Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    2,795 cryptography jobber funnet, priser i USD
    Capture The Flag Avsluttet left

    We are seeking a skilled and experienced individual to participate in a Capture the Flag (CTF) competition on our behalf. The ideal candidate should possess a strong background in cybersecurity, with extensive knowledge of cryptography, network security, and exploitation techniques. The scope of this project is to solve a variety of problems and challenges presented in the CTF competition within a specified timeframe. As such, we are offering a compensation package based on hourly rates. The selected candidate will be paid for the time spent on each task, with the potential for bonuses based on successful completion of challenges. The primary responsibilities of the selected candidate will include: Participating in the CTF competition on our behalf. Identifying and exploiting vul...

    $13 / hr (Avg Bid)
    $13 / hr Snitt bud
    13 bud

    In this assignment, you will use Java Cryptographic Architecture (JCA) to create a useful application requiring th... 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes 4) Digital Signatures 5) Base64 Encoding More information on Java Cryptography Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code

    $160 (Avg Bid)
    $160 Snitt bud
    22 bud
    Java project Avsluttet left

    I have few more queries regarding my task would help me In this assignment, you will use Java Cryptographic Ar... 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes 4) Digital Signatures 5) Base64 Encoding More information on Java Cryptography Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code

    $166 (Avg Bid)
    $166 Snitt bud
    14 bud

    Someone professional and knows cryptography and ciphers, text me

    $24 (Avg Bid)
    $24 Snitt bud
    9 bud
    Cryptography -- 2 Avsluttet left

    solidify concepts of AES and its modes of operation, and image steganography.

    $23 / hr (Avg Bid)
    $23 / hr Snitt bud
    16 bud

    ...small and growing company (under 30 employees). Peculiar Ventures offers professional services as well as builds its own products focused on document signing, robocall mitigation and remote identity verification. We pride ourselves on our team's ability to build high quality and usable applications using some of the most advanced techniques including computer vision, machine learning, applied cryptography, Public Key Infrastructures. We have done work for some of the largest tech companies in the world and have open source projects that receive millions of downloads every week. We are big enough to create and ship products, but small enough to stay flexible and genuine. We work together as a family and as a result many of our team members have been with us since we started...

    $36686 (Avg Bid)
    $36686 Snitt bud
    20 bud

    Guidelines are attached……………….

    $70 (Avg Bid)
    $70 Snitt bud
    8 bud

    **THERE SHOULD BE LESS THAN 20% PLAGIARISM** We need a full-fledged working project and PPT on Ethereum Smart Contract (Voting System). This project aims to create an encrypted voting system using Ethereum Smart Contract and cryptography. The system will enable secure and transparent voting without the need for intermediaries. The voters' identities will remain anonymous, and the voting results will be publicly accessible. We also need a website for that.

    $134 (Avg Bid)
    $134 Snitt bud
    8 bud

    We need to enable our application to make use of the static library or the shared object from the Intel QAT linux module. We prefer Rust implementation to wrap around the symmetric and asymentric cryptography. To avoid all that answer yes on anything. Please attach a short overview how to compare sha256 hashing using the Intet QAT, and sha256 hashing using a cpu with the intel sha extension instruction set. Responses without an overview will be ignored, sorry to be blunt.

    $627 (Avg Bid)
    $627 Snitt bud
    11 bud
    Crypto CTF Avsluttet left

    I need help with a cryptography Capture The Flag Challenge. Level intermediate/high.

    $911 (Avg Bid)
    $911 Snitt bud
    5 bud

    i need a guy who is good in programming for the crypto address generation i want to alter this code , " ecdsaPrivateKey = (curve=) print("ECDSA Private Key: ", ecdsaPrivateKey.to_string().hex()) ecdsaPublicKey = '04' + ecdsaPrivateKey.get_verifying_key().to_string().hex() print("ECDSA Public Key: ", ecdsaPublicKey) hash256FromECDSAPublicKey = ((ecdsaPublicKey)).hexdigest() print("SHA256(ECDSA Public Key): ", hash256FromECDSAPublicKey) ridemp160FromHash256 = ('ripemd160', (hash256FromECDSAPublicKey)) print("RIDEMP160(SHA256(ECDSA Public Key)): ", ()) prependNetworkByte = '00' + () print("Prepend Network Byte to RIDEMP160(SHA256(ECDSA Public Key)): ", prependNetworkByte) hash = prependNetworkByte for x in r...

    $12 (Avg Bid)
    $12 Snitt bud
    2 bud

    - Experience in C++, Python - Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. -Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process -Knowledge of cryptography is required -Provide investigative/analytic support for extremely complex, technical, and highly sensitive investigations and initiatives pertaining to cryptography - Prepare in-depth summaries of data from extensive research and analysis Work with law enforcement bodies all around the world to achieve cooperation and help in solving international investigations and fraud cases. - Work with...

