Next Article in Journal / Special Issue
Certified Randomness From Steering Using Sequential Measurements
Previous Article in Journal / Special Issue
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Article

Article Versions Notes

Cryptography 2019, 3(4), 26; https://doi.org/10.3390/cryptography3040026
Action Date Notes Link
article xml file uploaded 20 November 2019 12:53 CET Update https://www.mdpi.com/2410-387X/3/4/26/xml
article pdf uploaded. 20 November 2019 12:53 CET Updated version of record https://www.mdpi.com/2410-387X/3/4/26/pdf
article xml file uploaded 29 November 2019 11:50 CET Update https://www.mdpi.com/2410-387X/3/4/26/xml
article xml uploaded. 29 November 2019 11:50 CET Update https://www.mdpi.com/2410-387X/3/4/26/xml
article pdf uploaded. 29 November 2019 11:50 CET Updated version of record https://www.mdpi.com/2410-387X/3/4/26/pdf
article html file updated 29 November 2019 14:37 CET Update https://www.mdpi.com/2410-387X/3/4/26/html
article html file updated 14 February 2020 11:26 CET Update https://www.mdpi.com/2410-387X/3/4/26/html
Back to TopTop