The Ultimate Bitcoin Survival Guide: Is This Where The Future of Money is Headed?
Bitcoin: the world's new currency--will it eventually dominate?
Lowest bid gets the project. Please inform me which platform you would like to use before I accept the bid from you. This project is about cryptography, PARI/GP system. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No 3rd party components unless all copyright ramifications are explained AND AGREED TO by the employer on the site per the worker's Worker Legal Agreement). ## Platform Windows XP
ANSI X9.17 Pseudo Random Lottery generator. READ ME file for Cryptography Project. Project: ANSI X9.17 Pseudorandom Number Generator Programming Language used for implementation: Java Platform: Windows (need to have java installed on machine) NOTE : You can click on the link below to get some idea how the application should be somewhat like. But we need to have it different than this one. 1. Firstly , we need the user to choose lucky numbers and then compare with the ANSI X9.17 random numbers generator. If the users numbers match, then there is a lotto won. 2. Secondly, the link doesnot generate the random numbers all the time, so every number in a lotto should be unique. 3. The figure below shows the steps in ANSI X9.17 . It uses Triple DES , encryption decrypt...
Hello All! I search a developer who may create me on-line shop with PGP cryptography of all database.
I need someone to write my PhD thesis (100 pages) on quantum chemistry and cryptography.
budget: $3000-$5000 keywords: C Programming, C++ Programming, Cryptography, Electronics, Embedded Software, Engineering i am looking for an experienced VeriFone developer that can modify a Vx 670. you must be able to commit and deliver 100% on schedule with no exception. the pos terminal must function offline eliminating the need for a remote host. software is required to download data stored on the pos terminal. full specifications will be provided to qualified bidders. good written english, icq with otr encryption and email with gnupg encryption are required. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No GPL, GN...
I have an undergrad-level assignment of number theory and cryptography. Basic stuff: factoring, proofs about rings, groups etc. I need your help either by emails or chat sessions. I will either pay flat rates, project rates, and/or bonuses. You must demonstrate a background on number theory and cryptography (e.g. link to a course website or name of the book, or list of topics). Details of the assignment to the winning bidder.
I need a Silverlight for Windows Phone > Windows Phone Class library that implements the RSA algorithms in the Bouncy Castle cryptography library. The full source code library in C# can be found at <>. I need you to extract the RSA encryption files, and port them to a Windows Phone Class library. The catch is that Hashtable and Arraylist are not supported in Windows Phone Class and so you’ll need to write a quick implementation of the mscorlib classes. I would like a VS 2010 project with source code that compiles as the deliverable. ## Deliverables Please ask if you have any questions.
I have purchased a copy of the latest REPORTS/INTEL, expl...can be deduced from the results of an empirical test if the practitioner uses completely different parameters in his own simulation problem. In contrast to theoretical tests, empirical tests treat the random number generators as black boxes and do not directly analyze the underlying algorithm. This makes it possible to observe the performance for smaller and larger parts of the period. In cryptography, as soon as we can distinguish a given bitstream from the output of a "perfect random source", attacks to the algorithm will be possible. The difficulty is to find such distinguishers and to mount an efficient attack. Use the Report that tests every RNG to help you understand the RNG in full facts.' Than...
I need a programmer to create a user friendly program with pleasant interface: "Playfair Cipher Decoder". Programmer needs to understand something about cryptography and ciphers. Program should be windows based not a dos based program. It can be a script as part of a website but I will also need a standalone program. Please see attachment for details and suggested code. Thank you for bidding.
I need a programmer to create a user friendly program with pleasant interface: "Playfair Cipher Decoder". Programmer needs to understand something about cryptography and ciphers. Program should be windows based not a dos based program. It can be a script as part of a website but I will also need a standalone program. Please see attachment for details and suggested code. Thank you for bidding.
this project is about network security and cryptography. ## Deliverables 1) All deliverables will be considered "work made for hire" under U.S. Copyright law. Employer will receive exclusive and complete copyrights to all work purchased. (No 3rd party components unless all copyright ramifications are explained AND AGREED TO by the employer on the site per the worker's Worker Legal Agreement). ## Platform windows involves network security and cryptography
It is a combination of cryptography and steganography. cryptography converts the plain text to cipher text. steganography inserts the secret message into the image. Cryptography is the extension of hill cipher algorithm. it is the secured one. Dynamic LSB-3 is the steganography algorithm.