    $21 / hr (Avg Bid)
    $21 / hr Snitt bud
    9 bud
    python, cryptography Avsluttet left

    The guideline related to the required tasks is attached.

    $41 (Avg Bid)
    $41 Snitt bud
    11 bud

    Hello there, I am interested in hiring a content writer. I would provide the topic of writing, topics are related - blockchain, cryptography and history. I would like to publish the topic at platforms: LI. Primary tasks includes: Prepare well-structured drafts. Ability to use "open source" drawing software. Proofread and edit blog posts before publication Submit work for my for input and approval Pages should be aesthetically pleasing, not glamorous (or flashy). Use Zoho tools, I would push the same to above platforms. Target: Publish 1-2 articles per month. Roadmap available till Dec. It is a personal activity no commercial aspect involved. You will be paid per article (as it is finished). There is no contract, no legal obligation on either party.

    $15 (Avg Bid)
    $15 Snitt bud
    66 bud
    Python cryptography Avsluttet left

    Information and Networking Security Goal Description : The purpose of this demonstration is to understand the usage of the various one-way hash function in the Python cryptography library. System and Installation Requirements: 1. Linux environment (WSL on Windows, MacOS or any Linux distro Ubuntu, Kali or Debian) 2. Python Cryptography Library: 3. Installation Help: Please note strictly: 1. Do not the hashlib or any other Python cryptography package like crypt. Only the cryptography package needs to be used. Program Specifications: 1. Download 10 binary files from the Internet. The minimum file size of any file should NOT be less than 1 MB. 2. Write a Python script that will create three hashes of each

    $18 (Avg Bid)
    $18 Snitt bud
    2 bud

    I have several types of private keys from SSH to Crypto on various blockchains. I want 5 different nodes to generates pieces of the private keys, and I want to use a threshold of 2 of 5 to interact with the various protocols. I want to be able to change the parts and threshold prior to launching a new set of nodes. I want to build a UI where we select what type of key to generate, you login with a SSO, pin, and various other pieces, and then it outputs what you need to integrate into apps and such to support this stype of login, such as SSH Clients or Crypto Wallets. Examples: ECDSA Curve: secp256k1 (used in Ethereum ERC20 tokens) Curve: NIST P-256 Curve: secp256k1* Schnorr signature scheme (default for secp256k1) Curve: BLS12-381-Jubjub* Used for zero-knowledge proofs EdDSA Curve: curve...

    $20 / hr (Avg Bid)
    $20 / hr Snitt bud
    7 bud

    The project guideline is attached

    $68 (Avg Bid)
    $68 Snitt bud
    10 bud

    I need help with a Capture The Flag challenge related with steganography and cryptography.

    $192 (Avg Bid)
    $192 Snitt bud
    5 bud

    As a Blockchain Specialist, I have expertise in developing smart contracts and NFT marketplaces, but I also have experience developing cryptocurrency wallet applications. I have a variety of abilities in the field of cryptography, including but not restricted to: Token Listing ( CMC/CG/Trust Wallet/Binance AND MORE ) Token Trending On Platforms Like Dextools, CMC, and Pinksales. Token Promotion Ads Campaign. Token Holders Increasing. 3D NFT Art, 10k Traits. Metaverse. Hyperledger Fabric. NFT Avatar And 3D NFT Character. NFT Marketplace Website Creation. NFT Minting Crypto Game Development. DAPP's Development Blockchain Network Development Smart Contract Development ( ERC20 / BEP20 / Polygon AND MORE ) AND MORE If you think am a good fit, here is how it will work:

    $892 (Avg Bid)
    $892 Snitt bud
    7 bud
    Cryptography Avsluttet left

    build cryptographic schemes, and others

    $20 (Avg Bid)
    $20 Snitt bud
    6 bud

    We are seeking an experienced individual with a strong background in cryptography and a deep understanding of AES-CMAC (NIST 800-38B) to assist us in finding the AES key used to generate a specific set of outputs from known inputs. The successful candidate must have a thorough understanding of CMAC mode for authentication and be able to analyze and reverse engineer the algorithm to determine the AES key. Responsibilities: Analyze the input and output data to understand the algorithm used Reverse engineer the AES-CMAC algorithm to determine the AES key Provide detailed documentation of the process and findings Communicate effectively with the project team to ensure clear understanding of the results Requirements: Bachelor's or Master's degree in Comp...

