Next Article in Journal
Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights
Previous Article in Journal
From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography
Previous Article in Special Issue
Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications
 
 
Article

Article Versions Notes

Cryptography 2025, 9(3), 59; https://doi.org/10.3390/cryptography9030059
Action Date Notes Link
article pdf uploaded. 12 September 2025 14:35 CEST Version of Record https://www.mdpi.com/2410-387X/9/3/59/pdf-vor
article xml file uploaded 17 September 2025 15:11 CEST Original file -
article xml uploaded. 17 September 2025 15:11 CEST Update -
article pdf uploaded. 17 September 2025 15:11 CEST Updated version of record https://www.mdpi.com/2410-387X/9/3/59/pdf-vor
article html file updated 17 September 2025 15:14 CEST Original file -
article xml file uploaded 18 September 2025 13:25 CEST Update -
article xml uploaded. 18 September 2025 13:25 CEST Update -
article pdf uploaded. 18 September 2025 13:25 CEST Updated version of record https://www.mdpi.com/2410-387X/9/3/59/pdf-vor
article xml file uploaded 18 September 2025 13:26 CEST Update -
article xml uploaded. 18 September 2025 13:26 CEST Update https://www.mdpi.com/2410-387X/9/3/59/xml
article pdf uploaded. 18 September 2025 13:26 CEST Updated version of record https://www.mdpi.com/2410-387X/9/3/59/pdf
article html file updated 18 September 2025 13:26 CEST Update -
article html file updated 18 September 2025 13:28 CEST Update https://www.mdpi.com/2410-387X/9/3/59/html
Back to TopTop