Cryptographydela

Filtriraj

Moja nedavna iskanja
Filtriraj po:
Proračun
do
do
do
Vrsta
Znanja
Jeziki
    Delovno mesto
    2,812 cryptography najdenih del, po cenah EUR
    Key Algorithm Končano left

    I need an algorithm in php that generates keys for my software and writes the key to the database as well. The key should be 'irreversible' so the inputted data should be completely hidden. Please only submit a bid if you have a working knowledge about cryptography. A simple xor, and, or and not algorithm will not be accepted. The variables you get as input are: Registers name, purchase date, reseller name and country. There is one constant value that is the companies name. Should be easy if you have a working knowledge of cryptography (2~3 hours work). The output must be in the following format: But one that will actually result in a code in the format: sDi-qXL-EJw-U47 Or in regex: (w{3}-){3}wd{2}

    €15 / hr (Avg Bid)
    €15 / hr Povprečna ponudba
    8 ponudb
    The Secrets Project Končano left

    **Objective** The "Secrets Project" aims at developing a simple web-based system for managing an small organization's "secrets" (sensitive information, such ...Commented C# source code (Visual Studio Solution, along with its projects and references); - Published application release (web application files and initial SQL Server database); - Installation instructions (should be very simple: (1) create IIS application, (2) attach a SQL Server database, and (3) fill the database connection parameters within a settings file); - Instructions on where the cryptography key is stored, how to change it and how to keep it safe. - Instructions on how to configure ActiveDirectory integration; - Instructions on how to translate de application; - Instructions on how...

    €1070 (Avg Bid)
    €1070 Povprečna ponudba
    10 ponudb

    Hi, I need URGENT HELP in doing Assignment based on Computer Security and C++ to be completed in 2-3 days time. The main purpose of this lab is for you to gain hands-on experience with public key cryptography algorithms, in particular RSA cryptosystems. A generalization of the standard two-prime RSA is ‘multi-prime RSA’ in which modulus contains more than two primes. Encryption, decryption, signature generation and verification in multi-prime RSA are similar to that of two prime RSA; however computational costs of decryption and signature generation can be lowered if the Chinese Remainder Theorem (CRT) is used (you are not expected to implement CRT for this lab) If you are sure that you can help me in this deadline then please contact me asap and i will give ...

    €100 (Avg Bid)
    €100 Povprečna ponudba
    3 ponudb

    Hi, I need URGENT HELP in doing Assignment based on Computer Security and C++ to be completed in 2-3 days time. The main purpose of this lab is for you to gain hands-on experience with public key cryptography algorithms, in particular RSA cryptosystems. A generalization of the standard two-prime RSA is ‘multi-prime RSA’ in which modulus contains more than two primes. Encryption, decryption, signature generation and verification in multi-prime RSA are similar to that of two prime RSA; however computational costs of decryption and signature generation can be lowered if the Chinese Remainder Theorem (CRT) is used (you are not expected to implement CRT for this lab) If you are sure that you can help me in this deadline then please contact me asap and i will give ...

    €50 (Avg Bid)
    €50 Povprečna ponudba
    5 ponudb

    Hi, There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework." I'll make the second part. I need your help for only the first part. So, I need the solutions of the questions. It says "Find the solutions of following questions" but I could not find them with an internet search.

    €23 - €28
    €23 - €28
    0 ponudb
    Cryptography Končano left

    Hi, There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework." I'll make the second part. I need your help for only the first part. So, I need the solutions of the questions. It says "Find the solutions of following questions" but I could not find them with an internet search.

    €23 - €28
    €23 - €28
    0 ponudb

    I read at your resume and note that you uses Android and cryptography. I have 10 games that make it in Adobe Flash, and we want to post it over Android Store and Mac Store. At Mac Store, we are having error to upload it due to bad security signature and never they can be uploaded to the store, they run correctly over our Ipad and Ipod. The thing is just tell me whats wrong with my Mac configuration, help me to upload the games correctly and help me to post the same games at Android Store. I can pay to you 250 USD for that work. Are you interested?

    €234 (Avg Bid)
    €234 Povprečna ponudba
    1 ponudb
    Encrypt / Decrypt Končano left

    Write c# code in silverlight that encrypts data and write python code that decrypts the data; use AES cryptography. If I encrypt 'Hello World', I want to get 'Hello World' when I decrypt it again. For the python code you must only use the Pycrypto library.

