Next Article in Journal
On the Performance and Security of Multiplication in GF(2N)
Next Article in Special Issue
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion
Previous Article in Journal
A Secure Algorithm for Inversion Modulo 2k
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 17 September 2018 17:18 CEST Original file -
article xml uploaded. 17 September 2018 17:18 CEST Update https://www.mdpi.com/2410-387X/2/3/24/xml
article pdf uploaded. 17 September 2018 17:18 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/3/24/pdf
article html file updated 17 September 2018 17:20 CEST Original file -
article html file updated 31 March 2019 19:54 CEST Update -
article html file updated 15 April 2019 00:16 CEST Update -
article html file updated 29 April 2019 04:44 CEST Update -
article html file updated 7 October 2019 23:49 CEST Update -
article html file updated 10 February 2020 11:26 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/3/24/html
Back to TopTop