Next Article in Journal
Public Key Protocols from Twisted-Skew Group Rings
Next Article in Special Issue
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
Previous Article in Journal
The Emerging Challenges of Wearable Biometric Cryptosystems
Previous Article in Special Issue
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography
 
 
Article

Article Versions Notes

Cryptography 2024, 8(3), 28; https://doi.org/10.3390/cryptography8030028
Action Date Notes Link
article xml file uploaded 5 July 2024 10:15 CEST Original file -
article xml uploaded. 5 July 2024 10:15 CEST Update https://www.mdpi.com/2410-387X/8/3/28/xml
article pdf uploaded. 5 July 2024 10:15 CEST Version of Record https://www.mdpi.com/2410-387X/8/3/28/pdf
article html file updated 5 July 2024 10:17 CEST Original file https://www.mdpi.com/2410-387X/8/3/28/html
Back to TopTop