Next Article in Journal
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
Previous Article in Journal
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
 
 
Article

Article Versions Notes

Cryptography 2024, 8(3), 35; https://doi.org/10.3390/cryptography8030035
Action Date Notes Link
article pdf uploaded. 7 August 2024 17:15 CEST Version of Record https://www.mdpi.com/2410-387X/8/3/35/pdf-vor
article xml file uploaded 8 August 2024 11:16 CEST Original file -
article xml uploaded. 8 August 2024 11:16 CEST Update https://www.mdpi.com/2410-387X/8/3/35/xml
article pdf uploaded. 8 August 2024 11:16 CEST Updated version of record https://www.mdpi.com/2410-387X/8/3/35/pdf
article html file updated 8 August 2024 11:18 CEST Original file https://www.mdpi.com/2410-387X/8/3/35/html
Back to TopTop