Next Article in Journal
LMKCDEY Revisited: Speeding Up Blind Rotation with Signed Evaluation Keys
Next Article in Special Issue
Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption
Previous Article in Journal
Incorporating Digital Footprints into Credit-Scoring Models through Model Averaging
Previous Article in Special Issue
Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm
 
 
Article

Article Versions Notes

Mathematics 2024, 12(18), 2908; https://doi.org/10.3390/math12182908
Action Date Notes Link
article xml file uploaded 18 September 2024 15:59 CEST Original file -
article xml uploaded. 18 September 2024 15:59 CEST Update https://www.mdpi.com/2227-7390/12/18/2908/xml
article pdf uploaded. 18 September 2024 15:59 CEST Version of Record https://www.mdpi.com/2227-7390/12/18/2908/pdf
article html file updated 18 September 2024 16:01 CEST Original file https://www.mdpi.com/2227-7390/12/18/2908/html
Back to TopTop