Next Article in Journal
Chaotic Quantum Key Distribution
Next Article in Special Issue
Side-Channel Evaluation Methodology on Software
Previous Article in Journal
Security Analysis of Lightweight IoT Cipher: Chaskey
Previous Article in Special Issue
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
 
 
Article

Article Versions Notes

Cryptography 2020, 4(3), 23; https://doi.org/10.3390/cryptography4030023
Action Date Notes Link
article pdf uploaded. 9 August 2020 11:16 CEST Version of Record https://www.mdpi.com/2410-387X/4/3/23/pdf-vor
article pdf uploaded. 11 August 2020 11:00 CEST Updated version of record https://www.mdpi.com/2410-387X/4/3/23/pdf-vor
article pdf uploaded. 11 August 2020 11:06 CEST Updated version of record https://www.mdpi.com/2410-387X/4/3/23/pdf-vor
article xml file uploaded 13 August 2020 06:37 CEST Original file -
article xml uploaded. 13 August 2020 06:37 CEST Update https://www.mdpi.com/2410-387X/4/3/23/xml
article pdf uploaded. 13 August 2020 06:37 CEST Updated version of record https://www.mdpi.com/2410-387X/4/3/23/pdf
article html file updated 13 August 2020 06:39 CEST Original file -
article html file updated 22 July 2022 02:57 CEST Update https://www.mdpi.com/2410-387X/4/3/23/html
Back to TopTop