The following are requests for comparisons of RSA vs ECC cryptography. Methods, arithmetic and other topics are as for reference and any suggestion you think it is more suitable is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying Comparisons: Processing speed, code size (ROM), memory size (RAM). Also you should let us know the arithmetic used in fields, ECC and RSA and any improvement methods. Also you should deliver us the source code. SYSTEM IMPLEMENTATION RSA IMPLEMENTATION: 1. RSA implementation of 1024 & 2048-bit 2. Numbers?? b=3 , b=216+1 3. Factorization? NFS? 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Preferably F2m with m=233 & 283....
The following are requests for comparisons of RSA vs ECC cryptography. Methods, arithmetic and other topics are as for reference and any suggestion you think it is more suitable is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying Comparisons: Processing speed, code size (ROM), memory size (RAM). Also you should let us know the arithmetic used in fields, ECC and RSA and any improvement methods. Also you should deliver us the source code. SYSTEM IMPLEMENTATION RSA IMPLEMENTATION: 1. RSA implementation of 1024 & 2048-bit 2. Numbers?? b=3 , b=216+1 3. Factorization? NFS? 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Prefe...
pls check the file can pay $4 per answer total 6 need 4,5,6 asap
...and organize their auctions for offline as well as **list the created auctions without using a website.** Its a Java desktop application based on JAOLT open source tuned and modified to work on (E-Auction commercial site). Technologies used: 1) SWING and JGoodies. 2) Ant 3) Web Services. 4) H2 embedded DataBase. 5) Image processing. 6) Encryption and Cryptography. 7) Windows Registry. 8) Null Soft Installer. ## Deliverables * * *This broadcast message was sent to all bidders on Tuesday Apr 20, 2010 3:58:05 AM: This software is version of JOALT, we had a lot of customizations and modifications for business rules. Also currently we are testing our current release (which is not launched yet), so you will be asked to fix
i need minumum 2 pages (maximumu 6)? proposal about one time pad algorithm depand to cryptography. if you have any suggestions to just one deep topic in crytography you can advice. i mean i need just one deep topic in cryptography area. ## Deliverables i need minumum 2 pages (maximumu 6)? proposal about one time pad algorithm depand to cryptography. if you have any suggestions to just one deep topic in crytography you can advice. i mean i need just one deep topic in cryptography area.
i need own article about just one topic in? cryptography. i do not say topic. it is your choose, but i do not want to much? include mathametics. for example for topics,? cryptography? and digital signature. just i need deep topic , nother example one time pad algorithm. so , at first i need? minimum 2 pages proposal, what will do, what is the aim like this. **i need proposal until sunday night**. after propsal i **have 1 month time to prepeare article**. you can available to copy **just some part to other articles**. article must be **minumum 16 pages**, and **minumum 20 references**. i will wait your topics offers. best regards, ## Deliverables i need own article about just one topic in? cryptography. i do not say topic. it is your c...
Cryptography of computer systems for interaction with humans and discrete analysis.
Looking for Freelance experts/developers and firms who can provide Customized Solution for Development of a Digital Right Management for PDF distribution in a Online web environment and also Client-server environment. Must know this technology to depth. Experience of Working in developing a Document Distribution system using Public/Private key cryptography will be highly desirable. More details on further interaction.
I currently have an application written in VB6 that (among other things) will encrypt files using the ChilkatCrypt2 tool. I am currently in the process of upgrading my application to VB.NET and, since the Framework contains cryptography, I would like to stop using Chilkat and start using the classes? (the less third-party tools I have the better due to licensing, etc.) The issue is that my customer's document are already encrypted using Chilkat, so in order for me to upgrade, I need the Framework classes to be able to decrypt those files. This should be very easy (if its possible) because I have all of the information that was used to encrypt the files. What I am asking from the bidder is that if they can successfully decrypt the file that I provide, then
I have a 12 sheet Excel Worksheet that I need converted to an application. I need it to be able to be saved in order to be re-opened from the last save point. It would need to be able to be usable without the user having the Excel program. If that is not possible, the crucial thing would be that I would be able to use strong algorithim cryptography so that it cannot be re-distributed; which is not possible with .xls files.
...provides the transport layer security. In fourth layer the data encryption part is done by the help of Triple-DES. In the fifth layer the key management process is undergone using RSA key management. The aim of this project “A new File Transfer Protocol (FTP) using Hybrid Encryption and EAP-TLS” is instead of multiple trusted authorities I focus on single trusted authority using public key cryptography RSA in EAP and also I include Triple-DES algorithm for Microsoft Point to Point Encryption (MPPE). I propose a new type of hybrid encryption technique using Triple-DES for encryption and decryption and RSA used for key management. This project implements the EAP-TLS protocol for the authentication and for providing the transport layer security. The project also aims i...
