Filtër

Kërkimet e mia të fundit
Filtro sipas:
Buxheti
deri në
deri në
deri në
Lloji
Aftёsitё
Gjuhët
    Shteti i punës
    2,809 cryptography punët e gjetura, me çmimin EUR
    Cryptography Ka përfunduar left

    The name L011 stores the first terms of an LFSR output. (a) Using Maple, determine the recurrence formula used to generate it. (b) Use the recurrence formula to find the next term in the sequence.

    €207 (Avg Bid)
    €207 Oferta mesatare
    2 ofertat

    1. Simon works in a government office where encrypted messages are regularly received. He knows that an affine cipher is the standard method of encryption used by the office, and has access to the machine which day, when there is not much work to do, Simon decides to work out the affine function used in the machine. He inputs 1 and the machine outputs 5. He inputs 2 and the machine outputs 19. Show how he uses this to obtain the function.nnn2. Patrick and Jacquie both use the same Hill cipher based on the matrixnM = |2 13|n |23 1|n to send each other encrypted messages.n(a) Without using Maple, show how Patrick uses M to encrypt the message:n` The room for the PASS session has changed.'n(b) In order to decrypt Patrick’s message, Jacquie must invert M. What matrix doesnshe...

    €36 (Avg Bid)
    €36 Oferta mesatare
    1 ofertat
    Open Knight's tour Ka përfunduar left

    This project requires a knowledge of cryptography. We will need a candidate who has written a solution for an open knight's tour in the past. Our scope here is of GF 2^infinity. Which allows us the ability to program an open knight's tour solution involving 16 by 16 squares of elements. We need an algorithm in either straight forward approach or divide and conquer method or neural network. We need a method that will generate solutions in decimal numbers lined up according to the knight's move. This will follow a standard state as specified. Before you are awarded this bid :All contestant will need to write a simple program what will solve an 8 by 8 square OPEN knight's tour solution. When the scope increase things get a little complicated. To keep is simple...

    €195 (Avg Bid)
    €195 Oferta mesatare
    5 ofertat
    cryptography related in VHDL Ka përfunduar left

    I have done around 60% of the project. Need some verification and some coding.

    €141 (Avg Bid)
    €141 Oferta mesatare
    1 ofertat
    Cryptography Ka përfunduar left

    It is based on Cryptography. I have done most of the parts. Just some guidance and verification is required with some more coding.

    €141 (Avg Bid)
    €141 Oferta mesatare
    1 ofertat

    I need to implement the code on Arduino Mega 2560. I have already implemented the basic functions in C on Mega. Now as per given algorithm the functions need to arranged methodically and accordingly called to get the output. Since the lower level functions are all done so it won't be too time consuming to get the main code working for someone proficient in Arduino and c coding.

    €141 (Avg Bid)
    €141 Oferta mesatare
    1 ofertat

    I need to implement the code on Arduino Mega 2560. I have already implemented the basic functions in C on Mega. Now as per given algorithm the functions need to arranged methodically and accordingly called to get the output. Since the lower level functions are all done so it won't be too time consuming to get the main code working for someone proficient in Arduino and c coding.

    €141 (Avg Bid)
    €141 Oferta mesatare
    1 ofertat

    I need to implement the code on Arduino Mega 2560. I have already implemented the basic functions in C on Mega. Now as per given algorithm the functions need to arranged methodically and accordingly called to get the output. Since the lower level functions are all done so it won't be too time consuming to get the main code working for someone proficient in Arduino and c coding.

    €160 (Avg Bid)
    €160 Oferta mesatare
    1 ofertat

    I need a Java web services expert who is able to develop web services and web service clients using JAX-WS API. You should be familiar with handling MTOM attachments, dynamic web services (both on client using Dispatch and on server) and...you will receive the payment on successful subtask completion. The current subtask intended to implement digital signature creation and verification. All types of signatures should be handled: header-places, in-message signature for app data and attachments, detached signatures for app data and attachments. GOST algorithms should be used for digital signatures. This means that specific Java cryptography provider should be used. Please add "WS" as the first word of you message. Please let me know what is your experience developing w...

