Next Article in Journal
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
Previous Article in Journal
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 14; https://doi.org/10.3390/cryptography2030014
Action Date Notes Link
article xml file uploaded 15 July 2018 12:14 CEST Original file -
article pdf uploaded. 15 July 2018 12:14 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/14/pdf-vor
article xml file uploaded 16 July 2018 12:11 CEST Update -
article xml uploaded. 16 July 2018 12:11 CEST Update https://www.mdpi.com/2410-387X/2/3/14/xml
article pdf uploaded. 16 July 2018 12:11 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/14/pdf
article html file updated 16 July 2018 12:12 CEST Original file -
article html file updated 2 August 2018 10:13 CEST Update -
article html file updated 30 March 2019 20:37 CET Update -
article html file updated 15 April 2019 21:29 CEST Update -
article html file updated 30 April 2019 02:12 CEST Update -
article html file updated 5 October 2019 15:07 CEST Update -
article html file updated 10 February 2020 01:26 CET Update -
article html file updated 16 July 2022 23:13 CEST Update https://www.mdpi.com/2410-387X/2/3/14/html
Back to TopTop