Next Article in Journal
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms
Previous Article in Journal
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
Previous Article in Special Issue
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation
 
 
Article

Article Versions Notes

Cryptography 2023, 7(4), 56; https://doi.org/10.3390/cryptography7040056
Action Date Notes Link
article pdf uploaded. 9 November 2023 15:41 CET Version of Record https://www.mdpi.com/2410-387X/7/4/56/pdf-vor
article xml file uploaded 10 November 2023 10:12 CET Original file -
article xml uploaded. 10 November 2023 10:12 CET Update -
article pdf uploaded. 10 November 2023 10:12 CET Updated version of record https://www.mdpi.com/2410-387X/7/4/56/pdf-vor
article html file updated 10 November 2023 10:13 CET Original file -
article xml file uploaded 13 November 2023 04:59 CET Update -
article xml uploaded. 13 November 2023 04:59 CET Update https://www.mdpi.com/2410-387X/7/4/56/xml
article pdf uploaded. 13 November 2023 04:59 CET Updated version of record https://www.mdpi.com/2410-387X/7/4/56/pdf
article html file updated 13 November 2023 05:00 CET Update https://www.mdpi.com/2410-387X/7/4/56/html
Back to TopTop