{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:09:36Z","timestamp":1772039376420,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11132682","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["TetrisLock: Quantum Circuit Split Compilation with Interlocking Patterns"],"prefix":"10.1109","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"University of California,Department of Electrical Engineering,Merced,CA,USA"}]},{"given":"Jayden","family":"John","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering,Merced,CA,USA"}]},{"given":"Ben","family":"Dong","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical Engineering,Merced,CA,USA"}]},{"given":"Yuntao","family":"Liu","sequence":"additional","affiliation":[{"name":"Lehigh University,Department of Electrical and Computer Engineering,PA,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ibm quantum breaks the 100-qubit processor barrier","volume":"2","author":"Chow","year":"2021","journal-title":"IBM Research Blog"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s42354-021-0330-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9530-9_16"},{"key":"ref4","article-title":"Quantum computing with Qiskit","author":"Javadi-Abhari","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s40319-022-01209-3"},{"key":"ref6","article-title":"Trojannet: Detecting trojans in quantum circuits using machine learning","author":"Das","year":"2023","journal-title":"arXiv preprint arXiv:2306.16701"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/QCE60285.2024.00099"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.261"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2808414.2808420"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029339"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2013.6658536"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2227257"},{"key":"ref16","article-title":"Randomized reversible gate-based obfuscation for secured compilation of quantum circuit","author":"Das","year":"2023","journal-title":"arXiv preprint arXiv:2305.01133"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3849459\/v1","article-title":"Secure quantum circuit compilation methodology for untrusted compilers","author":"Das","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/j6030027"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/HOST64725.2025.11050014","article-title":"E-loq: Enhanced locking for quantum circuit ip protection","author":"Liu","year":"2025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643478"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab9acb"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87568-8_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab8e92"},{"key":"ref25","article-title":"Cirq: A python framework for creating, editing, and invoking quantum circuits","author":"Hancock"},{"key":"ref26","article-title":"A primer on security of quantum computing","author":"Ghosh","year":"2023","journal-title":"arXiv preprint arXiv:2305.02505"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL.2008.43"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11132682.pdf?arnumber=11132682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T05:35:47Z","timestamp":1758000947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11132682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11132682","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}