...You will then be selected based on bid range price. The higher the range, the more we expect from you and at a accelerated period of time. **The Job** We need the complete encrypt decrypt from Frogster's Runes of Magic client > server, server > client packet communications. We wish to emulate their packets for our own coding project, a mmofps to be exact. We need a professional asm cryptography engineer, as well as a C++/ Java coder. We expect source code, we expect the encrypt decrypt methods to work, we also expect that when we look at the source code and plug it into a packet sniffer that it will work and decrypt the packet data, we expect this done within 5 days or less. We have experience with a lot of packet encryption, but this encryption was soo ...
Title of the project: Application of elliptic curve in cryptography. Report portion, Objective: Write a self contained report on elliptic curve cryptography. Scope: Basic properties of elliptic curves over some finite fields and explore how it can be used in cryptography. Area to include: Introduction to elliptic curve cryptography, background, math of elliptic curve, how it is used in cryptography, talk about elliptic curve algorithms that are currently in used. Programming portion, Objective: To write a simple C++ algorithm that encrypt a given file and algorithm to decrypt the file. Deadline: February 2010. The report writer and the programmer need not be the same person. Thanks.
I have written an application in C# which deals with Networking and Cryptography (Already coded in C#, just needs converted). C# Source is ~1000 lines long. Must run under Windows/Linux. Will send source once a programmer is chosen.
Title of the project: Application of elliptic curve in cryptography. Report portion, Objective: Write a self contained report on elliptic curve cryptography. Scope: Basic properties of elliptic curves over some finite fields and explore how it can be used in cryptography. Area to include: Introduction to elliptic curve cryptography, background, math of elliptic curve, how it is used in cryptography, talk about elliptic curve algorithms that are currently in used. Programming portion, Objective: To write a simple C++ algorithm that encrypt a given file and algorithm to decrypt the file. Deadline: February 2010. The report writer and the programmer need not be the same person. Thanks.
Hi , this was the project developed in java is 's methodology was to encrypt the text in to a decrypt's by passing a works in a mode to hide the was most useful to thing to help by hiding the data.I used Java swing to design a interface to perform a can use this application for enc...text in to a decrypt's by passing a works in a mode to hide the was most useful to thing to help by hiding the data.I used Java swing to design a interface to perform a can use this application for encrypting and decrypting image which is encrypted cannot be see by is an executable JAR is a combination of Cryptography and steganography.
Hello Sumair Ahmed. as per our dicussions in mail. This project is for Sumair Ahmed. Symmetric-key cryptography using DES, 3-DES, AES This project involves mathematics and programming in C++ / C# / Java or any other high level language that you prefer. The project aims to investigate limitations, weaknesses and possible attacks on the existing keys cryptosystem, and possible robustness on the existing keys cryptosystem or new keys cryptosystem. The following is to be implemented.
Writer needs to have knowlegde in cryptography schemes such as RSA and Elliptic curve cryptography and also JAVA programming language. Urgent report. Do not bid if u need more than 3 days. PM me for sample report.
...replies and missing information will receive a negative inference. The successful builder will: 1. Knowledge Base. Have extensive knowledge and understanding of the Source Code Escrow process (also known as Software Escrow). 2. Current Agreements. Have standing Source Code Escrow agreements with other customers. (Desirable) 3. Cryptography. Have an expert understanding of encryption and cryptographic techniques to government standards. 4. Outright Sale. Agree that the company [EscrowProtect] will own the software, and all associated IPR, outright, including but not limited to the source code and all associated components. There will be no EULA. All rights to license, copy, alter or re-sell will be passed to the company
...the library: - add support for reading and writing partial packets - add support for dynamic allocation of memory for the "data body" buffer to fix another decryption/signature verification problem - make sure the encrypt and decrypt functions fail gracefully (some assertions in the code need to be updated) This should be easy for someone who a good working knowledge of pgp based cryptography and gpg. ## Deliverables Here are the criteria that will be used to test the project for acceptance and verify if the project has been successfully completed. The project will be regarded as incomplete until all of these features are determined to be working correctly: 1. openpgpsdk library is compatible with gpg (work involves adding partial packet support and o...
Looking for experts in win32 programs, assembler, packers, cryptography reverse will need to do a simple reverse test who come with the solve first get the job. Imoprtant: If you don't know asm, binary, debug, c+, don't bid here!
