such as factorizing large numbers or
searching for collisions in hash functions. For example, Google’s quantum computer Sycamore
[29], with 53 qubits, achieved “quantum supremacy” in 2019 by solving a problem inaccessible to
classical computers. Accordingly, a QC with 1000 stable qubits can factorize a 2048-bit RSA key in
a few hours, which is impossible for a classical computer in a reasonable time. The second aspect is
the resources to increase the computing power of the QC. These resources include the costs of
developing more powerful QCs, such as funding research, improving cooling techniques to reduce
noise, and optimizing quantum algorithms. For example, creating superconductor-based qubits will
require significant material and energy costs. The company’s investment in creating a new
generation of qubits will increase the system’s processing power from 256 to 512 qubits, which will
lead to a dramatic increase in attack capabilities.</p>
        <p>Then, the system of differential equations will look as follows:
z˙1=− p41 z4 v 1 + c1 ,
z˙2=− p42 z4 v 2 + c2 , (1)
z˙3=− p23 z2 u 1 + c3 ,
z˙4=− p24 z2 u 2 + c4 ,
where pij is effectiveness of one party’s means against the other (for the considered model describes
how successfully the resources and strategies of one party (for example, cryptocurrency systems or
QC) can counteract the efforts of the opposite party. For QC it can be, for example, the level of
resistance of cryptographic algorithms to hacking by quantum computers, which is expressed
through the probability of successfully preventing an attack at a given level of computing power of
the attacking party. And for QC it is an indicator characterizing the ability of their algorithms and
computing power to overcome existing cryptographic defenses).</p>
        <p>u1, u2, v1, and v2 are resource shares (representing the proportions of the total available resources
of each party (e.g., CC systems or QCs) allocated to specific tasks or strategies in their interactions.
For cryptocurrencies, the proportions of resources may include, inter alia, the particular amount
devoted to maintaining current cryptographic mechanisms, such as implementing stronger
encryption algorithms, as well as, resources devoted to developing and implementing
postquantum cryptographic standards that will be able to withstand attacks from QCs. For QC, these
are resources devoted to increasing computational power, for example, increasing the number of
qubits or improving their coherence, as well as the unit cost of optimizing algorithms to accelerate
the cracking of cryptographic systems. Note that the total resource shares do not exceed 1 (or
100%) since resources are limited and their allocation between different tasks requires optimization
within the individual task);</p>
        <p>c1, c2, c3, and c4 are resource replenishment capabilities (i.e., the parties’ ability to increase the
available resources needed to fulfill their strategic objectives. These resources may include
financial, technical, computational, or human resources that sustain or develop the parties in an
adversarial environment. For example, for CCs, resource replenishment capabilities reflect
investments in developing new cryptographic algorithms resistant to quantum attacks, particularly
post-quantum standards, and infrastructure upgrades to integrate more secure protocols, among
others. For QC, replenishment opportunities include the development of quantum technologies,
such as increasing the number of qubits or increasing their coherence, as well as funding research
to optimize quantum algorithms (e.g. to speed up the Shor algorithm), etc.</p>
        <p>Then the win function of the parties can be written as follows.</p>
        <p>For cryptocurrencies:</p>
        <p>J A=[ z1 (T )− z3 (T )] .
(2)</p>
        <p>The goal of cryptocurrencies (CCs) is to minimize the loss of their cryptocurrencies and
maximize the damage done to the QCs’ computing facilities.
For quantum computers (QCs):</p>
        <p>J B=[ z3 (T )− z1 (T )] .
