Next Article in Journal
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
Next Article in Special Issue
Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol
Previous Article in Journal / Special Issue
Simple, Near-Optimal Quantum Protocols for Die-Rolling
Due to scheduled maintenance work on our core network, there may be short service disruptions on this website between 16:00 and 16:30 CEST on September 25th.
Article

Article Versions Notes

Cryptography 2017, 1(2), 12; https://doi.org/10.3390/cryptography1020012
Action Date Notes Link
article pdf uploaded. 30 July 2017 13:37 CEST Updated version of record https://www.mdpi.com/2410-387X/1/2/12/pdf
article pdf uploaded. 30 July 2017 13:46 CEST Updated version of record https://www.mdpi.com/2410-387X/1/2/12/pdf
article pdf uploaded. 31 July 2017 06:46 CEST Updated version of record https://www.mdpi.com/2410-387X/1/2/12/pdf
article xml uploaded. 31 July 2017 06:46 CEST Update https://www.mdpi.com/2410-387X/1/2/12/xml
article html file updated 31 July 2017 10:07 CEST Update https://www.mdpi.com/2410-387X/1/2/12/html
article html file updated 27 March 2019 18:22 CET Update https://www.mdpi.com/2410-387X/1/2/12/html
article html file updated 3 May 2019 09:21 CEST Update https://www.mdpi.com/2410-387X/1/2/12/html
article html file updated 26 September 2019 06:11 CEST Update https://www.mdpi.com/2410-387X/1/2/12/html
article html file updated 8 February 2020 12:21 CET Update https://www.mdpi.com/2410-387X/1/2/12/html
Back to TopTop