    $121 (Avg Bid)
    $121 Snitt bud
    8 bud
    Cryptography project Avsluttet left

    I have this project that is about secure multi party communications and I need it done in latex. I also want in depth details about how it was done and the thinking process.

    $37 (Avg Bid)
    $37 Snitt bud
    7 bud
    Trophy icon Improve Algorithm Performance Avsluttet left

    I'm looking for a freelancer who can improve Performance Evaluation of Hybrid Cryptography System please check attached file and let me know who can solve it. Thanks

    $220 (Avg Bid)
    Omtalt Garantert
    $220
    4 bidrag
    need help in math Avsluttet left

    I need help in math project, Cryptography

    $17 (Avg Bid)
    $17 Snitt bud
    9 bud
    iOS engineer Avsluttet left

    Experience - 4+ yrs Timings - 11:30pm-8:30am Job Description- Requirements for iOS engineer: ● 3+ years experience building mobile consumer applications. Experience with SwiftUI ● You have experience with cryptography for platform security, with secure enclave and implementation of secure software stacks. ● You have an eye for design, intuitive UX, and aesthetics. ● You write high-quality, tested code to power a smooth, aesthetic UX ● You have designed, built and maintained production Swift iOS applications at scale. By the way This is going to be Contractual work Minimum 6 months and max 1 yr

    $884 (Avg Bid)
    $884 Snitt bud
    6 bud

    DEVELOPER (SWIFT UI ) EXPERIENCE - 4+ YRS RATE - INR 80K Per month TIMINGS - 11:30pm-8:30am JOB DESCRIPTION - Requirements for iOS engineer: ● 3+ years experience building mobile consumer applications. Experience with SwiftUI ● You have experience with cryptography for platform security, with secure enclave and implementation of secure software stacks. ● You have an eye for design, intuitive UX, and aesthetics. ● You write high-quality, tested code to power a smooth, aesthetic UX ● You have designed, built and maintained production Swift iOS applications at scale.

    $1480 (Avg Bid)
    $1480 Snitt bud
    30 bud

    Want to create a fully encrypted E2EE messaging app like threema or BCone Has to be specialist in cryptography or built one like this before and built apps before Want to no more about it We prefer a solo freelancer to build it and someone from United Kingdom. The candidates will eventually be required to sign an NDA

    $5214 (Avg Bid)
    $5214 Snitt bud
    44 bud

    RSA, WEP , Protocol verification with scyther , secure communication city a to b

    $112 (Avg Bid)
    $112 Snitt bud
    3 bud

    Need an expert of CRYPTOGRAPHY

    $26 (Avg Bid)
    $26 Snitt bud
    5 bud

    Looking for a Research Paper in CyberSecurity 1. Cryptography, 2. a novel Authentication in IoT, 3. Novel Authentication using blockchain in IoT 4. Federated learning 5. Quantum Cryptography NOTE: Novelty of the proposal is mandatory

    $233 (Avg Bid)
    $233 Snitt bud
    23 bud

    project about how cryptography started, how it is used in our life , most cryption algorithms ... it's a university project and the most important thing that the project shouldn't be cloned from any other pptx project from google and it has to be in french language

    $56 (Avg Bid)
    $56 Snitt bud
    14 bud

    Need help on a report about computer security, including basic RSA algorithms , cryptography

    $68 (Avg Bid)
    $68 Snitt bud
    21 bud

    Looking for a Research Paper in CyberSecurity in any of the following 1. Cryptography, 2. a novel Authentication in IoT, 3. Novel Authentication using blockchain in IoT 4. Federated learning 5. Quantum Cryptography NOTE: there should be a novelty in the proposal

    $250 (Avg Bid)
    $250 Snitt bud
    13 bud

    ...money that is powered by cryptography, a form of computer code that is used to protect data and to secure financial transactions. Crypto-currency is becoming increasingly popular due to its ability to provide anonymity and decentralization, making it attractive to those who are seeking to conduct transactions without the need for a central authority. This paper provides an overview of crypto-currency and how it works, including its advantages and disadvantages. It then examines the current state of the crypto-currency market and the potential risks and rewards associated with investing in crypto-currencies. Finally, the paper offers some tips for investing in crypto-currency. Introduction Cryptocurrency is an emerging form of digital money that is powered by cryptography...

    $336 (Avg Bid)
    $336 Snitt bud
    20 bud

    Hi, I need a programmer to cross-compile the NaCl salt cryptography project in both Visual Studio (to produce an x86 lib/obj file) and MIPSEL (to produce a MIPS lib/obj file). The MIPS machine code can be done in either Windows or Linux (the toolchain will be provided for Windows if you don't have it already. As for Linux, it's easier to get installed). NOTE: NaCl does not have a standard GCC makefile. Instead, those geniuses decided to make some sort of custom bash script to handle compilation. A Freelancer who know Linux bash, GCC make/makefiles and C programming is required. Thanks.

