Next Article in Journal
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
Previous Article in Journal
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 29; https://doi.org/10.3390/cryptography2040029
Action Date Notes Link
article xml file uploaded 9 October 2018 15:44 CEST Original file -
article pdf uploaded. 9 October 2018 15:44 CEST Version of Record https://www.mdpi.com/2410-387X/2/4/29/pdf-vor
article xml file uploaded 31 October 2018 09:38 CET Update -
article xml uploaded. 31 October 2018 09:38 CET Update -
article pdf uploaded. 31 October 2018 09:38 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/29/pdf-vor
article html file updated 31 October 2018 10:31 CET Original file -
article xml file uploaded 7 December 2018 03:59 CET Update -
article xml uploaded. 7 December 2018 03:59 CET Update https://www.mdpi.com/2410-387X/2/4/29/xml
article pdf uploaded. 7 December 2018 03:59 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/29/pdf
article html file updated 7 December 2018 04:00 CET Update -
article html file updated 1 April 2019 03:33 CEST Update -
article html file updated 14 April 2019 17:17 CEST Update -
article html file updated 28 April 2019 22:06 CEST Update -
article html file updated 8 October 2019 19:52 CEST Update -
article html file updated 10 February 2020 14:51 CET Update -
article html file updated 29 July 2020 16:51 CEST Update https://www.mdpi.com/2410-387X/2/4/29/html
Back to TopTop