Next Article in Journal
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
Previous Article in Journal
An Enhanced Key Management Scheme for LoRaWAN
Previous Article in Special Issue
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 35; https://doi.org/10.3390/cryptography2040035
Action Date Notes Link
article xml file uploaded 8 November 2018 16:08 CET Original file -
article pdf uploaded. 8 November 2018 16:08 CET Version of Record https://www.mdpi.com/2410-387X/2/4/35/pdf-vor
article pdf uploaded. 8 November 2018 16:29 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/35/pdf-vor
article xml file uploaded 15 November 2018 05:07 CET Update -
article xml uploaded. 15 November 2018 05:07 CET Update https://www.mdpi.com/2410-387X/2/4/35/xml
article pdf uploaded. 15 November 2018 05:07 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/35/pdf
article html file updated 15 November 2018 05:09 CET Original file -
article html file updated 1 April 2019 18:33 CEST Update -
article html file updated 14 April 2019 05:58 CEST Update -
article html file updated 28 April 2019 10:32 CEST Update -
article html file updated 10 October 2019 05:02 CEST Update -
article html file updated 10 February 2020 20:23 CET Update -
article html file updated 17 July 2022 08:17 CEST Update https://www.mdpi.com/2410-387X/2/4/35/html
Back to TopTop