    €16 (Avg Bid)
    €16 Povprečna ponudba
    1 ponudb
    Encrypt & Decrypt Končano left

    Write c# code in silverlight that encrypts data and write python code that decrypts the data; use AES cryptography. If I encrypt 'Hello World', I want to get 'Hello World' when I decrypt it again. For the python code you must only use the Pycrypto library.

    €12 (Avg Bid)
    €12 Povprečna ponudba
    4 ponudb

    The task is to port the original project (developed in C++) to pure Ansi C. This will require familiarity with certain cryptography concepts, peer-to-peer programming, multi-threading, and a number of C++ libraries (e.g. Boost) as more than 50% of the code comprise of libraries. Only Ansi C compliant libraries can be used in the target project and all libraries must be open source. Required completion time is 30 days max. The project is purely for academic purposes and there are no commercial interests. Feel free to ask questions if interested.

    €1405 (Avg Bid)
    €1405 Povprečna ponudba
    2 ponudb

    The task is to port the original project (developed in C++) to pure Ansi C. This will require familiarity with certain cryptography concepts, peer-to-peer programming, multi-threading, and a number of C++ libraries (e.g. Boost) as more than 50% of the code comprise of libraries. Only Ansi C compliant libraries can be used in the target project and all libraries must be open source. Required completion time is 40 days max. The project is purely for academic purposes and there are no commercial interests. Feel free to ask questions if interested.

    €1841 (Avg Bid)
    €1841 Povprečna ponudba
    10 ponudb

    This is an academic project (Msc) meant to improve on the speed of Plantard et. al., 2009 (Improvement of lattice-based cryptography using CRT). The project is to be able to encrypt and decrypt, and the coding should be done in J2EE. I need the project details in pdf, algorithm used, and the executable source code.

    €187 (Avg Bid)
    €187 Povprečna ponudba
    6 ponudb

    This is a small piece of assignment. Task A. Types of Attacks and Malicious Software, E-Mail and Instant Messaging Task B. Introduction to Cryptography Task C. Intrusion Detection Systems and Network Security, Security Baselines for details please view the attachment I will need it before 11th UK midnight

    €112 (Avg Bid)
    €112 Povprečna ponudba
    2 ponudb
    Techincal Articles Končano left

    I need some creative writers to write articles for my site The site is for social blogging. Interested persons, please send an paragraph(150 words) as attachment for evaluation. We need 1000 articles on various technical stuff and we can pay $1 per article or 750 words. The category for article may fall under Hacking Programming Java Python ... The site is for social blogging. Interested persons, please send an paragraph(150 words) as attachment for evaluation. We need 1000 articles on various technical stuff and we can pay $1 per article or 750 words. The category for article may fall under Hacking Programming Java Python C# Backtrack Tool,Penetration Testing Algorithm Database Networking Cryptography Data Mining

    €837 (Avg Bid)
    €837 Povprečna ponudba
    8 ponudb

    The main work to be done is: Creating a flash (video multimedia) on both Rijndael and twofish algorithms including information about them, the mathematics on them both, their encryption process, ciphers and the like. i know you are trustworthy, bu will still like to say that the flash shoudnt be from the internet (a requirement for the final year project) and the first page should have this information; Name: Mikail Jelilat Bolatito (08BT02025). Bachelor of Networking Technology, Selangor International Islamic University College, Bandar Baru Bangi Selangor Darul Ehsan. help me do it latest five days pls, and lets be assured that you will be able to do it. Pls how much is to pay and when will the work be ready? Thank you

    €703 (Avg Bid)
    €703 Povprečna ponudba
    1 ponudb
    A 5 part series Končano left

    Hi, This project would be suited for computer science students (better if existing student). I need a series in 5 parts, each part being approx 1500 words. The topic has to be a technical computer science topic, and I am open to suggestions. You can go for any algorithm (like compression, AI, cryptography etc) or networking or anything that you consider your strong point. The first part has to be basics of the topic which a bit techy person can understand. In subsequent parts, you can increase the technicalities. I would appreciate if at least one part is devoted entirely to the application and demonstration of the topic (sample devices, code etc). Please do NOT copy wikipedia or any source in the internet. If you use something as a reference, do mention it...

    €27 (Avg Bid)
    €27 Povprečna ponudba
    3 ponudb
    calculator Končano left

    ...nhage-Strassen algorithm ? F?rer's algorithm. The last functions are described below. ## Deliverables division:Here is an excerpt from wikipedia that I think explains things perfectly for division. "Methods designed for hardware implementation generally do not scale to integers with thousands or millions of decimal digits; these frequently occur, for example, in modular reductions in cryptography. For these large integers, more efficient division algorithms transform the problem to use a small number of multiplications, which can then be done using an asymptotically efficient multiplication algorithm such as Toom-Cook multiplication or the Sch?nhage-Strassen algorithm. Examples include reduction to multiplication by Newton's method as described above[5...

