Journal Papers

  1. Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez. Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes, IEEE Transactions on Computers. Vol.59, No. 11, pp. 1547-1561. November 2010.
    doi:10.1109/TC.2010.64

  2. Debrup Chakraborty, Cuauhtemoc Mancillas-López,Francisco Rodríguez-Henríquez, Palash Sarkar. Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes, IEEE Transactions on Computers, vol. 62, No. 2, pp. 279-294. January 2013. doi:10.1109/TC.2011.227

  3. Debrup Chakraborty, Cuauhtemoc Mancillas-López and Palash Sarkar, STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data , IEEE Transactions on Computers. Vol.64, num. 9, pp. 2691-2707. September 2015. doi:10.1109/TC.2014.2366739

  4. L. Bossuet, N. Datta, C. Mancillas-López and M. Nandi. ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation. IEEE Transactions on Computers. Volume 65, number 11, 2016, pages 3318-3331.
    doi:10.1109/TC.2016.2529618

  5. Alberto F. Martínez-Herrera, Cuauhtemoc Mancillas-López, Carlos Mex-Perera. GCM Implementations of Camellia-128 and SMS4 by Optimizing the Polynomial Multiplier. Microprocessors and Microsystems. Volume 45, part A, 2016, pages 129-140. ISSN 0141-9331.
    doi:10.1016/j.micpro.2016.04.006

  6. De la Fraga Luis Gerardo, Torres-Pérez Esteban, Tlelo-Cuautle Esteban and Mancillas-López Cuauhtemoc. Hardware Implementation of Pseudo-Random Number Generators based on Chaotic Maps. Nonlinear Dynamics. Volume 90, number 3, 2017, pages 1661-1670. ISSN 1573-269X.
    doi:10.1007/s11071-017-3755-z

  7. Atıl U. Ay, Cuauhtemoc Mancillas-López, Erdinç Öztürk , Francisco Rodríguez-Henríquez and Erkay Savaş. Constant-time Hardware Computation of Elliptic Curve Scalar Multiplication Around the 128 bit Security Level. Microprocessors and Microsystems. Volume 62, 2018, pages 79-90. ISSN 0141-9331.
    doi:10.1016/j.micpro.2018.05.005

  8. A. Jha, C. Mancillas-Lopez, M. Nandi and S. S. Gupta, On Random Read Access in OCB. IEEE Transactions on Information Theory. Volume 65, number 12, 2019, pages 8325-8344.
    doi:10.1109/TIT.2019.2925613

  9. Lilian Bossuet, Cuauhtemoc Mancillas López and Brisbane Ovilla MArtínez. Pipelined Hardware Implementation of COPA, ELmD, and COLM.IEEE Transactions on Computers. To appear.
    doi:10.1109/TC.2020.2977031

Other Journal Papers

  1. Debrup Chakraborty, Cuauhtemoc Mancillas-López. Double Ciphertext Mode: A Proposal for Secure Backup. International Journal of Applied Cryptography (IJACT). Volumen 2, number 3, pages 271-287, 2013.
    doi:10.1504/IJACT.2012.045588

  2. Debrup Chakraborty, Cuauhtemoc Mancillas-López and Palash Sarkar. Disk Encryption: Do We Need to Preserve Length? Journal of Cryptographic Engineering. Volumen 8, number 1, pages 49-69, 2018.
    doi:10.1007/s13389-016-0147-0

  3. Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki. INT-RUP Secure Lightweight Parallel AE Modes. IACR Transactions on Symmetric Cryptology. Volumen 2019, issue 4, pages 81-118 .
    doi:10.13154/tosc.v2019.i4.81-118

Conference Papers

  1. Saúl Zapotecas-Martínez, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez and Nareli Cruz-Cortés. Reconfigurable Hardware Implementation of the Lenstra Factorization Algorithm. IEEE Computer Society Press, 4 pages, ICEEE 2006, Veracruz, México, Septiembre 2006.
    doi:10.1109/ICEEE.2006.251939

  2. Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez. Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. K. Srinathan, C. Pandu Rangan, Moti Yung (Eds.): Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, pp. 414-424.
    doi:10.1007/978-3-540-77026-8_33

  3. Cuauhtemoc Mancillas-López D, Debrup Chakraborty and Francisco Rodríguez-Henríquez. On Some weaknesses in the Disc encryption schemes EME and EME2. In proceedings of International Conference on Information Systems Security, ICISS 2009, Atul Prakash, Indranil Sengupta (Eds.), Lecture Notes in Computer Science, Springer, pp. 265-279, Kolkata, India, December 2009. Springer ISBN: 978-3-642-10771-9.
    doi:10.1007/978-3-642-10772-6_20

  4. Alejandro Juárez Arellano, Cuauhtemoc Mancillas López and Luis Gerardo de La Fraga. Design of an Academic Microcontroller and its Application to Authenticated Encryption. IEEE Computer Society Press, 4 pages, International Conference on Electronics, Communications and Computers, Cholula, Puebla, February, 2014.
    doi:10.1109/CONIELECOMP.2014.6808581

  5. El Mehdi Benhani1, Cuauhtemoc Mancillas Lopez and Lilian Bossuet. Secure internal communication of a TrustZone-enabled heterogeneous SoC lightweight encryption. In proceedings of International Conference on Field-Programmable Technology, FPT 2009.
    doi:10.1109/ICFPT47387.2019.00037