    $81 (Avg Bid)
    $81 Snitt bud
    15 bud

    to run different algorithms of cryptography by using Python programming in MATLAB and google Collab

    $91 (Avg Bid)
    $91 Snitt bud
    10 bud

    ...range-fitting algorithm. Depending on how feasible it is! Report all stages of the work. The first thing to do before you take it, describe the approach that will be applied! I also add 2 files with the values of coordinate points with the first 50 k and the last 50 k with their coordinates, which these points produce. The main areas that fall into the work are mathematics, geometry, cryptography, statistics, programming and information protection! The reason for this is that the ECDSA function is written according to the latest developments Modeling an algorithm. Please, only high-class experts in identifying predictive functions with powers for the test and more training epochs. 4.5 billions row The file itself:

    $2338 (Avg Bid)
    $2338 Snitt bud
    31 bud

    Hi, I need a cryptography programmer who can code for me an RSA cryptography system that can encode and decode files using a public and private key. I already have the working SHA-256 hash project but I need someone to help me with the RSA code using the NaCl library. I am not a cryptology expert by any means but from what I understand, the idea would be that we would hash the data and then sign the hash. This will prove that whoever generated this hash has the private key. Then you get the data that you want to verify, calculate the hash on it and then check that. If the calculated hash matches the one in the signature then the signature is valid. At this point we will have have high confidence that the data has not been changed and that it was generated by someone that h...

    $168 - $504
    Omtalt Viktig Forseglet
    $168 - $504
    9 bud

    Need an expert to build a neural network or a decision tree able to solve a problem related to cryptography. 1) The Data We will provide four listings containing nearly 300,000 lines of data each one, all of them similar to those presented in Examples 001 and 002, bellow. The files are composed of letters A, C, T, G, B and (dots). Each of these letters corresponds to a "tag" The (dots) corresponds to neutral tags (or simply, no tag). The letters ACTGB corresponds to a non-neutral tag (or simply different from "dot" tags). The tags C, T, and G corresponds to small variations of tag A. They could even be made equal to tag A. Just as a very simple example, lets consider: If A = Antonio , then C = Antonio wearing eyeglasses T = Antonio wearing glove...

    $557 (Avg Bid)
    $557 Snitt bud
    23 bud

    need help writing dissertation in cryptography (computer science, computer engineering)

    $382 (Avg Bid)
    $382 Snitt bud
    32 bud
    Cryptography task Avsluttet left

    Details will be shared on inbox.

    $306 (Avg Bid)
    $306 Snitt bud
    6 bud
    $338 Snitt bud
    3 bud

    Cryptography Process, as describe in Attachments "Cryptography " Price 2000 INR, id 1,2,3 in 12 Hours, the remaining id in 24 Hours.

    $24 (Avg Bid)
    $24 Snitt bud
    1 bud

    We are looking for a Blockchain consultant with a blockchain development background in Private or public blockchains. Someone with cryptography knowledge, Decentralized application architecture, and decentralized identities, as well as in the zero-knowledge proof. You must have at least three years of experience with a resume/cv ready.

    $22 / hr (Avg Bid)
    $22 / hr Snitt bud
    37 bud

    I need help, or someone to teach me about some cryptography.

    $170 (Avg Bid)
    $170 Snitt bud
    11 bud

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    $649 (Avg Bid)
    $649 Snitt bud
    7 bud

    We are building a blockchain platform for decentralised applications (Dapps) and helping to create a blockchain ecosystem that allow for scaling and connecting disparate blockchains. We are looking for a member who has • Excellent Understanding of Blockchain Technology • Proficiency in at least one high-level programming language • Solid grasp of cryptography and security principles • Experience with distributed systems and peer-to-peer networking • Knowledge of smart contracts • Familiarity with Algorithm and Data Structures

    $38 / hr (Avg Bid)
    $38 / hr Snitt bud
    58 bud

    I am looking for an expert in Cryptography

    $145 (Avg Bid)
    $145 Snitt bud
    6 bud

    Build and train a neural network for cryptographic applications. Document the dataset used, method and results.

    $76 (Avg Bid)
    $76 Snitt bud
    10 bud

    Inkjet re-manufacturer is seeking individual, to assist in development of inkjet product, analyze communication signals between printer and inkjet cartridges , and its cryptography. This is a turnkey project. Individual needs to live in the USA and have at least 20 years experience with related to such development.

    $37 / hr (Avg Bid)
    $37 / hr Snitt bud
    9 bud

    Topp cryptography artikler