Next Article in Journal
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
Next Article in Special Issue
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers
Previous Article in Journal / Special Issue
Hardware-Based Run-Time Code Integrity in Embedded Devices
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 22; https://doi.org/10.3390/cryptography2030022
Action Date Notes Link
article xml file uploaded 31 August 2018 08:50 CEST Original file -
article xml uploaded. 31 August 2018 08:50 CEST Update https://www.mdpi.com/2410-387X/2/3/22/xml
article pdf uploaded. 31 August 2018 08:50 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/22/pdf
article html file updated 31 August 2018 08:51 CEST Original file -
article html file updated 31 March 2019 13:32 CEST Update -
article html file updated 15 April 2019 06:41 CEST Update -
article html file updated 29 April 2019 11:01 CEST Update -
article html file updated 7 October 2019 06:24 CEST Update -
article html file updated 10 February 2020 08:25 CET Update https://www.mdpi.com/2410-387X/2/3/22/html
Back to TopTop