Next Article in Journal
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
Next Article in Special Issue
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
Previous Article in Journal
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
Previous Article in Special Issue
An Alternative Diffie-Hellman Protocol
 
 
Article

Article Versions Notes

Cryptography 2020, 4(2), 16; https://doi.org/10.3390/cryptography4020016
Action Date Notes Link
article pdf uploaded. 12 June 2020 11:01 CEST Version of Record https://www.mdpi.com/2410-387X/4/2/16/pdf-vor
article xml file uploaded 30 June 2020 09:22 CEST Original file -
article xml uploaded. 30 June 2020 09:22 CEST Update https://www.mdpi.com/2410-387X/4/2/16/xml
article pdf uploaded. 30 June 2020 09:22 CEST Updated version of record https://www.mdpi.com/2410-387X/4/2/16/pdf
article html file updated 30 June 2020 09:24 CEST Original file -
article html file updated 21 July 2022 20:41 CEST Update https://www.mdpi.com/2410-387X/4/2/16/html
Back to TopTop