Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Evner
Sprog
    Job-status
    1,527 java cryptography jobs fundet, i prisklassen EUR
    PRESENT-80 3 dage left

    Hi there! I'm based in Ahmedabad, India. This project is related to lightweight cipher, cryptography. I have attached a pdf containing information relevant to this project which can be found in section 3.1 of uploaded pdf (round-based based architecture of PRESENT-80). The code has already been developed and I'm getting the proper results as well. But

    €47 (Avg Bid)
    €47 Gns Bud
    6 bud

    Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed and I'm getting the proper results as well. But I want to build a clock based design so that I can perform power

    €26 (Avg Bid)
    €26 Gns Bud
    2 bud

    ...attention to detail + Interpersonal skills with the ability to work effectively in a cross functional team Qualifications: + Minimum of three years of hands-on experience in Java/C#/Python/Golang and a minimum of three years of experience in application development and systems implementation + Minimum of one year experience in Blockchain research, understanding

    €822 (Avg Bid)
    €822 Gns Bud
    31 bud

    ...Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism. The report covers one of the following: Lattice-Based Cryptography (You need to go through Vector Space first) Quantum Cryptography Post-quantum Cryptography Blowfish Twofish MARS DEAL, a Feistel cipher

    €48 (Avg Bid)
    €48 Gns Bud
    14 bud

    need to write a paper on cryptography which should contain atleast 20 pages

    €145 (Avg Bid)
    €145 Gns Bud
    14 bud
    Trophy icon Logo Design Contest Udløbet left

    ZetaHash Logo 09Aug18 ZetaHash is a partnership of 3 in... 2. Chimeric or mythical creature Manticore, imp, incubus, succubus, winged buffalo, troll, pixie, sexi anime girl named Zeta with whip “whipping” cryptography 3. Cross a platypus with cryptography. What does it LOOK like? 4. Do a completely new riff on mathematical “dragon” 5.

    €225 (Avg Bid)
    Garanteret Topkonkurrence
    €225
    314 indlæg

    I have an input box with text limiter. And need to convert this text from MD5 SHA hashing to rainbow tables using pied piper algorithms. I need expert in the field of cryptography. Some one with a phd

    €17 (Avg Bid)
    €17 Gns Bud
    1 bud

    DES Algorithm in java is called as following: Key key = generateKey("12345678"); Cipher c = [log ind for at se URL]("DES"); [log ind for at se URL](Cipher.ENCRYPT_MODE, key); byte[] encVal = [log ind for at se URL]([log ind for at se URL]()); I want a DES algorithm implemented code, and its execution time is required to be as same as in JDK. those links may help to un...

    €118 (Avg Bid)
    €118 Gns Bud
    12 bud

    ...all development frameworks and design artifacts. - Mentor internal team members and provide technical guidance as needed. Requirements - 5-8+ years of hands-on experience in Java or Golang. Strong proficiency in NodeJS, GIT repositories or similar source code management systems, can be either open source or closed source tools. - 3+ years’ experience

    €23 / hr (Avg Bid)
    €23 / hr Gns Bud
    10 bud

    Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed but I'm unable to procure the final result. ( As i can see that the individual modules are successfully executing

    €137 (Avg Bid)
    €137 Gns Bud
    9 bud

    I have a cryptography problem solving. Due 9:am 06 Aug 2018 Consist of 4 question eg. Consider the linear recursi0n relationXn+2 =C0Xn+1 + C1Xn + C2 ( mod2) that generatesthe sequence:0,1, 1, 0, 1... Find the next 3elementsofthesequence, and determine the period of the recursion relation. Xn+2=Xn+1+Xn+1, 0,1,1,0,1,0,0,1 Problem Topic : Affine Cipher

    €36 (Avg Bid)
    €36 Gns Bud
    9 bud

    **Looking for Candidates based in Switzerland, NYC or SF** Freelance Video Animation Posit...globally operated startup, cofounded by a renowned EPFL professor  Join a young and innovative team  Gain industry related work experience in machine learning and cryptography  High chance of future collaboration  Independent working

    €39 / hr (Avg Bid)
    Lokal
    €39 / hr Gns Bud
    3 bud

    We need an expert in blockchain as a consultant. Bring your resume. It is best to graduate from a prestigious university. Or information engineering, cryptography, computer doctor. Or a consultant who has worked on a well-known project. The treatment is very rich every year. $$$$$$$$$/year!

    €16262 (Avg Bid)
    €16262 Gns Bud
    22 bud

    1. Check given keys if valid 2. determine the decryption formula 3. implement c++ program to do decryption and encryption that can detect invalaid keys and display error message (to be run in windows)

    €33 (Avg Bid)
    €33 Gns Bud
    4 bud
    cruptography tutor Udløbet left

    Hi, I need a tutor to explain cryptography from basics to advanced, fee £10 perhour. Thanks

    €20 (Avg Bid)
    €20 Gns Bud
    9 bud

    ...efficient - reliable - fast - resilient - extensible - responsive - compatible - virtual unique Finger print algorithms - rabins algorithm Skills in data security, cryptography, PHP, API, JQuery, Json , object oriented and COBOL. The system must aggregate queries and processes and executes function and commands with one touch finger print authentication

    €103 (Avg Bid)
    €103 Gns Bud
    3 bud

    ...efficient - reliable - fast - resilient - extensible - responsive - compatible - virtual unique Finger print algorithms - rabins algorithm Skills in data security, cryptography, PHP, API, JQuery, Json , object oriented and COBOL. The system must aggregate queries and processes and executes function and commands with one touch finger print authentication

    €90 (Avg Bid)
    €90 Gns Bud
    1 bud

    ...efficient - reliable - fast - resilient - extensible - responsive - compatible - virtual unique Finger print algorithms - rabins algorithm Skills in data security, cryptography, PHP, API, JQuery, Json , object oriented and COBOL. The system must aggregate queries and processes and executes function and commands with one touch finger print authentication

    €17 (Avg Bid)
    €17 Gns Bud
    1 bud

    I want a person who is comfortable in cryptography concepts and using them in c++ code. My requirement is two small tasks where each needs to do encryption/decryption or hashing using openssl library in c++ coding. I can give the steps to install openssl in a linux environment. The exact task to be done is available in the attached file. I want each

    €35 (Avg Bid)
    €35 Gns Bud
    8 bud

    Vær venlig at Tilmelde dig eller Log ind for at se detaljer.

    Fremhævet Topkonkurrence