The laboratory develops and tests quantum algorithms designed for different quantum computing architectures, evaluating their performance, and using state-of-the-art and advanced back-end emulators within a high-performance computing ecosystem and on the medium-sized quantum processors available today (noisy-intermediate-scale). Researchers study the practical application of quantum software and hardware solutions in the Aerospace, Defence and Security sectors of interest to the company, for both military and civilian applications, with the goal of creating fault-tolerant quantum computers. The research focuses on quantum optimisation, machine learning, physical simulations, and cryptography.
Search Areas
We develop and test efficient quantum algorithms and explore advanced quantum-inspired and hybrid quantum-classical techniques for solving complex combinatorial problems in various areas of relevance to our company. We seek solutions, at different levels of maturity, for maximising or minimising a given objective function on the basis of specific constraints. Work is performed using quantum emulators in high-performance computing environments, employing the latest quantum devices.
We develop quantum-enhanced machine learning algorithms and techniques to explore potential quantum advantages in data processing, feature extraction and model training. The aim is to contribute to the advancement of intelligent solutions for data analysis and decision-making processes.
We develop quantum methods and algorithms to improve simulation of a wide range of physical systems, ranging from quantum chemistry and materials science to computational fluid dynamics and electromagnetic wave propagation. The algorithms are designed to work on noisy-intermediate-scale and large-scale-fault-tolerant quantum devices, investigating both their theoretical strengths and their practical limitations.
We evaluate and monitor the ability of quantum computers, and of quantum-inspired solutions – hardware, software, and algorithms – to breach traditional cryptographic keys and threaten the security of sensitive information. The goal is to identify the potential vulnerabilities of significant approaches to cryptography and come up with robust countermeasures safeguarding critical infrastructure and sensitive data.