Next Article in Journal
Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices
Next Article in Special Issue
Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication
Previous Article in Journal
Quantum Identity-Based Encryption from the Learning with Errors Problem
Previous Article in Special Issue
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
 
 
Article

Article Versions Notes

Cryptography 2022, 6(1), 10; https://doi.org/10.3390/cryptography6010010
Action Date Notes Link
article xml file uploaded 21 February 2022 09:46 CET Original file -
article xml uploaded. 21 February 2022 09:46 CET Update https://www.mdpi.com/2410-387X/6/1/10/xml
article pdf uploaded. 21 February 2022 09:46 CET Version of Record https://www.mdpi.com/2410-387X/6/1/10/pdf
article html file updated 21 February 2022 09:48 CET Original file -
article html file updated 1 August 2022 01:22 CEST Update https://www.mdpi.com/2410-387X/6/1/10/html
Back to TopTop