    €191 (Avg Bid)
    €191 Oferta mesatare
    5 ofertat

    elliptic curve cryptography and galois field implementation in VHDL

    €225 (Avg Bid)
    €225 Oferta mesatare
    1 ofertat

    cryptography implementation in VHDL

    €225 (Avg Bid)
    €225 Oferta mesatare
    1 ofertat

    Cryptography implementation

    €225 (Avg Bid)
    €225 Oferta mesatare
    1 ofertat

    Need help for VHDL coding related to cryptography. Please drop me a message as soon as possible and I will get back to you.

    €114 (Avg Bid)
    €114 Oferta mesatare
    1 ofertat

    Need help for VHDL coding related to cryptography. Please drop me a message as soon as possible and I will get back to you.

    €260 (Avg Bid)
    €260 Oferta mesatare
    1 ofertat
    Cryptography Ka përfunduar left

    Hi, I am working on hardware implementation of Elliptic Curve Cryptography on FPGA. So I need help related to it. Do you have any idea related to cryptography,Galois Field,Finite State machines? Please let me know as soon as possible.

    €225 (Avg Bid)
    €225 Oferta mesatare
    1 ofertat
    ECC implementation Ka përfunduar left

    Do you have any idea about cryptography and Galois field? I have a project related to it. Please let me know.

    €458 (Avg Bid)
    €458 Oferta mesatare
    1 ofertat
    Elliptic Curve Cryptography Ka përfunduar left

    It is basically the hardware implementation of Elliptic Curve Cryptography. Please message me and I will provide you more details.

    €225 (Avg Bid)
    €225 Oferta mesatare
    1 ofertat

    just 2 questions about CRYPTOGRAPHY AND DATA SECURITY format: question 1 : a) Explanation of the attack B) Successful decryption question 2: a) Parameters setup b) Read ciphertext c) Decrypt file

    €9 (Avg Bid)
    €9 Oferta mesatare
    1 ofertat

    just 2 questions about CRYPTOGRAPHY AND DATA SECURITY just send me massage to discuss to show the requirement of those 2 question

    €29 (Avg Bid)
    €29 Oferta mesatare
    6 ofertat

    just 2 questions about CRYPTOGRAPHY AND DATA SECURITY format: question 1 : a) Explanation of the attack B) Successful decryption question 2: a) Parameters setup b) Read ciphertext c) Decrypt file

    €277 (Avg Bid)
    €277 Oferta mesatare
    5 ofertat

    just 2 questions about CRYPTOGRAPHY AND DATA SECURITY format: question 1 : a) Explanation of the attack B) Successful decryption question 2: a) Parameters setup b) Read ciphertext c) Decrypt file

    €28 (Avg Bid)
    €28 Oferta mesatare
    1 ofertat
    Poker exploit Ka përfunduar left

    Looking for experts an Data Communications and Security, C# and Cryptography algo. Poker Platforms.rnrnAims and objectives for project:rnUnderstanding of the how data communication is achieved in networks, an overview of security issues related to data communication in networks and an understanding of how to write network applications.rnrnyou should be able to:rn-construct a network application that facilitates communication between computers on an intranet and the Internetrn-understanding of communication in computer networks rn-how the protocols HTTP, SMTP, TCP, IP, UDP, BGP, RIP, ARP, CSMA/CD & OSPF facilitate data communicationrn-security risks associated with computer networks and implement mitigation strategies rn-DLL injectionrn...

    €8027 (Avg Bid)
    I cilësuar
    €8027 Oferta mesatare
    2 ofertat

    ...files with 230 million entries. my servers are overloaded and I simply afraid to run this task right now. - Do some analysis on bitcoin address generation and write a simple php script that will take address bit & sha256 hash on input as private key and generate hash160 & pack it into "address". preferably without using openssl functions as there're no native support of ECC (Elliptic curve cryptography) under CentOS version of openssl. Please note that I'm able do it myself but just do not have time right now. So you must be confident how to do it - no time wasters here. I need this done in ONE day. Budget cap is $50. Also since I'm a freelancer myself and I know how hard it was to get first projects - I'll consider only newbies fo...

    €96 (Avg Bid)
    €96 Oferta mesatare
    2 ofertat
    Essay Writing - repost Ka përfunduar left

    ...limited knowledge of this area. Each article is to be fairly short (something like 500 to 1500 words) and are intended to act as introductions or overviews to a category in which more detailed, more technical articles will be written by other members of my team. All articles will be in the fields of Information, Network and Cyber Security. They will cover topics such as Application Security, Cryptography, Forensics, Malicious Software, Network Security and Physical Security. Many of the articles will be more like extended definitions and it is intended that all articles feature as little technical terminology as possible. More like a lay-man's guide to a topic. They will be similar to Wikipedia articles, in their purpose and scope although often much shorter, much more...

