Next Article in Journal
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Previous Article in Journal
Forward-Secure Linkable Ring Signatures from Bilinear Maps
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 36; https://doi.org/10.3390/cryptography2040036
Action Date Notes Link
article xml file uploaded 22 November 2018 15:27 CET Original file -
article pdf uploaded. 22 November 2018 15:27 CET Version of Record https://www.mdpi.com/2410-387X/2/4/36/pdf-vor
article pdf uploaded. 22 November 2018 15:32 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/36/pdf-vor
article xml file uploaded 28 November 2018 09:41 CET Update -
article xml uploaded. 28 November 2018 09:41 CET Update https://www.mdpi.com/2410-387X/2/4/36/xml
article pdf uploaded. 28 November 2018 09:41 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/36/pdf
article html file updated 28 November 2018 09:43 CET Original file -
article html file updated 2 April 2019 01:05 CEST Update -
article html file updated 14 April 2019 00:44 CEST Update -
article html file updated 28 April 2019 04:36 CEST Update -
article html file updated 10 October 2019 20:51 CEST Update -
article html file updated 10 February 2020 22:51 CET Update -
article html file updated 17 July 2022 10:40 CEST Update https://www.mdpi.com/2410-387X/2/4/36/html
Back to TopTop