Next Article in Journal
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
Previous Article in Journal
A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment
 
 
Article

Article Versions Notes

Cryptography 2024, 8(3), 40; https://doi.org/10.3390/cryptography8030040
Action Date Notes Link
article xml file uploaded 8 September 2024 11:50 CEST Original file -
article xml uploaded. 8 September 2024 11:50 CEST Update -
article pdf uploaded. 8 September 2024 11:50 CEST Version of Record https://www.mdpi.com/2410-387X/8/3/40/pdf-vor
article html file updated 8 September 2024 11:53 CEST Original file -
article xml file uploaded 10 September 2024 07:45 CEST Update -
article xml uploaded. 10 September 2024 07:45 CEST Update https://www.mdpi.com/2410-387X/8/3/40/xml
article pdf uploaded. 10 September 2024 07:46 CEST Updated version of record https://www.mdpi.com/2410-387X/8/3/40/pdf
article html file updated 10 September 2024 07:47 CEST Update https://www.mdpi.com/2410-387X/8/3/40/html
Back to TopTop