    €168 (Avg Bid)
    €168 Povprečna ponudba
    4 ponudb

    “Java Password Based Encryption(JPBE)” Password-Based Encryption (PBE) derives an encryption key from a password. In order to make the task of getting from password to key very time-consuming for an attacker. JPBE is an implementation of Password-Based-Encryption which is developed on JAVA platform Using JCA(Java Cryptography Architecture).

    €348 (Avg Bid)
    €348 Povprečna ponudba
    16 ponudb

    ...work effectively with others. - Solid knowledge of OpenGL 2.0 or higher, modern GPU programming techniques and computer graphics related math. - Solid knowledge of graphics engine architectures and engine optimization techniques. - Knowledge of Graphical User Interface programming. - Knowledge of various concepts covered in computer science such as computer networks, distributed systems, cryptography and network security, databases. Soft Skills: - Excellent professional communication (oral & written) & relationship skills - Comfortable communicating / working with all levels of organization - Collaborative - Comfortable working independently or part of a team - Team player - High attention to detail, prioritization skills and timeline and deadline underst...

    N/A
    N/A
    0 ponudb

    ...with others. - Solid knowledge of OpenGL 2.0 or higher, modern GPU programming techniques and computer graphics related math. - Solid knowledge of graphics engine architectures and engine optimization techniques. - Knowledge of Graphical User Interface programming. - Knowledge of various concepts covered in computer science such as computer networks, distributed systems, cryptography and network security, databases. Soft Skills: - Excellent professional communication (oral & written) & relationship skills - Comfortable communicating / working with all levels of organization - Collaborative - Comfortable working independently or part of a team - Team player - High attention to detail, prioritization skills and time...

    €76 (Avg Bid)
    €76 Povprečna ponudba
    7 ponudb
    Windows backdoor Končano left

    ...configuration changes, and it must be entirely self-contained. > > The backdoor must run in the background with no obvious indication that it exists. > > THE BACKDOOR MUST NOT BE .NET DEPENDENT. IT MUST BE ABLE TO RUN ON SYSTEMS THAT DON'T HAVE THE .NET FRAMEWORK INSTALLED. > SECURITY > All traffic too and from the backdoor needs to be authenticated encrypted using public key cryptography, the backdoor, in essence, will behave a lot like a standalone SSH server. > > The backdoor must NOT require Windows administrative access to run. > > The backdoor must implement survival techniques including injection of its code into a common Windows process, and restarting itself if it's killed or if it crashes. > ...

    €94 - €468
    €94 - €468
    0 ponudb

    Create a security application with user interface using simple C# codes. This program allow the use of different cryptography methods and different modes. Open source cryptography methods in C programming will be provided. (OpenSSL) Required to comment the program as much as possible. If you're hired, you're required to keep in contact with me throughout the project period. You are also required to answer queries if I have any questions.

    €126 (Avg Bid)
    €126 Povprečna ponudba
    7 ponudb

    The project work involves the implementation of a cryptographic algorithm, method, or a protocol, and its demonstration. Please follow the guidelines below. cryptographic method- FEAL Algorithm. Platform: Windows LanguageL C language You need to devise an acceptable method of verification for the results produced by your implementation. A typical way is to check if the software produces the same set of output strings for a set of given input strings, as provided by a standard document (for example, ANSI, X9, IEEE standards). An important aspect of the project that it needs to have a method of demonstration built into it. After finishing your implementation, submit an electronic copy of the implementation and the demonstration system along with a READ ME f...

    €150 (Avg Bid)
    €150 Povprečna ponudba
    3 ponudb

    I got Math questions and i need tutorial as well, related to the fallowing topics: Propositional calculus-notation and truth value Propositional calculus-truth tables Propositional calculus-proof Propositional calculus-more proof Sets: basic operations and Venn diagrams Sets: cardinality Sets: membershi...Sets: cardinality Sets: membership tables Statements about sets: Hybrid tables Predicates and Quantifiers Functions Relations: database queries Relations and Matrices Graphs: definitions, connectivity, Euler, Hamilton Graphs: adjacency matrix Breadth and Depth first search Networks: Dijkstra's Shortest Path Trees-heapsort Trees-coding Arithmetic of Congruences RSA cryptography Tractability & heuristic algorithms Only i have...