    €14 (Avg Bid)
    €14 Oferta mesatare
    1 ofertat
    Essay Writing Ka përfunduar left

    ...limited knowledge of this area. Each article is to be fairly short (something like 500 to 1500 words) and are intended to act as introductions or overviews to a category in which more detailed, more technical articles will be written by other members of my team. All articles will be in the fields of Information, Network and Cyber Security. They will cover topics such as Application Security, Cryptography, Forensics, Malicious Software, Network Security and Physical Security. Many of the articles will be more like extended definitions and it is intended that all articles feature as little technical terminology as possible. More like a lay-man's guide to a topic. They will be similar to Wikipedia articles, in their purpose and scope although often much shorter, much more...

    €19 (Avg Bid)
    €19 Oferta mesatare
    40 ofertat
    Website Banners Ka përfunduar left

    I'm looking initially for 10 images to be created, as banners to go on top of a web site. The banners must be 650px by 150px and must be able to be cut down to 300px by 150px for "thumbnails". All images should be in the same style and there should be one image per category. The categories are all Computer Security related and are things like: Cryptography, Forensics, Network Security and Malicious Software. The artist is given freedom to create any image within the category theme for each category although if more specific information for each one is need that can be supplied too.

    €69 (Avg Bid)
    €69 Oferta mesatare
    14 ofertat
    SKC-JJU 256 number1 - repost Ka përfunduar left

    I am proposing an encryption system which has the potential to make things a little faster and could possible stir cryptography to claim openness as well. I call it eXCIPHER: It is described by way of mathematical elements of the GF. This is necessary for grasping the specifics. This is followed by the Knight's tour analogy: The key rationale (external context), embedded in the design proposed. The description of the cryptographic system will be clearly shown to volunteers or prospects. Other interested people (students) are welcomed to it. The implementation and practicality of the cipher (eXCIPHER) is been patterned as a prototype in java at the time of writing. My goal will be to make this cryptographic system available for collective development. The promise of nu...

    €555 (Avg Bid)
    MRS
    €555 Oferta mesatare
    7 ofertat
    SKC-JJU 256 number1 Ka përfunduar left

    I am proposing an encryption system which has the potential to make things a little faster and could possible stir cryptography to claim openness as well. I call it eXCIPHER: It is described by way of mathematical elements of the GF. This is necessary for grasping the specifics. This is followed by the Knight's tour analogy: The key rationale (external context), embedded in the design proposed. The description of the cryptographic system will be clearly shown to volunteers or prospects. Other interested people (students) are welcomed to it. The implementation and practicality of the cipher (eXCIPHER) is been patterned as a prototype in java at the time of writing. My goal will be to make this cryptographic system available for collective development. The promise of nu...

    €265 (Avg Bid)
    MRS
    €265 Oferta mesatare
    2 ofertat
    Web and Logo Design Ka përfunduar left

    ...apparent, but with a human touch. Some visual styles to draw from would be Bladerunner, Ghost in the Shell, Tron-Legacy, and the 2012-13 Star Trek movies. Basically, NSA meets Bladerunner. Some background information on what we would like to showcase would be something along the lines of technologies that we make use of, such as machine learning, GPU processing, massively parallel programming, and cryptography. A lot of the work we do is funded by the Department of Defense so keep that in mind. I should add data science research, data visualization, historical and graphical information, computational biology, and complexity sciences to that list as well. What we have in mind is something that is competent and has the coolness to bleed through but with a subtle sense of human touc...

    €2206 (Avg Bid)
    €2206 Oferta mesatare
    53 ofertat

    ...we will not assist them further than our legal obligations and therefore protecting user data from any party is the only way to achieve total privacy. No data will be stored on any individual except the e-mail addresses on the server of course and the password in an encrypted form of some type so we will not know what it is the user chooses. I believe a way of doing this is called public-key cryptography. 2. The service should only be accessible as a Tor hidden service. I understand this is not difficult to set up so if you do not know what this is, it is not a problem as it is just a way for users to access their e-mail anonymously. 3. The service must offer 3 plans. A free plan, and two paid plans, the only difference is the additional mailbox size and also personal stora...

