Next Article in Journal
Cryptography as the Means to Protect Fundamental Human Rights
Next Article in Special Issue
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
Previous Article in Journal
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies
Previous Article in Special Issue
Improvements on Making BKW Practical for Solving LWE
 
 
Article

Article Versions Notes

Cryptography 2021, 5(4), 33; https://doi.org/10.3390/cryptography5040033
Action Date Notes Link
article pdf uploaded. 29 November 2021 11:45 CET Version of Record https://www.mdpi.com/2410-387X/5/4/33/pdf-vor
article xml file uploaded 30 November 2021 18:24 CET Original file -
article xml uploaded. 30 November 2021 18:24 CET Update https://www.mdpi.com/2410-387X/5/4/33/xml
article pdf uploaded. 30 November 2021 18:24 CET Updated version of record https://www.mdpi.com/2410-387X/5/4/33/pdf
article html file updated 30 November 2021 18:25 CET Original file -
article html file updated 30 July 2022 19:25 CEST Update https://www.mdpi.com/2410-387X/5/4/33/html
Back to TopTop