. . "Alice uses her PrivKeyA to cryptographically sign M' (which mostly means hashing M' and encrypting the result with that private key, in the case of RSA), which gives us Sign(M',PrivKeyA)" . .