Next Article in Journal
Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions
Next Article in Special Issue
A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems
Previous Article in Journal
Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions
Previous Article in Special Issue
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Article

Article Versions Notes

Cryptography 2024, 8(4), 47; https://doi.org/10.3390/cryptography8040047
Action Date Notes Link
article html file updated 28 June 2025 01:49 CEST Update https://www.mdpi.com/2410-387X/8/4/47/html
article html file updated 23 October 2024 09:59 CEST Original file -
article pdf uploaded. 23 October 2024 09:56 CEST Version of Record https://www.mdpi.com/2410-387X/8/4/47/pdf
article xml uploaded. 23 October 2024 09:56 CEST Update https://www.mdpi.com/2410-387X/8/4/47/xml
article xml file uploaded 23 October 2024 09:56 CEST Original file -
Back to TopTop