Next Article in Journal
Optimized CSIDH Implementation Using a 2-Torsion Point
Previous Article in Journal
Privacy Protection in Real Time HEVC Standard Using Chaotic System
Open AccessArticle

Article Versions Notes

Cryptography 2020, 4(3), 19; https://doi.org/10.3390/cryptography4030019
Action Date Notes Link
article xml file uploaded 6 July 2020 13:18 CEST Update https://www.mdpi.com/2410-387X/4/3/19/xml
article xml uploaded. 6 July 2020 13:18 CEST Update https://www.mdpi.com/2410-387X/4/3/19/xml
article pdf uploaded. 6 July 2020 13:18 CEST Updated version of record https://www.mdpi.com/2410-387X/4/3/19/pdf
article html file updated 6 July 2020 16:17 CEST Update https://www.mdpi.com/2410-387X/4/3/19/html
Back to TopTop