Next Article in Journal
The Role of Blockchain in Medical Data Sharing
Next Article in Special Issue
Divisions and Square Roots with Tight Error Analysis from Newton–Raphson Iteration in Secure Fixed-Point Arithmetic
Previous Article in Journal
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification
Previous Article in Special Issue
Inferring Bivariate Polynomials for Homomorphic Encryption Application
 
 
Article

Article Versions Notes

Cryptography 2023, 7(3), 35; https://doi.org/10.3390/cryptography7030035
Action Date Notes Link
article xml file uploaded 11 July 2023 11:06 CEST Original file -
article xml uploaded. 11 July 2023 11:06 CEST Update -
article pdf uploaded. 11 July 2023 11:06 CEST Version of Record -
article html file updated 11 July 2023 11:08 CEST Original file -
article html file updated 11 July 2023 11:09 CEST Update -
article html file updated 11 July 2023 11:11 CEST Update -
article xml file uploaded 11 July 2023 12:01 CEST Update -
article xml uploaded. 11 July 2023 12:01 CEST Update https://www.mdpi.com/2410-387X/7/3/35/xml
article pdf uploaded. 11 July 2023 12:01 CEST Updated version of record https://www.mdpi.com/2410-387X/7/3/35/pdf
article html file updated 11 July 2023 12:03 CEST Update -
article html file updated 20 July 2023 21:40 CEST Update https://www.mdpi.com/2410-387X/7/3/35/html
Back to TopTop