Next Article in Journal
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
Next Article in Special Issue
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Previous Article in Journal
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
Previous Article in Special Issue
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 37; https://doi.org/10.3390/cryptography2040037
Action Date Notes Link
article xml file uploaded 4 December 2018 12:47 CET Original file -
article pdf uploaded. 4 December 2018 12:47 CET Version of Record https://www.mdpi.com/2410-387X/2/4/37/pdf-vor
article pdf uploaded. 4 December 2018 13:08 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/37/pdf-vor
article xml file uploaded 7 December 2018 12:31 CET Update -
article xml uploaded. 7 December 2018 12:31 CET Update https://www.mdpi.com/2410-387X/2/4/37/xml
article pdf uploaded. 7 December 2018 12:31 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/37/pdf
article html file updated 7 December 2018 12:33 CET Original file -
article html file updated 2 April 2019 07:23 CEST Update -
article html file updated 13 April 2019 19:52 CEST Update -
article html file updated 27 April 2019 23:57 CEST Update -
article html file updated 11 October 2019 10:32 CEST Update -
article html file updated 11 February 2020 01:06 CET Update https://www.mdpi.com/2410-387X/2/4/37/html
Back to TopTop