Next Article in Journal
Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System
Next Article in Special Issue
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24)
Previous Article in Journal
Optimizing Message Range and Ciphertext Storage in Gentry–Sahai–Waters Encryption Using Chinese Remainder Theorem and PVW-like Compression Scheme
Previous Article in Special Issue
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation
 
 
Article

Article Versions Notes

Cryptography 2025, 9(1), 15; https://doi.org/10.3390/cryptography9010015
Action Date Notes Link
article xml file uploaded 3 March 2025 13:26 CET Original file -
article xml uploaded. 3 March 2025 13:26 CET Update https://www.mdpi.com/2410-387X/9/1/15/xml
article pdf uploaded. 3 March 2025 13:26 CET Version of Record https://www.mdpi.com/2410-387X/9/1/15/pdf
article html file updated 3 March 2025 13:29 CET Original file https://www.mdpi.com/2410-387X/9/1/15/html
Back to TopTop