Next Article in Journal
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
Next Article in Special Issue
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Journal
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
Previous Article in Special Issue
On the Performance and Security of Multiplication in GF(2N)
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 30; https://doi.org/10.3390/cryptography2040030
Action Date Notes Link
article xml file uploaded 12 October 2018 07:15 CEST Original file -
article xml uploaded. 12 October 2018 07:15 CEST Update https://www.mdpi.com/2410-387X/2/4/30/xml
article pdf uploaded. 12 October 2018 07:15 CEST Version of Record https://www.mdpi.com/2410-387X/2/4/30/pdf
article html file updated 12 October 2018 07:15 CEST Original file -
article html file updated 1 April 2019 05:06 CEST Update -
article html file updated 14 April 2019 16:09 CEST Update -
article html file updated 28 April 2019 21:00 CEST Update -
article html file updated 10 February 2020 15:25 CET Update https://www.mdpi.com/2410-387X/2/4/30/html
Back to TopTop