129 Views
This series has been going on quite a bit longer than I intended it to be. Barring any new developments or questions, I think that this will be the last post I'll write on the topic. In a previous post, I implemented authenticated encryption, ensuring that we'll be able to clearly detect if the ciphertext we got has been modified along the way.
0 comments