Next Article in Journal
Provably Secure Covert Communication on Blockchain
Next Article in Special Issue
Hardware-Based Run-Time Code Integrity in Embedded Devices
Previous Article in Journal
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn
Previous Article in Special Issue
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 17; https://doi.org/10.3390/cryptography2030017
Action Date Notes Link
article xml file uploaded 12 August 2018 12:12 CEST Original file -
article pdf uploaded. 12 August 2018 12:12 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/17/pdf-vor
article xml file uploaded 13 August 2018 10:47 CEST Update -
article xml uploaded. 13 August 2018 10:47 CEST Update https://www.mdpi.com/2410-387X/2/3/17/xml
article pdf uploaded. 13 August 2018 10:47 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/17/pdf
article html file updated 13 August 2018 10:48 CEST Original file -
article html file updated 31 March 2019 07:37 CEST Update -
article html file updated 15 April 2019 12:42 CEST Update -
article html file updated 29 April 2019 17:22 CEST Update -
article html file updated 6 October 2019 14:41 CEST Update -
article html file updated 10 February 2020 05:39 CET Update -
article html file updated 17 July 2022 00:49 CEST Update https://www.mdpi.com/2410-387X/2/3/17/html
Back to TopTop