Next Article in Journal
A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts
Previous Article in Journal
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
Previous Article in Special Issue
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
 
 
Article

Article Versions Notes

Cryptography 2024, 8(3), 41; https://doi.org/10.3390/cryptography8030041
Action Date Notes Link
article pdf uploaded. 11 September 2024 16:45 CEST Version of Record https://www.mdpi.com/2410-387X/8/3/41/pdf-vor
article xml file uploaded 13 September 2024 09:28 CEST Original file -
article xml uploaded. 13 September 2024 09:28 CEST Update -
article pdf uploaded. 13 September 2024 09:28 CEST Updated version of record https://www.mdpi.com/2410-387X/8/3/41/pdf-vor
article html file updated 13 September 2024 09:30 CEST Original file -
article xml file uploaded 13 September 2024 09:32 CEST Update -
article xml uploaded. 13 September 2024 09:32 CEST Update https://www.mdpi.com/2410-387X/8/3/41/xml
article pdf uploaded. 13 September 2024 09:32 CEST Updated version of record https://www.mdpi.com/2410-387X/8/3/41/pdf
article html file updated 13 September 2024 09:33 CEST Update https://www.mdpi.com/2410-387X/8/3/41/html
Back to TopTop