Next Article in Journal
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics
Next Article in Special Issue
A Secure Algorithm for Inversion Modulo 2k
Previous Article in Journal
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
 
 
Brief Report

Article Versions Notes

Cryptography 2018, 2(3), 16; https://doi.org/10.3390/cryptography2030016
Action Date Notes Link
article xml file uploaded 19 July 2018 09:13 CEST Original file -
article xml uploaded. 19 July 2018 09:13 CEST Update https://www.mdpi.com/2410-387X/2/3/16/xml
article pdf uploaded. 19 July 2018 09:13 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/16/pdf
article html file updated 19 July 2018 09:14 CEST Original file -
article html file updated 2 August 2018 12:21 CEST Update -
article html file updated 30 March 2019 21:50 CET Update -
article html file updated 15 April 2019 20:27 CEST Update -
article html file updated 30 April 2019 01:12 CEST Update -
article html file updated 5 October 2019 18:03 CEST Update -
article html file updated 10 February 2020 01:57 CET Update -
article html file updated 16 July 2022 23:25 CEST Update https://www.mdpi.com/2410-387X/2/3/16/html
Back to TopTop