Cryptosystems, highly technical systems that provide privacy through secret encoding, have been an important part of the electronic information world for many years. These systems are the foundation for all electronic information exchange. For example, financial institutions and banks rely upon cryptography to securely transmit critical and private information over the Internet. Especially now, during the e-commerce explosion, secure and reliable exchange systems are vital for the world’s economy. These cryptosystems protect data by using hardware and software in a process that protects data by performing mathematical operations/algorithms on it. The result is data rendered unintelligible, which is called cipher text. This cipher text is then trans...
SECURE WEB PAGE REQUIRED! A web secure page should avail board members to overcome the dilemma and facilitate effective communications/consultations among each others on a daily basis. Kindly, find here below our requirements for the webpage: - Password or other options/devices for each board member to provide stronger cryptography. - Password to be changed every 3 months automatically or manual - Forum where the secretariat can post subjects, including attached files. Subsequently, the board members can reply/suggest. - Easy to use; simple and with few options. - E-mail alert when there are news in the forum. A simple alert without link and much information. - Only the secretariat can change password, delete users, delete subjects. - All information has to be bilingu...
SECURE WEB PAGE REQUIRED! A web secure page should avail board members to overcome the dilemma and facilitate effective communications/consultations among each others on a daily basis. Kindly, find here below our requirements for the webpage: - Password or other options/devices for each board member to provide stronger cryptography. - Password to be changed every 3 months automatically or manual - Forum where the secretariat can post subjects, including attached files. Subsequently, the board members can reply/suggest. - Easy to use; simple and with few options. - E-mail alert when there are news in the forum. A simple alert without link and much information. - Only the secretariat can change password, delete users, delete subjects. ...
It is required to do a documnted research (9000 words)? and a software regarding the following topic: **Trust in Distributed Environments** The issue of trust within distributed systems provides somewhat of a quandary, whilst there are multiple entities within an open distributed environment, the notion of trust is difficult to capture. Whilst Public Key Infrastructure (PKI) and cryptography do achieve somewhat of a quasi-trust, this is not necessarily intuitive with the human representation. As distributed systems such as Multi-Agent Systems increasingly incorporate more human characteristics and autonomy, the notion of trust must too become closer to this human intuition. This can be expanded when considering networks-of-networks or systems-of-systems whereby entities w...
Ju lutemi Regjistrohuni ose Identifikohuni për të parë të dhënat.
Ju lutemi Regjistrohuni ose Identifikohuni për të parë të dhënat.
This Project has been posted 3 times with out a solution -------------------------------------------------------- Business goals: --------------- Discover the formula/equation that has been lost to convert 6 to 4 hexadecimal numbers below. Example: --------------- We enter code "0EC878" and this code is the output "B7F8" Numbers that are already operating. There are many more pairs to work from attached to project: ----------------------------------- 0F325B = 507B 0F7658 = 9478 272809 = 393d 2F4F3C = 27D4 2FAD11 = CDD9 6B1959 = 114d 6DD24D = D331 Problem solving: ---------------- We need the mathematical formula or conversion method using the inputs and outputs above that will work to answer the following equation: D12818 = ? Pay...
Required in C++ for VC6 (No .Net) Require a function that can convert a key using the SHA256 Hashing algorithm and it also then needs to be Authenticated in HMAC - Its all to do with Cryptography. I am sure this function has all ready been written and tested somewhere. Please note a simple function is required here hence not willing to pay more then $30
OpenPGP COM / ActiveX component based on OpenSSL. **Features** * Complete set of encryption / decryption, signing / signature verification, compression / decompression, armoring / dearmoring operations * Compatibility with all PGP versions on the mark...testing, etc). <> **COM interface definitions** The component is required to offer all interfaces/functionality of Eldo’s OpenPGPBlackbox product. Reference: <> **Coder Requirements ** * Individual developer * 5+ years experience with C++ * Experience with cryptography and OpenSSL * Experience with OpenPGP a plus but not a requirement * Full commitment to project (at least 40 hours per week).
We are looking for a Mobile Application Developer with experience in Symbian technology and J2ME with Web Services experience (PHP & MySQL). We are a start-up company building on existing technology and we wan...Symbian technology and J2ME with Web Services experience (PHP & MySQL). We are a start-up company building on existing technology and we want a Developer willing to invest sweat equity in return for a stake in the company. Project will be to modify an existing application to create a totally secure, phone to phone, Mobile Messaaging Service for SMS & MMS. The product utilises Public Key Cryptography to secure the users. The service will be launched on Facebook and other social networking sites. We anticipate around 3 months of development and testing prior ...
