{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:50:42Z","timestamp":1775069442049,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185906","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"466-470","source":"Crossref","is-referenced-by-count":1,"title":["Method of Quantum Key Distribution Based on a Modified BB84 Protocol Using the Residue Number System"],"prefix":"10.1109","author":[{"given":"Anastasiya","family":"Hnatiuk","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Mykhailo","family":"Kasianchuk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Ruslan","family":"Shevchuk","sequence":"additional","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]},{"given":"Lidiia","family":"Tymoshenko","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","first-page":"118","article-title":"Quantum cryptography and its application frontiers","volume-title":"Quantum Physics [quant-ph]","author":"Alleaume","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/physics4010009"},{"key":"ref4","first-page":"45","volume-title":"Quantum Cryptography","author":"Bonti","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1364\/aop.361502"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ths.2011.6107841"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iciss55894.2022.9915232"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2021.3132591"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_21"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36985-8_29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/physics.14.s94"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2528227"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.94.025008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/ACSET"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41385-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2019.8924395"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2017.8095054"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-014-9654-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-021-00358-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-022-00494-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.441"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3165202"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/9781316995433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.34257\/gjsfravol23is6pg1"},{"issue":"1","key":"ref25","first-page":"27","article-title":"The proof that the non-cloning theorem of quantum states does not hold","volume":"18","author":"Mei","year":"2022","journal-title":"Fund. Jour. of Mod. Phys."},{"issue":"4","key":"ref26","first-page":"12","article-title":"Does the \u201cRelativity Quantum Mechanics\u201d really exist","volume":"11","author":"Huang","year":"2017","journal-title":"Frontier Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2019.8009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tcset.2018.8336262"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/acit58437.2023.10275654"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92435-5_27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14311\/AP.2018.58.0017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2003.1249531"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/math8122116"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.018773"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/acitt.2019.8779897"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/cadsm.2017.7916120"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/dt.2016.7557161"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/cadsm.2015.7230834"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.21.1.6657"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs-sws.2014.6954630"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cbpc.2008.05.018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2019.8924262"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/iccas.2016.7832500"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70581-1_8"},{"issue":"1","key":"ref45","first-page":"139","article-title":"Interval model for identification of laryngeal nerves","volume":"86","author":"Dyvak","year":"2010","journal-title":"Przegl\u0105d Elektrotechniczny"},{"key":"ref46","first-page":"24","article-title":"Tolerance estimation of parameters set of models created on experimental data","volume-title":"2008 International Conference on \"Modern Problems of Radio Engineering, Telecommunications and Computer Science\" (TCSET)","author":"Dyvak"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2004.1381137"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2000.860811"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.31891\/1727-6209\/2020\/19\/1-70-77"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/9781003337843-12"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Sibenik, Croatia","start":{"date-parts":[[2025,9,17]]},"end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185906.pdf?arnumber=11185906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:05:46Z","timestamp":1760072746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185906","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}