Next Article in Journal
A New Visual Multi-Secrets Sharing Scheme by Random Grids
Next Article in Special Issue
A New Technique in Rank Metric Code-Based Encryption
Previous Article in Journal
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
Previous Article in Special Issue
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 23; https://doi.org/10.3390/cryptography2030023
Action Date Notes Link
article xml file uploaded 13 September 2018 11:20 CEST Original file -
article xml uploaded. 13 September 2018 11:20 CEST Update https://www.mdpi.com/2410-387X/2/3/23/xml
article pdf uploaded. 13 September 2018 11:20 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/23/pdf
article html file updated 13 September 2018 11:21 CEST Original file -
article html file updated 31 March 2019 18:26 CEST Update -
article html file updated 15 April 2019 01:44 CEST Update -
article html file updated 29 April 2019 06:06 CEST Update -
article html file updated 7 October 2019 19:47 CEST Update -
article html file updated 10 February 2020 10:45 CET Update -
article html file updated 17 July 2022 02:40 CEST Update https://www.mdpi.com/2410-387X/2/3/23/html
Back to TopTop