Next Article in Journal
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation
Next Article in Special Issue
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
Previous Article in Journal
Process Authentication through Blockchain: Three Case Studies
Previous Article in Special Issue
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare

Article Versions Notes

Cryptography 2022, 6(4), 59;
Action Date Notes Link
article pdf uploaded. 11 November 2022 10:28 CET Version of Record
article xml file uploaded 18 November 2022 04:33 CET Original file -
article xml uploaded. 18 November 2022 04:33 CET Update
article pdf uploaded. 18 November 2022 04:33 CET Updated version of record
article html file updated 18 November 2022 04:35 CET Original file -
article html file updated 28 February 2023 22:34 CET Update -
article html file updated 2 March 2023 22:40 CET Update
Back to TopTop