Next Article in Journal
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource
Previous Article in Journal
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
 
 
Article

Article Versions Notes

Cryptography 2024, 8(2), 12; https://doi.org/10.3390/cryptography8020012
Action Date Notes Link
article xml file uploaded 22 March 2024 10:38 CET Original file -
article xml uploaded. 22 March 2024 10:38 CET Update https://www.mdpi.com/2410-387X/8/2/12/xml
article pdf uploaded. 22 March 2024 10:38 CET Version of Record https://www.mdpi.com/2410-387X/8/2/12/pdf
article html file updated 22 March 2024 10:39 CET Original file https://www.mdpi.com/2410-387X/8/2/12/html
Back to TopTop