Next Article in Journal
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn
Next Article in Special Issue
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics
Previous Article in Journal
An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 15; https://doi.org/10.3390/cryptography2030015
Action Date Notes Link
article xml file uploaded 18 July 2018 14:12 CEST Original file -
article xml uploaded. 18 July 2018 14:12 CEST Update -
article pdf uploaded. 18 July 2018 14:12 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/15/pdf-vor
article html file updated 18 July 2018 14:13 CEST Original file -
article pdf uploaded. 20 July 2018 14:24 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/15/pdf-vor
article xml uploaded. 20 July 2018 14:24 CEST Update -
article xml uploaded. 20 July 2018 14:24 CEST Update -
article html file updated 20 July 2018 14:25 CEST Update -
article pdf uploaded. 25 July 2018 09:44 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/15/pdf
article xml uploaded. 25 July 2018 09:44 CEST Update https://www.mdpi.com/2410-387X/2/3/15/xml
article html file updated 25 July 2018 09:45 CEST Update -
article html file updated 2 August 2018 11:55 CEST Update -
article html file updated 30 March 2019 21:37 CET Update -
article html file updated 15 April 2019 20:39 CEST Update -
article html file updated 30 April 2019 01:23 CEST Update -
article html file updated 5 October 2019 17:30 CEST Update -
article html file updated 10 February 2020 01:51 CET Update https://www.mdpi.com/2410-387X/2/3/15/html
Back to TopTop