    €61 (Avg Bid)
    €61 Povprečna ponudba
    8 ponudb
    Ubunt Email Server Končano left

    ...programming), basic SMTP/IMAP protocol knowledge, Intermediate Shorewall/ any other command line interface based firewall knowledge, Experience with Telnet and SSH (Secure Shell), Skype and Email availability, 24h email response time. Desired Skills: Proficient in English verbal and written communication, some EC2 or Rackspace experience, Security oriented, Documentation writing skills, Interest in cryptography. Budget: Stages I-V 10-15 hours of work, additional stages TBD. Source: For a detailed writeup see here: Opportunity: At least 10 more stages (100+ hours) and / or monthly maintenance agreement Stage I Installation - all work completed 1. Rent out linux server - done, 2. Telnet / SSH - done, working fine 3. IP configuration on

    €141 (Avg Bid)
    €141 Povprečna ponudba
    15 ponudb

    project related to cryptography in matlab. tool to be used is cryptool. We need to present digital signature methods here.

    €28 - €93
    €28 - €93
    0 ponudb

    i have task about **Cryptography** and security of network for more details drop a message if you interested need it within 5 days

    €81 (Avg Bid)
    €81 Povprečna ponudba
    2 ponudb
    matlab cryptography Končano left

    matlab cryptography related project is to be done. Details will be discussed in PMB.

    €147 (Avg Bid)
    €147 Povprečna ponudba
    10 ponudb

    Designing a secure chat application Objectives can be summarized as: • Designing a secure Client/Server application • Using cryptography techniques such as: o Secret key cryptography. o Public key cryptography. o Hash functions. please check attached file

    €343 (Avg Bid)
    €343 Povprečna ponudba
    5 ponudb
    491787 Assignment Končano left

    I need an assignment done in the area of cryptography. More specifically I need an implementation of a HASH function.

    N/A
    N/A
    0 ponudb

    A Secure Model for Data Communication Using Cryptography & Matlab Steganography For more detail check Attached file and Also mention your price Thanks happy bidding

    €94 (Avg Bid)
    €94 Povprečna ponudba
    1 ponudb

    I need to create a component that sends the price and my merchant ID to a external credit card processor web page. The API of the external credit card processor company sends the result of the payment process to my ...create a component that sends the price and my merchant ID to a external credit card processor web page. The API of the external credit card processor company sends the result of the payment process to my site, then I need to complete the order after that response. The merchant account has given us a php plug-in which receives certain response codes and basic form fields. It must also exchange cryptography keys between the bank and the website where the shopping cart (joomla/virtuemart) sits. We have a testing environment but the production environment works exactly...

    €255 (Avg Bid)
    €255 Povprečna ponudba
    7 ponudb

    We need a desktop aplication like this. when user encrypt word file and picture it will encoding . then when the other part want to decoding file for read file, firstly user open our program and decode the file. and access the orginal file. for example remember enigma method, the letter not meanfull after plaintext. we want to mix some method and we add one power method. so , we need desktop aplication doing this job. and we want documantion about explain using method and coding explain.

    €63 (Avg Bid)
    €63 Povprečna ponudba
    11 ponudb

    I want to by articles about applied mathematics. Show me a proof of concept with EXCEL formulation to ensure that you know how the topic you want to write works. $10 per 1,000 words. I don't pay junks articles. This is a long term project, let me know when you have the proof of concept. Her...project, let me know when you have the proof of concept. Here is a list for you to get some idea. 1. Linear forecasting 2. Linear backcasting 3. Fourier analysis in time domain 4. Bayesian decision 5. Bayesian search 6. Bayesian profiling 7. Image recognition 8. Normal convergence 9. Sir Fisher’s exact test 10. Optimization 11. GPS -- the one that is used in your car 12. Cryptography -- RSN, One Time Pad 13. Survey sampling -- PPS seq, Composite size mea...

    €99 (Avg Bid)
    €99 Povprečna ponudba
    3 ponudb

    ...org/papers/ Select one of the papers and write about what you discovered from reading the paper. There are papers here that explain the concept of "Know Your Enemy." The "hacker" community operates a lot like warfare; defending against them requires an understanding of how they operate. This site is a great place to gather that type of information. B Cryptography. This paper can be on an algorithm, protocol or a white paper on Cryptography. At a minimum your paper should describe the following: history, security considerations (i.e.,: has it been hacked, cracked, or is it a concept), where is it being applied, or planned to be applied. C Digital Millenium Copyright Act (DMCA). The DMCA has made quite an impact on Internet Security. Your paper...

