Next Article in Journal
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
Previous Article in Journal
Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices
 
 
Article

Article Versions Notes

Cryptography 2024, 8(4), 48; https://doi.org/10.3390/cryptography8040048
Action Date Notes Link
article xml file uploaded 28 October 2024 05:42 CET Original file -
article xml uploaded. 28 October 2024 05:42 CET Update -
article pdf uploaded. 28 October 2024 05:42 CET Version of Record -
article html file updated 28 October 2024 05:44 CET Original file -
article xml file uploaded 28 October 2024 12:10 CET Update -
article xml uploaded. 28 October 2024 12:10 CET Update https://www.mdpi.com/2410-387X/8/4/48/xml
article pdf uploaded. 28 October 2024 12:10 CET Updated version of record https://www.mdpi.com/2410-387X/8/4/48/pdf
article html file updated 28 October 2024 12:12 CET Update https://www.mdpi.com/2410-387X/8/4/48/html
Back to TopTop