Next Article in Journal
A Publicly Verifiable E-Voting System Based on Biometrics
Next Article in Special Issue
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks
Previous Article in Journal
Comparative Study of Keccak SHA-3 Implementations
Previous Article in Special Issue
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
 
 
Article

Article Versions Notes

Cryptography 2023, 7(4), 61; https://doi.org/10.3390/cryptography7040061
Action Date Notes Link
article xml file uploaded 23 November 2023 11:48 CET Original file -
article xml uploaded. 23 November 2023 11:48 CET Update -
article pdf uploaded. 23 November 2023 11:48 CET Version of Record -
article html file updated 23 November 2023 11:50 CET Original file -
article xml file uploaded 23 November 2023 11:54 CET Update -
article xml uploaded. 23 November 2023 11:54 CET Update https://www.mdpi.com/2410-387X/7/4/61/xml
article pdf uploaded. 23 November 2023 11:54 CET Updated version of record https://www.mdpi.com/2410-387X/7/4/61/pdf
article html file updated 23 November 2023 11:55 CET Update https://www.mdpi.com/2410-387X/7/4/61/html
Back to TopTop