Hi, I am looking for a programmer to assist in making a cryptography based program, to break various types of encryptions, such as but not limited to:[][1] Caesar shifts? Frequency analysis? Letter substitution Affine shift ciphers? Vignère encryption? Transposition cipher? ADFGVX cipher The aim would be to have an input field where any sort of text/numbers/characters are entered and it could be solvable. Other customisiable features I have for the program may be included. I would also like to understand how the code works.
Business goals: --------------- Discover the formula/equation that has been lost to convert 6 to 4 hexadecimal numbers below. Example: --------------- We enter code "0EC878" and this code is the output "B7F8" Numbers that are already operating. There are many more pairs to work from attached to project: ----------------------------------- 0F325B = 507B 0F7658 = 9478 272809 = 393d 2F4F3C = 27D4 2FAD11 = CDD9 6B1959 = 114d 6DD24D = D331 Problem solving: ---------------- We need the mathematical formula or conversion method using the inputs and outputs above that will work to answer the following equation: D12818 = ? Payment Terms: -------------- The first provider to figure out the formula wins the bid and project. !!ONLY BID IF...
Ju lutemi Regjistrohuni ose Identifikohuni për të parë të dhënat.
*** UPDATED DESCRIPTION *** PLEASE READ - DON'T POST A BID/COMMENT FOR THINGS ALREADY WRITTEN HERE *** *** The attachement has been also updated! Our previous coder died. We no longer have access to the source code of our application used to encrypt/decrypt usernames. The username can contain letters, numbers, and/or special characters and also it is a...2009 8:33:33 AM: It is 512 bits, so it's not SHA512 with a salt. Also is not very random so it's not a good hashing algorithm too. For me it looks something like some kind of stream cipher with a static key encrypting the username padded to 512 bits then base64ed. The guys who posted the bids and you are not sure that you can brake it, plese remove the bids! ## Platform Encryption, Cryptography, C, C++, C...
We are in the midst of developing an online banking security product The product prototype can be found here: We have finished a demo version of the product and now want to develop a complete ready to deploy version, for which we need a technical expert with in depth knowledge of J2EE to work with my development team in ...releases and deployments at actual client sites. Apply only if the answer to the below 3 questions is "Yes": (1) Are you willing to work out of our Mumbai office (Andheri)? (2) Do you have the 2-3 years experience in System Design and hardcore J2EE web application programming (preferably security applications)? (3) Do you have basic or theoretical understanding of concepts in cryptography?
...GENERATED IF POSSIBILE AFTER ENTERING LOT NR. EXP DATE PRODUCT NAME, SIZE OF BOX AND WHOLESELLER CODE. SHOULD BE UNIQUES CODES, SO CHANCHE THAT ONE CODE TO REPEAT SHOULD BE VERY SMALL. DESKTOP APPLICATION -------> SAVE CODES INTO CSV FILE THAT IS USED BY SPECIAL PRINTER TO PRINT ON BOXES. THEN THIS FILE IS WIPED. DESKTOP APPLICATION --------> ENCRYPT CODES ONE BY ONE USING A PUBLIC KEY ( Public-key cryptography encryption ) ( maybe also signing with private key to be sure that content is not tampered with ) Private Key will never leave laptop, will never be uploaded online etc. ENCRYPTION IS POSSIBILE WITH PUBLIC KEY BUT DECRYPTION NEED PRIVATE KEY SO ENCRYPTED CODES (and signed) ONLINE WOULD BE THEORETICALLY IMPOSSIBILE TO DECRYPT. EXAMPLE: A CODE FOR 14 CHARACTERS: h7igqc...
Objectives: 1. user interface design and implemtation 2. practice using strings and arrays 3. practice using file manupilations **need to write a single program to preform the following cryptography procedures at the user's choice: 1. shift cipher encoder**-- each character of the string is shifted to the right by a fixed number of characters specified as "Key" between 0 - 10. **2. shift cipher decoder**-- each character of the string is shifted to the left by a fixed valued between 0-10. **3. shift cipher encoder with word reverse**- each string is reversed word by word first and then the reversed string is encoded by shift cipher. **4. shift cipher decoder** **with word reverse**-- each string is decoded by shift cipher decoder and then each strin...
Bitcoin: the world's new currency--will it eventually dominate?
This quarter's Fast 50 reports on the increase of writing jobs, app development, video production, and more.