(3)</p>
        <p>The QC’s goal is to maximize the efficiency of its computations and minimize the damage from
CC countermeasures.</p>
        <p>The model describes a zero-sum differential game, where the dynamic interaction of the parties
and the equilibrium are defined through optimal resource allocation strategies. Note that an
analytical solution may not be available, so an iterative process will be used to find the equilibrium
state, and the construction algorithm can be based on the maximum principle of L.  S. Pontryagin
[20, 21].</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Computational experiments</title>
      <p>The main objective of the computational experiment (referred to as CE), the results of which are
shown in Fig. 1, was to evaluate the dynamic interaction between the parties and answer the
question—“How do cryptocurrencies adapt their defenses in response to QC attacks, and how do
QCs strengthen their computing power to overcome these defenses?”. In addition, the CE should
identify the key dependencies and identify which factors, in particular, cryptocurrency
modernization resources or QC computing power) have the greatest impact on the outcome of the
confrontation.</p>
      <p>The experiment involved setting initial values of variables (e.g., initially high level of
cryptographic protection z1(0) and computing power z3(0). Resource allocation scenarios, i.e.,
testing different parties’ strategies, such as maximizing the concentration of resources on one area,
e.g., QC focuses entirely on increasing capacity and CC focuses on upgrading the defense. Also, CE
investigated interaction parameters, i.e. considering the effectiveness of one party’s means against
the other, which allows for assessing the real threat and the degree of countermeasures.
The results of CE, in general, will provide insight into the dynamics of party interactions, and
identify key factors affecting the resilience of cryptocurrency systems, which in future research
will enable the development of specific practical recommendations for optimal resource allocation
and implementation of adaptive defense strategies in the face of quantum threats to CCs.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion of the results obtained in the course of computational experiments</title>
      <p>The results of modeling are presented in Fig. 1 in the form of time dependencies of resource levels
of the parties involved in the confrontation, i.e. cryptocurrency technologies and quantum
computing, respectively. The graphs show changes in four key variables: cryptographic defenses
z1(t), cryptographic modernization resources z2(t), and the computing power of quantum computers
z3(t) and their resources z4(t). The graph of cryptographic defenses z1(t) shows how the level of CC
resistance changes under the influence of attacks from quantum computers. At the initial stages of
the confrontation, there is a noticeable decrease in the values of z1(t), which is caused by the active
actions of the side of quantum technologies implementing attack strategies with a high level of
priority. However, the availability of resources for the modernization of cryptography z2(t) allows
for compensating losses, which leads to stabilization or even growth of z1(t) in later periods.</p>
      <p>The dynamics of z2(t) modernization resources demonstrate their critical role in the standoff. In
the initial stages, there is a gradual decrease of z2(t) due to the reallocation of resources for the
recovery and defense of cryptographic systems. However, the replenishment of resources described
in the model allows z2(t) to be maintained at a level sufficient for an effective counter-strategy.</p>
      <p>Changes in the computing power of quantum computers z3(t) reflect their high initial efficiency,
which gradually decreases under the influence of attacks from cryptocurrency technology. This
dynamic illustrates the effectiveness of the cryptocurrency side’s adaptive strategies aimed at
weakening the attacker’s capabilities.</p>
      <p>The resources of quantum computers z4(t) are characterized by similar dynamics. Their use for
attacking actions leads to gradual depletion, but replenishment of resources allows the parties to
maintain activity throughout the simulation period.</p>
      <p>The results demonstrate complex interactions between parties with variable degrees of
dominance depending on the strategies employed and resource replenishment and confirm that
adaptive strategies that depend on the current state of the system can significantly influence the
outcome of the confrontation and provide a dynamic equilibrium between the parties.</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>The study demonstrated that the development of quantum computing poses significant security
risks to cryptocurrency systems, as quantum algorithms, such as Shor’s algorithm, can effectively
circumvent existing cryptographic mechanisms. The differential game model proposed as part of
the work showed that the dynamics of the confrontation between cryptocurrencies and quantum
computers are determined by the resource allocation strategies of the parties. The key finding is to
confirm the effectiveness of adaptive strategies that will minimize the loss of cryptographic
stability and slow down the development of the attacking party’s computing power. The results
obtained in the computational experiments highlight the need to implement post-quantum
cryptographic algorithms and infrastructure modernization to improve the resilience of digital
systems. In addition, the proposed methodology, based on the development of models built using
differential games, can be used to predict long-term scenarios of quantum threats and develop
preventive measures.
Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[18] B. Bebeshko, K. Khorolska, A. Desiatko, Analysis and modeling of price changes on the
exchange market based on structural market data, in: 2021 IEEE 8th International Conference
on Problems of Infocommunications, Science and Technology, 2021, 151–156.
doi:10.1109/PICST54195.2021.9772208
[19] L. A. Petrosjan, Differential games of pursuit, vol. 2, 1993. doi:10.1142/1670
[20] L. S. Pontryagin, On some differential games, J. Society Industrial Appl. Math. Series A:</p>
      <p>Control 3(1) (1965) 49–52. doi:10.1137/0303005
[21] L. S. Pontryagin, Mathematical theory of optimal processes, Routledge, 2018.</p>
      <p>doi:10.1201/9780203749319
[22] D. Micciancio, O. Regev, Lattice-based cryptography, in: Post-quantum Cryptography, 2009,
147–191. doi:10.1007/978-3-540-88702-7_5
[23] M. Iavich, et al., Classical and post-quantum encryption for GDPR, in: Classic, Quantum, and</p>
      <p>Post-Quantum Cryptography, vol. 3829 (2024) 70–78.
[24] A. Bessalov, et al., Computing of odd degree isogenies on supersingular twisted Edwards
curves, in: Cybersecurity Information and Telecommunication Systems, vol. 2923 (2021) 1–11.
[25] A. Bessalov, et al., Implementation of the CSIDH algorithm model on supersingular twisted
and quadratic Edwards curves, in: Cybersecurity Providing in Information and
Telecommunication Systems, vol. 3187, no. 1 (2022) 302–309.
[26] A. Bessalov, et al., Modeling CSIKE algorithm on non-cyclic Edwards curves, in: Workshop on
Cybersecurity Providing in Information and Telecommunication Systems, vol. 3288 (2022) 1–
10.
[27] A. Bessalov, et al., Multifunctional CRS encryption scheme on isogenies of non-supersingular
Edwards curves, in: Workshop on Classic, Quantum, and Post-Quantum Cryptography, vol.
3504 (2023) 12–25.
[28] J. Bos, et al., CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM, in: 2018 IEEE
European Symposium on Security and Privacy (EuroS&amp;P), 2018, 353–367.
doi:10.1109/EuroSP.2018.00032
[29] F. Pan, P. Zhang, Simulating the Sycamore quantum supremacy circuits, arXiv, 2021.
doi:10.48550/arXiv.2103.03074</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Virovets</surname>
          </string-name>
          , et al.,
          <article-title>Integration of smart contracts and artificial intelligence using cryptographic oracles</article-title>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3829</volume>
          (
          <year>2024</year>
          )
          <fpage>39</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Osipovich</surname>
          </string-name>
          ,
          <article-title>A looming threat to Bitcoin: The risk of a quantum hack</article-title>
          ,
          <source>The Wall Street Journal</source>
          ,
          <year>2024</year>
          . URL: https://www.wsj.com/tech/cybersecurity/a
          <article-title>-looming-threat-to-bitcoin-therisk-of-a-quantum-hack-24637e29</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C. H.</given-names>
            <surname> Ugwuishiwu</surname>
          </string-name>
          , et al.,
          <article-title>An overview of quantum cryptography and Shor's algorithm</article-title>
          ,
          <source>Int. J. Adv. Trends Comput. Sci. Eng</source>
          .
          <volume>9</volume>
          (
          <issue>5</issue>
          ) (
          <year>2020</year>
          )
          <fpage>7487</fpage>
          -
          <lpage>7495</lpage>
          . doi:
          <volume>10</volume>
          .30534/ijatcse/2020/214952020
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Bhatia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
             R. 
            <surname>Ramkumar</surname>
          </string-name>
          ,
          <article-title>An efficient quantum computing technique for cracking RSA using Shor's algorithm</article-title>
          ,
          <source>in: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA)</source>
          ,
          <year>2020</year>
          ,
          <fpage>89</fpage>
          -
          <lpage>94</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCCA49541.
          <year>2020</year>
          .9250806
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Holmes</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
           
          <article-title>Chen, Assessment of quantum threat to Bitcoin and derived cryptocurrencies</article-title>
          ,
          <source>Cryptology ePrint Archive</source>
          ,
          <year>2021</year>
          . URL: https://eprint.iacr.org/
          <year>2021</year>
          /967
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>J. J.</surname>
          </string-name>
           Tom, et al.,
          <article-title>Quantum computers and algorithms: A threat to classical cryptographic systems</article-title>
          ,
          <source>Int. J. Eng. Adv. Technol</source>
          .
