Next Article in Journal / Special Issue
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability
Previous Article in Journal
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment
Previous Article in Special Issue
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model
 
 
Article

Article Versions Notes

Cryptography 2023, 7(2), 17; https://doi.org/10.3390/cryptography7020017
Action Date Notes Link
article xml file uploaded 27 March 2023 12:09 CEST Original file -
article xml uploaded. 27 March 2023 12:09 CEST Update -
article pdf uploaded. 27 March 2023 12:09 CEST Version of Record -
article html file updated 27 March 2023 12:10 CEST Original file -
article xml file uploaded 27 March 2023 12:43 CEST Update -
article xml uploaded. 27 March 2023 12:43 CEST Update -
article pdf uploaded. 27 March 2023 12:43 CEST Updated version of record https://www.mdpi.com/2410-387X/7/2/17/pdf
article html file updated 27 March 2023 12:44 CEST Update -
article xml file uploaded 29 March 2023 06:01 CEST Update -
article xml uploaded. 29 March 2023 06:01 CEST Update https://www.mdpi.com/2410-387X/7/2/17/xml
article html file updated 29 March 2023 06:03 CEST Update -
article html file updated 6 April 2023 22:52 CEST Update https://www.mdpi.com/2410-387X/7/2/17/html
Back to TopTop