Next Article in Journal
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24)
Next Article in Special Issue
From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography
Previous Article in Journal
Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation
 
 
Article

Article Versions Notes

Cryptography 2025, 9(1), 20; https://doi.org/10.3390/cryptography9010020
Action Date Notes Link
article pdf uploaded. 19 March 2025 14:34 CET Version of Record https://www.mdpi.com/2410-387X/9/1/20/pdf-vor
article xml file uploaded 20 March 2025 10:23 CET Original file -
article xml uploaded. 20 March 2025 10:23 CET Update -
article pdf uploaded. 20 March 2025 10:23 CET Updated version of record https://www.mdpi.com/2410-387X/9/1/20/pdf-vor
article html file updated 20 March 2025 10:25 CET Original file -
article xml file uploaded 24 March 2025 13:44 CET Update -
article xml uploaded. 24 March 2025 13:44 CET Update https://www.mdpi.com/2410-387X/9/1/20/xml
article pdf uploaded. 24 March 2025 13:44 CET Updated version of record https://www.mdpi.com/2410-387X/9/1/20/pdf
article html file updated 24 March 2025 13:46 CET Update -
article html file updated 24 June 2025 20:51 CEST Update https://www.mdpi.com/2410-387X/9/1/20/html
Back to TopTop