SudoHenk

Results 2 comments of SudoHenk

So the encryption schemes provide confidentiality (you cannot read the text being encrypted), but it does not provide authenticity. I want to prove that I am in possession of the...

AFAIK these are the possible solutions: 1. We use the client's knowledge of the fileList of the current directory to cycle through the next files and check if they are...