Next Article in Journal
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks
Next Article in Special Issue
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
Previous Article in Journal
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor
Previous Article in Special Issue
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks
 
 
Article

Article Versions Notes

Cryptography 2024, 8(2), 17; https://doi.org/10.3390/cryptography8020017
Action Date Notes Link
article xml file uploaded 25 April 2024 13:03 CEST Original file -
article xml uploaded. 25 April 2024 13:03 CEST Update -
article pdf uploaded. 25 April 2024 13:03 CEST Version of Record https://www.mdpi.com/2410-387X/8/2/17/pdf-vor
article html file updated 25 April 2024 13:07 CEST Original file -
article xml file uploaded 29 April 2024 13:22 CEST Update -
article xml uploaded. 29 April 2024 13:22 CEST Update https://www.mdpi.com/2410-387X/8/2/17/xml
article pdf uploaded. 29 April 2024 13:22 CEST Updated version of record https://www.mdpi.com/2410-387X/8/2/17/pdf
article html file updated 29 April 2024 13:23 CEST Update https://www.mdpi.com/2410-387X/8/2/17/html
Back to TopTop