          <volume>12</volume>
          (
          <issue>5</issue>
          ) (
          <year>2023</year>
          )
          <fpage>25</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .35940/ijeat.E4153.0612523
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Denker</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Y. 
          <article-title>Javaid, Quantum computing as a threat to modern cryptography techniques</article-title>
          ,
          <source>in: International Conference on Foundations of Computer Science (FCS)</source>
          ,
          <year>2019</year>
          ,
          <fpage>3</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname> Khodaiemehr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Bagheri</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
           
          <article-title>Feng, Navigating the quantum computing threat landscape for blockchains: A comprehensive survey</article-title>
          ,
          <source>Authorea Preprints</source>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .36227/techrxiv. 24136440.v1
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Raheman</surname>
          </string-name>
          ,
          <article-title>Futureproofing blockchain &amp; cryptocurrencies against growing vulnerabilities &amp; Q-Day threat with quantum-safe ledger technology (QLT)</article-title>
          ,
          <source>J. Comput. Commun</source>
          .
          <volume>12</volume>
          (
          <issue>7</issue>
          ) (
          <year>2024</year>
          )
          <fpage>59</fpage>
          -
          <lpage>77</lpage>
          . doi:
          <volume>10</volume>
          .4236/jcc.
          <year>2024</year>
          .127005
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A. I.</given-names>
             
            <surname>Weinberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Faccia</surname>
          </string-name>
          ,
          <article-title>Quantum algorithms: A new frontier in financial crime prevention</article-title>
          , arXiv,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2403.18322
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>K. D. Gupta</surname>
          </string-name>
          , et al.,
          <article-title>Utilizing computational complexity to protect cryptocurrency against quantum threats: A review</article-title>
          ,
          <source>IT Prof</source>
          .
          <volume>23</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          )
          <fpage>50</fpage>
          -
          <lpage>55</lpage>
          . doi:
          <volume>10</volume>
          .1109/MITP.
          <year>2021</year>
          .3089494
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Naik</surname>
          </string-name>
          , et al.,
          <article-title>From portfolio optimisation to quantum blockchain and security: A systematic review of quantum computing in finance</article-title>
          , arXiv,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2307.01155
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Szatmáry,
          <article-title>Quantum computers-security threats and solutions, in: Critical Infrastructure Protection in the Light of the Armed Conflicts</article-title>
          ,
          <string-name>
            <surname>HCC</surname>
          </string-name>
          <year>2022</year>
          ,
          <source>Advanced Sciences and Technologies for Security Applications</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -47990-8_
          <fpage>38</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Claudiu</surname>
          </string-name>
          , et al.,
          <article-title>Enhancing the financial sector with quantum computing: A comprehensive review of current and future applications</article-title>
          ,
          <source>in: 22nd International Conference on Informatics in Economy (IE</source>
          <year>2023</year>
          ),
          <source>IE</source>
          <year>2023</year>
          ,
          <string-name>
            <given-names>Smart</given-names>
            <surname>Innovation</surname>
          </string-name>
          ,
          <source>Systems and Technologies</source>
          , vol.
          <volume>367</volume>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-99-6529-8_
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Malyukov</surname>
          </string-name>
          , et al.,
          <article-title>Multifactor model of the digital cryptocurrency market as a computational core of the information system</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3550</volume>
          ,
          <year>2023</year>
          ,
          <fpage>200</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Malyukov</surname>
          </string-name>
          , et al.,
          <article-title>Managing the purchase-sale process of digital currencies under fuzzy conditions</article-title>
          ,
          <source>in: Intelligent Computing and Optimization</source>
          ,
          <source>ICO 2023, Lecture Notes in Networks and Systems</source>
          , vol.
          <volume>729</volume>
          ,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -36246-0_
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Bebeshko</surname>
          </string-name>
          , et al.,
          <article-title>Application of game theory, fuzzy logic and neural networks for assessing risks and forecasting rates of digital currency</article-title>
          ,
          <source>J. Theor. Appl. Inf. Technol</source>
          .
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2024</year>
          )
          <fpage>7390</fpage>
          -
          <lpage>7404</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>