Next Article in Journal
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion
Previous Article in Journal / Special Issue
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 27; https://doi.org/10.3390/cryptography2040027
Action Date Notes Link
article xml file uploaded 23 September 2018 11:53 CEST Original file -
article xml uploaded. 23 September 2018 11:53 CEST Update -
article pdf uploaded. 23 September 2018 11:53 CEST Version of Record https://www.mdpi.com/2410-387X/2/4/27/pdf-vor
article html file updated 23 September 2018 11:54 CEST Original file -
article pdf uploaded. 25 September 2018 08:22 CEST Updated version of record https://www.mdpi.com/2410-387X/2/4/27/pdf
article xml uploaded. 25 September 2018 08:22 CEST Update -
article xml uploaded. 25 September 2018 08:22 CEST Update -
article html file updated 25 September 2018 08:24 CEST Update -
article xml uploaded. 25 September 2018 08:56 CEST Update https://www.mdpi.com/2410-387X/2/4/27/xml
article html file updated 25 September 2018 08:57 CEST Update -
article html file updated 31 March 2019 22:04 CEST Update -
article html file updated 14 April 2019 22:11 CEST Update -
article html file updated 29 April 2019 02:44 CEST Update -
article html file updated 8 October 2019 05:40 CEST Update -
article html file updated 10 February 2020 12:27 CET Update -
article html file updated 29 July 2020 16:48 CEST Update https://www.mdpi.com/2410-387X/2/4/27/html
Back to TopTop