    €11523 (Avg Bid)
    €11523 Oferta mesatare
    11 ofertat
    SKC-JJU 256 - repost 2 Ka përfunduar left

    I am proposing an encryption system which has the potential to make things a little faster and could possible stir cryptography to claim openness as well. I call it eXCIPHER: It is described by way of mathematical elements of the GF. This is necessary for grasping the specifics. This is followed by the Knight's tour analogy: The key rationale (external context), embedded in the design proposed. The description of the cryptographic system will be clearly shown to volunteers or prospects. Other interested people (students) are welcomed to it. The implementation and practicality of the cipher (eXCIPHER) is been patterned as a prototype in java at the time of writing. My goal will be to make this cryptographic system available for collective development. The promise of nu...

    €1225 (Avg Bid)
    €1225 Oferta mesatare
    4 ofertat
    SKC-JJU 256 - repost Ka përfunduar left

    I am proposing an encryption system which has the potential to make things a little faster and could possible stir cryptography to claim openness as well. I call it eXCIPHER: It is described by way of mathematical elements of the GF. This is necessary for grasping the specifics. This is followed by the Knight's tour analogy: The key rationale (external context), embedded in the design proposed. The description of the cryptographic system will be clearly shown to volunteers or prospects. Other interested people (students) are welcomed to it. The implementation and practicality of the cipher (eXCIPHER) is been patterned as a prototype in java at the time of writing. My goal will be to make this cryptographic system available for collective development. The promise of nu...

    €695 (Avg Bid)
    €695 Oferta mesatare
    3 ofertat

    We have a partially completed Delphi project that requires one last step to finish it off. The project is for decrypting sectors from a TrueCrypt volume. This is NOT a password cracking a program. The password is known to the user at the time of running the program. We only require a routine to decrypt any sec...skills. TrueCrypt is open source and written in C/C++. Therefore knowledge of C/C++ is required in order to understand how to perform the sector decryption. You will be supplied with the full test application written in Delphi that requires completion. No GUI skills are required, as you will only be completing the test application. Please no time wasters. If you do not know anything about Cryptography - DO NOT BID. If you do not know how to program in Delphi - D...

    €298 (Avg Bid)
    €298 Oferta mesatare
    4 ofertat

    Questios 7 to 17 need to be solved acqurately with full details and step by steps. I want no single error and full calculations must be shown in the answers and delevered within 4days from now. Questions are in the attached files.

    €108 (Avg Bid)
    €108 Oferta mesatare
    6 ofertat

    Questios 7 to 17 need to be solved acqurately with full details and step by steps. I want no single error and full calculations must be shown in the answers and delevered within 4days from now. Questions are in the attached files.

    €18 - €48
    €18 - €48
    0 ofertat

    Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the software must not be a demo and must work for at least 1 year 2. Smart Card Read / Write Project I need a software with wich I can read all the data from a Smart Card ( Bank Card , SDA or DDA) , than...

    €939 (Avg Bid)
    €939 Oferta mesatare
    1 ofertat

    Hello I want some talented guy or team to do the following lab for me : ~wedu/seed/Labs/EFS/ This is the programming environment that should be used while coding VMware Player - SEEDUbuntu9-Aug-2010 I need this lab to be done in 50 hours

    €131 (Avg Bid)
    €131 Oferta mesatare
    2 ofertat

    • Programming in C,C++ • Programming in Java • Programming in .NET • Internet Programming • Programming in Python • Programming in Assembly Language • Cryptography • IP Security Architecture • SQL/PSQL • Oracle • OSI and TCP/IP Models • Digital Transmission • UNIX • LINUX Computer Architecture Software Design These are 16 topics on which i want you to write. I am not looking for Article or Essay I am looking for you to explain particular topic in Maximum 500 words, Do not make more than 500 as no one reads more content !! You can mention the KEY WORDS ASSOCIATED with that TOPIC You can draw DIAGRAM wherever possible as it is EYE CATCHING You must explain it with example WORK SHOULD BE PLAGI...

