Next Article in Journal
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation
Next Article in Special Issue
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
Previous Article in Journal
Process Authentication through Blockchain: Three Case Studies
Previous Article in Special Issue
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
 
 
Article

Article Versions Notes

Cryptography 2022, 6(4), 59; https://doi.org/10.3390/cryptography6040059
Action Date Notes Link
article pdf uploaded. 11 November 2022 10:28 CET Version of Record https://www.mdpi.com/2410-387X/6/4/59/pdf-vor
article xml file uploaded 18 November 2022 04:33 CET Original file -
article xml uploaded. 18 November 2022 04:33 CET Update https://www.mdpi.com/2410-387X/6/4/59/xml
article pdf uploaded. 18 November 2022 04:33 CET Updated version of record https://www.mdpi.com/2410-387X/6/4/59/pdf
article html file updated 18 November 2022 04:35 CET Original file -
article html file updated 28 February 2023 22:34 CET Update -
article html file updated 2 March 2023 22:40 CET Update https://www.mdpi.com/2410-387X/6/4/59/html
Back to TopTop