Next Article in Journal
Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments
Next Article in Special Issue
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation
Previous Article in Journal / Special Issue
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms
 
 
Article

Article Versions Notes

Cryptography 2023, 7(4), 58; https://doi.org/10.3390/cryptography7040058
Action Date Notes Link
article xml file uploaded 16 November 2023 10:04 CET Original file -
article xml uploaded. 16 November 2023 10:04 CET Update -
article pdf uploaded. 16 November 2023 10:04 CET Version of Record -
article html file updated 16 November 2023 10:06 CET Original file -
article xml file uploaded 16 November 2023 10:44 CET Update -
article xml uploaded. 16 November 2023 10:44 CET Update https://www.mdpi.com/2410-387X/7/4/58/xml
article pdf uploaded. 16 November 2023 10:44 CET Updated version of record https://www.mdpi.com/2410-387X/7/4/58/pdf
article html file updated 16 November 2023 10:45 CET Update https://www.mdpi.com/2410-387X/7/4/58/html
Back to TopTop