Next Article in Journal
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
Previous Article in Journal
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption
Previous Article in Special Issue
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24)
 
 
Article

Article Versions Notes

Cryptography 2025, 9(2), 34; https://doi.org/10.3390/cryptography9020034
Action Date Notes Link
article pdf uploaded. 27 May 2025 13:33 CEST Version of Record https://www.mdpi.com/2410-387X/9/2/34/pdf-vor
article pdf uploaded. 27 May 2025 14:15 CEST Updated version of record https://www.mdpi.com/2410-387X/9/2/34/pdf-vor
article xml file uploaded 29 May 2025 10:26 CEST Original file -
article xml uploaded. 29 May 2025 10:26 CEST Update https://www.mdpi.com/2410-387X/9/2/34/xml
article pdf uploaded. 29 May 2025 10:26 CEST Updated version of record https://www.mdpi.com/2410-387X/9/2/34/pdf
article html file updated 29 May 2025 10:30 CEST Original file https://www.mdpi.com/2410-387X/9/2/34/html
Back to TopTop