    €91 (Avg Bid)
    €91 Povprečna ponudba
    2 ponudb

    Want the below project to be done

    €122 (Avg Bid)
    €122 Povprečna ponudba
    2 ponudb

    Some skills that the programmer should have are: C / C++ / C# PE Cryptography Network Protocol / Firewall Security x86 x64 Windows Applications Proxy / Reverse Proxy Sockets / Threading Automatic Updating Remote Management of applications from Control Panel Creative problem solver - not looking for someone to do a half ass job just to get paid. You should be proud of your work. Excellent performance = big bonuses. Let me know what your qualifications are and why you want to work with us. (don't copy/paste resume please) We have the source to all our existing applications. Need someone who wants to keep everything working smooth and add new features.

    €573 (Avg Bid)
    €573 Povprečna ponudba
    12 ponudb

    Some skills that the programmer should have are: C / C++ / C# PE Cryptography Network Protocol / Firewall Security x86 x64 Windows Applications Proxy / Reverse Proxy Sockets / Threading Automatic Updating Remote Management of applications from Control Panel Linux/Unix / SQL Creative problem solver - not looking for someone to do a half ass job just to get paid. You should be proud of your work. Excellent performance = big bonuses. Let me know what your qualifications are and why you want to work with us. (don't copy/paste resume please) We have the source to all our existing applications. Need someone who wants to keep everything working smooth and add new features.

    €352 (Avg Bid)
    €352 Povprečna ponudba
    19 ponudb

    The following are requests for running RSA and ECC algorithms in smart cards. Any suggestions are as for reference and if you think any other is more suitable your proposal is welcome. REQUESTED JOBS/RESULTS: Applied cryptography: Encryption/ Decryption & Signing /Verifying. COMPARISONS: Processing speed, code size (ROM), memory size (RAM). Reference of the used field arithmetic. RSA IMPLEMENTATION: 1. RSA implementation of 1536 & 2048-bit 2. Public Key b=3 , b=216+1 3. Factorization 4. RSA code written in Java or C, (?taken from OpenSSL library?) ECC IMPLEMENTATION: 1. UNDERLYING FIELD: Fp or F2m . Preferably F2m with m=233 & m=283. Suggested by NIST-SECG 2. REPRESENTATION BASE F2m : polynomial or normal. Preferably polynomial 3. ELLIPTIC CURVE over F2m : preferably ran...

    €541 (Avg Bid)
    €541 Povprečna ponudba
    1 ponudb

    Prosimo, vpišite se ali se prijavite za več podrobnosti.

    Izpostavljeno Zapečateno

    ...security threats, 2nd edition, Addison-Wesley, Boston 6. Ashbourn J., Biometrics - Advanced Identity Verification, Springer-Verlag, UK, 2000. 7. Humphreys E.J, Moses R.H., Plate A.E., Guide to Risk Assessment and Risk Management, BSI, UK, 1998. 8. Icove D, Seger K, VonStroch W (1995) Computer Crime, A Crimefighter's Handbook, O'Reilly & Associates, Inc, Sebastopol, CA 9. Scheiner B., Applied Cryptography, John Wiley & Sons Inc., USA, 1996Thorenson J.D., Blankenship J.H., Information Secrets, Valuable Information Ltd, USA, 1996. Knowledge Management literature: 1. I. Becerra-Fernandez, A. Gonzales, R. Sabherwal. Knowledge Management: Challenges, Solutions, and Technologies, Pearson Prentice Hall, 2004. 2. E. M. Awad, H. M. Ghaziri. Knowledge Management, ...

    €63 (Avg Bid)
    €63 Povprečna ponudba
    9 ponudb

    Dreambox is looking for network programmers for its large scale presentation system whi...topics such as media transfer, real-time stock query, inter-module communication and etc. - Design and Implementation of Client/Server for these protocols and integration to project. - Design and Implementation of Encryption and Data Security parts. Required Skills: - Very strong programming and debugging skills in C and C++ - Solid knowledge of computer networks, distributed systems, cryptography and network security, databases. - Knowledge of UML modeling and ability to design, read and realize diagrams. Important Notes: - This is an on-site work that developer will be asked to move in Istanbul during the project. - All accomodation and transportation costs will be undertaken by...

    €4707 (Avg Bid)
    €4707 Povprečna ponudba
    20 ponudb

    Top cryptography člankov Skupnosti