Next Article in Journal
Further Observations on SIMON and SPECK Block Cipher Families
Next Article in Special Issue
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
Previous Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Special Issue
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 42; https://doi.org/10.3390/cryptography2040042
Action Date Notes Link
article xml file uploaded 19 December 2018 14:44 CET Original file -
article pdf uploaded. 19 December 2018 14:44 CET Version of Record https://www.mdpi.com/2410-387X/2/4/42/pdf-vor
article pdf uploaded. 19 December 2018 14:45 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/42/pdf-vor
article xml file uploaded 20 December 2018 06:57 CET Update -
article xml uploaded. 20 December 2018 06:57 CET Update https://www.mdpi.com/2410-387X/2/4/42/xml
article pdf uploaded. 20 December 2018 06:57 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/42/pdf
article html file updated 20 December 2018 06:58 CET Original file -
article html file updated 2 April 2019 15:57 CEST Update -
article html file updated 13 April 2019 12:58 CEST Update -
article html file updated 27 April 2019 17:04 CEST Update -
article html file updated 12 October 2019 05:15 CEST Update -
article html file updated 11 February 2020 04:11 CET Update -
article html file updated 17 July 2022 17:11 CEST Update https://www.mdpi.com/2410-387X/2/4/42/html
Back to TopTop