Next Article in Journal
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers
Next Article in Special Issue
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
Previous Article in Journal
A New Visual Multi-Secrets Sharing Scheme by Random Grids
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 25; https://doi.org/10.3390/cryptography2030025
Action Date Notes Link
article xml file uploaded 18 September 2018 15:13 CEST Original file -
article xml uploaded. 18 September 2018 15:13 CEST Update -
article pdf uploaded. 18 September 2018 15:13 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/25/pdf-vor
article html file updated 18 September 2018 15:14 CEST Original file -
article xml file uploaded 19 September 2018 05:14 CEST Update -
article xml uploaded. 19 September 2018 05:14 CEST Update https://www.mdpi.com/2410-387X/2/3/25/xml
article pdf uploaded. 19 September 2018 05:14 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/25/pdf
article html file updated 19 September 2018 05:15 CEST Update -
article html file updated 31 March 2019 20:19 CEST Update -
article html file updated 14 April 2019 23:51 CEST Update -
article html file updated 29 April 2019 04:21 CEST Update -
article html file updated 8 October 2019 00:55 CEST Update -
article html file updated 10 February 2020 11:38 CET Update -
article html file updated 17 July 2022 03:02 CEST Update https://www.mdpi.com/2410-387X/2/3/25/html
Back to TopTop