Next Article in Journal
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
Next Article in Special Issue
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
Previous Article in Journal
Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
Previous Article in Special Issue
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
 
 
Article

Article Versions Notes

Cryptography 2024, 8(3), 33; https://doi.org/10.3390/cryptography8030033
Action Date Notes Link
article xml file uploaded 1 August 2024 15:45 CEST Original file -
article xml uploaded. 1 August 2024 15:45 CEST Update https://www.mdpi.com/2410-387X/8/3/33/xml
article pdf uploaded. 1 August 2024 15:45 CEST Version of Record https://www.mdpi.com/2410-387X/8/3/33/pdf
article html file updated 1 August 2024 15:46 CEST Original file https://www.mdpi.com/2410-387X/8/3/33/html
Back to TopTop