Next Article in Journal
A New Technique in Rank Metric Code-Based Encryption
Next Article in Special Issue
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Previous Article in Journal
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 31; https://doi.org/10.3390/cryptography2040031
Action Date Notes Link
article xml file uploaded 15 October 2018 09:45 CEST Original file -
article xml uploaded. 15 October 2018 09:45 CEST Update https://www.mdpi.com/2410-387X/2/4/31/xml
article pdf uploaded. 15 October 2018 09:45 CEST Version of Record https://www.mdpi.com/2410-387X/2/4/31/pdf
article html file updated 15 October 2018 09:45 CEST Original file -
article html file updated 1 April 2019 06:18 CEST Update -
article html file updated 14 April 2019 15:15 CEST Update -
article html file updated 28 April 2019 20:07 CEST Update -
article html file updated 10 February 2020 15:52 CET Update https://www.mdpi.com/2410-387X/2/4/31/html
Back to TopTop