    €33 - €33
    €33 - €33
    0 ofertat
    16 COMPUTER SCIENCE TOPICS Ka përfunduar left

    • Programming in C,C++ • Programming in Java • Programming in .NET • Internet Programming • Programming in Python • Programming in Assembly Language • Cryptography • IP Security Architecture • SQL/PSQL • Oracle • OSI and TCP/IP Models • Digital Transmission • UNIX • LINUX Computer Architecture Software Design These are 16 topics on which i want you to write. I am not looking for Article or Essay I am looking for you to explain particular topic in Maximum 500 words, Do not make more than 500 as no one reads more content !! You can mention the KEY WORDS ASSOCIATED with that TOPIC You can draw DIAGRAM wherever possible as it is EYE CATCHING You must explain it w...

    €90 (Avg Bid)
    €90 Oferta mesatare
    9 ofertat
    Cryptography programs Ka përfunduar left

    Task 1. Shamir Secret Sharing Task 2. 5-bit Cipher Feedback Mode (CFB) with TEA algorithm Task 3. Implementing Lehman's Test Task 6. Implementation of Fast Exponentiation with Square and Multiply Algorithm See attached file fo complete description. Deadline is 3 days.

    €81 (Avg Bid)
    I cilësuar
    €81 Oferta mesatare
    4 ofertat
    smart card EMV - Repost Ka përfunduar left

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the s...

    €1878 (Avg Bid)
    €1878 Oferta mesatare
    1 ofertat
    Cloud file manager Ka përfunduar left

    The task is to create a full iPhone app that can browse a web server, upload/download files, create/rename/remove files and folders. Some experience with cryptography is required (Security framework) and AFNetworking. CoreData experience is a plus, as is experience with Git.

    €26 / hr (Avg Bid)
    €26 / hr Oferta mesatare
    12 ofertat

    Java Implementation of Elliptic Curve Based Signcryption Algorithm. Involves the Java implementation of Elliptic curvr cryptography.

    €188 (Avg Bid)
    €188 Oferta mesatare
    1 ofertat

    Java Implementation of Elliptic Curve Based Signcryption Algorithm. It involves the implementation of elliptic curve cryptography.

    €188 - €188
    €188 - €188
    0 ofertat

    I have developed a Signcryption Algorithm which involves Elliptic Curve Cryptography. I need to implement that algorithm.

    €212 (Avg Bid)
    €212 Oferta mesatare
    7 ofertat
    smart card EMV reader writer Ka përfunduar left

    kak dela hatel be znat elsi te zdelal etat project ili eta aktyalna? na pishe mne please na freelancer0990 at yahoo com Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… No...

    €4226 - €4226
    €4226 - €4226
    0 ofertat

    We are looking for a developer with experience in cryptography and "byte-level" java development with a focus on performance. The project is to develop a library that can encrypt and decrypt byte arrays using a supplied standard called CCM*. This is a variation on AES-CCM block cipher mode. The CCM* mode coincides with the original CCM mode specification for messages that require authentication and, possibly, encryption, but does also offer support for messages that require only encryption. As with the CCM mode, the CCM* mode requires only one key. There is an extensive specification which also includes test vectors that should serve as input for unit tests. Writing the unit tests to validate that it works is also part of the project. Also, there is a C implementat...

    €231 (Avg Bid)
    €231 Oferta mesatare
    4 ofertat

    Project Description: In the search for a man who is able to install and configure my script based on php. This script is written by me in collaboration with American colleagues. Requires a high level of knowledge and php based encryption and cryptography on the Internet. The basic idea of ​​the script is that the user can be permanently connected to certain sources of information

    €389 (Avg Bid)
    €389 Oferta mesatare
    6 ofertat

    In the search for a man who is able to install and configure my script based on php. This script is written by me in collaboration with American colleagues. Requires a high level of knowledge and php based encryption and cryptography on the Internet. The basic idea of ​​the script is that the user can be permanently connected to certain sources of information

    €150 (Avg Bid)
    €150 Oferta mesatare
    1 ofertat

    I am looking for someone who has a strong background in cryptography, and who is willing to teach me crypto and security 10 hours per week (2 / 3 weeks total) over skype. Relevant academic qualifications are preferred.

    €36 / hr (Avg Bid)
    I cilësuar
    €36 / hr Oferta mesatare
    7 ofertat

    Artikujt Më Të Mirë të Komunitetit për cryptography