Next Article in Journal
Key Generation for Hardware Obfuscation Using Strong PUFs
Previous Article in Journal
Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction
 
 
Article

Article Versions Notes

Cryptography 2019, 3(2), 16; https://doi.org/10.3390/cryptography3020016
Action Date Notes Link
article xml file uploaded 21 June 2019 12:47 CEST Original file -
article xml uploaded. 21 June 2019 12:47 CEST Update -
article pdf uploaded. 21 June 2019 12:47 CEST Version of Record https://www.mdpi.com/2410-387X/3/2/16/pdf-vor
article html file updated 21 June 2019 12:48 CEST Original file -
article xml file uploaded 24 June 2019 08:54 CEST Update -
article xml uploaded. 24 June 2019 08:54 CEST Update https://www.mdpi.com/2410-387X/3/2/16/xml
article pdf uploaded. 24 June 2019 08:54 CEST Updated version of record https://www.mdpi.com/2410-387X/3/2/16/pdf
article html file updated 24 June 2019 08:55 CEST Update -
article html file updated 22 October 2019 07:03 CEST Update -
article html file updated 12 February 2020 21:17 CET Update -
article html file updated 20 July 2022 15:12 CEST Update https://www.mdpi.com/2410-387X/3/2/16/html
Back to TopTop