{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:08:47Z","timestamp":1772039327779,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733817.3762698","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:28Z","timestamp":1766594848000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit Obfuscation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4025-1045","authenticated-orcid":false,"given":"Amal","family":"Raj","sequence":"first","affiliation":[{"name":"Singapore Institute of Technology, Punggol, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4847-7150","authenticated-orcid":false,"given":"Vivek","family":"Balachandran","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology, Punggol, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_1_2_2","volume-title":"Quantum Computing","year":"2025","unstructured":"IBM. 2025. Quantum Computing. https:\/\/www.ibm.com\/think\/topics\/quantum-computing Accessed: Apr. 9, 2025."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Peter\u00a0W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26 5 (1997) 1484\u20131509. 10.1137\/S0097539795293172","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Neil Gershenfeld and Isaac\u00a0L. Chuang. 1998. Quantum Computing with Molecules. Scientific American 278 6 (1998) 66\u201371. https:\/\/www.jstor.org\/stable\/26057857","DOI":"10.1038\/scientificamerican0698-66"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Akshay Ajagekar and Fengqi You. 2019. Quantum computing for energy systems optimization: Challenges and opportunities. Energy 179 (2019) 76\u201389. 10.1016\/j.energy.2019.04.186","DOI":"10.1016\/j.energy.2019.04.186"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Google\u00a0Quantum AI and Collaborators. 2025. Quantum error correction below the surface code threshold. Nature 638 (2025) 920\u2013926. 10.1038\/s41586-024-08449-y","DOI":"10.1038\/s41586-024-08449-y"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Microsoft\u00a0Azure Quantum Morteza Aghaee Alejandro\u00a0Alcaraz Ramirez et\u00a0al. 2025. Interferometric single-shot parity measurement in InAs\u2013Al hybrid devices. Nature 638 (2025) 651\u2013655. 10.1038\/s41586-024-08445-2","DOI":"10.1038\/s41586-024-08445-2"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-80020-712"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"John Preskill. 2018. Quantum Computing in the NISQ era and beyond. Quantum 2 (Aug. 2018) 79. 10.22331\/q-2018-08-06-79","DOI":"10.22331\/q-2018-08-06-79"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETS50041.2021.9465397"},{"key":"e_1_3_3_1_11_2","volume-title":"Qiskit: An open-source framework for quantum computing","author":"Quantum IBM","year":"2024","unstructured":"IBM Quantum. 2024. Qiskit: An open-source framework for quantum computing. https:\/\/qiskit.org Accessed: Dec. 2024."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Seyon Sivarajah Silas Dilkes Alexander Cowtan Will Simmons Alec Edgington and Ross Duncan. 2020. t| ket\u27e9 : A retargetable compiler for NISQ devices. Quantum Science and Technology 6 1 (Nov. 2020) 014003. 10.1088\/2058-9565\/ab8e92","DOI":"10.1088\/2058-9565\/ab8e92"},{"key":"e_1_3_3_1_13_2","volume-title":"Quilc: The Quil compiler","author":"Computing Rigetti","year":"2025","unstructured":"Rigetti Computing. 2025. Quilc: The Quil compiler. https:\/\/rigetti.com Accessed: April. 2025."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450317"},{"key":"e_1_3_3_1_15_2","unstructured":"Subrata Das and Swaroop Ghosh. 2023. Randomized Reversible Gate-Based Obfuscation for Secured Compilation of Quantum Circuit. arxiv:https:\/\/arXiv.org\/abs\/2305.01133\u00a0[quant-ph] https:\/\/arxiv.org\/abs\/2305.01133"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Rasit\u00a0Onur Topaloglu. 2023. Quantum Logic Locking for Security. J 6 3 (2023) 411\u2013420. 10.3390\/j6030027","DOI":"10.3390\/j6030027"},{"key":"e_1_3_3_1_18_2","volume-title":"E-LoQ: Enhanced Locking for Quantum Circuit IP Protection","author":"Liu Yuntao","year":"2025","unstructured":"Yuntao Liu, Jayden John, and Qian Wang. 2025. E-LoQ: Enhanced Locking for Quantum Circuit IP Protection. arxiv:https:\/\/arXiv.org\/abs\/2412.17101\u00a0[quant-ph] https:\/\/arxiv.org\/abs\/2412.17101"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198570004.001.0001"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415620"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424258"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/isqed65160.2025.11014313"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804281"},{"key":"e_1_3_3_1_25_2","volume-title":"Data Structures and Algorithms (1st ed.)","author":"Aho Alfred\u00a0V.","year":"1983","unstructured":"Alfred\u00a0V. Aho, John\u00a0E. Hopcroft, and Jeffrey Ullman. 1983. Data Structures and Algorithms (1st ed.). Addison-Wesley Longman Publishing Co., Inc., USA."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939749"},{"key":"e_1_3_3_1_27_2","volume-title":"Quantum Approximate Optimization Algorithm","author":"Quantum IBM","year":"2025","unstructured":"IBM Quantum. 2025. Quantum Approximate Optimization Algorithm. https:\/\/learning.quantum.ibm.com\/tutorial\/quantum-approximate-optimization-algorithm Accessed: Apr. 16, 2025."},{"key":"e_1_3_3_1_28_2","volume-title":"Quantum-Classical Obfuscation","author":"Raj Amal","year":"2025","unstructured":"Amal Raj and Vivek Balachandran. 2025. Quantum-Classical Obfuscation. https:\/\/github.com\/vivekianity\/quantum-classical-obfuscation"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"Moein Naseri Tulja\u00a0Varun Kondra Suchetana Goswami Marco Fellous-Asiani and Alexander Streltsov. 2022. Entanglement and coherence in the Bernstein-Vazirani algorithm. Physical Review A 106 6 (2022) 062429. 10.1103\/PhysRevA.106.062429","DOI":"10.1103\/PhysRevA.106.062429"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","unstructured":"Anika Zaman Hector\u00a0Jose Morrell and Hiu\u00a0Yung Wong. 2023. A Step-by-Step HHL Algorithm Walkthrough to Enhance Understanding of Critical Quantum Computing Concepts. IEEE Access 11 (2023) 77117\u201377131. 10.1109\/ACCESS.2023.3297658","DOI":"10.1109\/ACCESS.2023.3297658"}],"event":{"name":"CheckMATE '25: Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","location":"Taipei Taiwan","acronym":"CheckMATE '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733817.3762698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:35Z","timestamp":1766594855000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733817.3762698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":30,"alternative-id":["10.1145\/3733817.3762698","10.1145\/3733817"],"URL":"https:\/\/doi.org\/10.1145\/3733817.3762698","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}