i have a base point called G i add this point to itself a number of times called xTimes (is is a finite field) so, the result is mod by a number called n the result point is K ----- now i have point K i want to change the mod number (n) to another number now i want to get the new point K -- inputs: base point G in known xTimes is unknown K is known old mod n is known new old mod n is known we n...
I have a twitter application built in node.js and need someone to help with ongoing maintenance and adding more functionality going forward. ...back-end APIs. The ideal freelancer needs to be proficient in Node.js and must have experience of building chatbots previously. Brownie points if they have worked with cryptography and distributed systems.
Urgent. PM me for more details
...checked your profile and you seem to have the skill set I need for my project. Are you available to do my work on cryptography and artificial intelligence ( specifically neural network, deep learning and natural language processing). I will need to incorporate AI with cryptography. Let me know if you want to work with me on that we can start immediately
...and technologies Understanding of Bitcoin or other crypto currencies • Understanding of various distributed consensus methodologies (Mining, PoS, etc). • Understanding of cryptography, including asymmetric (pub/priv key), symmetric, hash functions, encryption/signatures. • Knowledge of versioning systems Git etc. • Passion for best design and coding practices
...the code so that the developers can utilize / enhance / improve upon your work in the future to receive increased awards. Only versions currently supported by the upstream project are eligible. Please verify your issue is present in a current release before submission. Note that other forks of TrueCrypt and any fork of VeraCrypt code are not eligible
Windows Forms C# with comments and explanation for each function and whole concept - Encrypt the text file using symmetric key algorithm (e.g. AES) - Decrypt a text file using symmetric key algorithm (e.g. AES) - Generate an asymmetric key pair (public and private) - Encrypt the text file using the public key (e.g. RSA) - Decrypt the text file using the private key (e.g. RSA) - Generate the hash d...
Traceback (most recent call last): File "/usr/local/bin/streamlink", line 5, in <module> from pkg_resources import load_entry_point File ...(requirements)) File "/usr/lib/python2.7/dist-packages/[log ind for at se URL]", line 639, in resolve raise DistributionNotFound(req) [log ind for at se URL]: cryptography>=1.3.4 Need this fixed
Hello guys, Im interested in coding and looking for special tools that I can not find in the internet. I also dont ha...that I can not find in the internet. I also dont have the time to learn coding so I decidet to look for someone who can do this for m. I need someone who know a lot about cryptography and malewares. Its not for illegal purposes.
...for a programmer with a strong experience Required skills: - GPU programming using OpenCL /CUDA - Offload heavy computation to parallel GPUs: algorithms, Deep Learning, cryptography. - NVIDIA/AMD Radeon interoperability - Programming for Linux/Windows using C++/C JOB: I'd like to implement a new algorithms as a Hashcat module, all done on Multi GPU
...programmer with a strong experience in : Required skills: - GPU programming using OpenCL /CUDA - Offload heavy computation to parallel GPUs: algorithms, Deep Learning, cryptography. - NVIDIA/AMD Radeon interoperability - Programming for Linux/Windows using C++/C JOB: I'd like to implement a new algorithms as a Hashcat module, all done on Multi GPU
...c++ and cryptography the goal of this task is to create a mining function with the same capability of x16 ( list of algorithms and random resorting for each n blocks). set of algorithms to use for this task are those that have passed the round 1 of the NIST quantum resistant challenge. [log ind for at se URL]
I have client native app (vc++), it is packed by themida. Each time this app client send POST form data to server, data is encrypted with random key. Here is 1 example plain_text: hello data after encrypted something like: encrypted_text = 6NTkCAvY7NqYFz5lU1JjNQ== EncKey = ZCj35hEvmxMOQPrzYzov8CsOpKJayFoRUoc98FGTnnkUi+YZW5pzNHXhCuvKKqq4RAATdn1qSsZ558i2cS2ClfvXvfb3OQEgBj9+GcdMMBasdKGYu88hxFfELkqWK...
...code that will scan, but that also looks something like attached(by user) picture(different forms-sun, flower, face). It need someone who know image / video processing, cryptography, math and algorithm and will be able to implement something like facebook, kik or snapchat “special” codes and to use in his applications this kind of functionality.
need someone who is good in cryptography and cryptanalysis as well as in matlab and maple. have to implement "differential-linear attack" on dummy structure of 4 or 8 bit cipher in matlab or maple. at the end i need a brief report and source code with comments. you have to do everything by yourself.
Cryptography about 30 pages Abstract Encryption is the encryption process in cryptography. Make sure that the data is safe while traveling through the unsafe channel and that it can only be read by the person who is meant to use the keys that are rewritten in a legible form. In this paper I have handled a bit of history of cryptography, modern cryptography
...with crypto-currencies would be an advantage but not essential. Advantageous Knowledge or ambition to become fluent in Cryptography, and P2P communication protocol ‘WebRTC’ which are again core components of the project. We also have a working IOT R-Pi expansion board that will form the basis of a developer kit, and to drive adoption of the Streembit
knowlege needed in all this fields if u want to bid . thnks
...about the creation of several Smart Contracts To simulate a Clearing House (To clear derivatives) (There are several concepts abaout financial products, cryptography and blockchain technology) The project is about 75 pages witten in latex. Need to correct Grammar, correct use of verb tenses depending on the situation (theroy and thinks that I have done)
Hi there! I'm based in Ahmedabad, India. This project is related to lightweight cipher, cryptography. I have attached a pdf containing information relevant to this project which can be found in section 3.1 of uploaded pdf (round-based based architecture of PRESENT-80). The code has already been developed and I'm getting the proper results as well. But
Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed and I'm getting the proper results as well. But I want to build a clock based design so that I can perform power
...Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism. The report covers one of the following: Lattice-Based Cryptography (You need to go through Vector Space first) Quantum Cryptography Post-quantum Cryptography Blowfish Twofish MARS DEAL, a Feistel cipher
... Because we don’t want our logo to be forgotten, even if it has to be weird, as long it is memorable as… fuck. Let no one unsee it. Preferable: Multi-color; Simplicity in visual grasp; Maintain integrity at various resolutions (as it is scaled down, esp on mobile devices); Looks great on printed material; Avoid well known logos and rote and well-worn
...implemented code, and its execution time is required to be as same as in JDK. those links may help to understand how des algorithm is working [log ind for at se URL] [log ind for at se URL] for more clarification you can contact me [Removed by Freelancer.com Admin
...develop decentralized applications - Direct experience in development on the Hyperledger Blockchain platform - Good understanding of information security protocols, such as cryptography, symmetric/asymmetric (public/private key, encryption signatures), peer to peer networks, hash functions, etc… - Experience with Agile and Continuously Iterative models
Hi there! I'm based in Hyderabad, India. This project is related to cryptography. I have attached a pdf containing information relevant to this project which can be found in the pages between 342 to 355. The code has already been developed but I'm unable to procure the final result. ( As i can see that the individual modules are successfully executing
I have a cryptography problem solving. Due 9:am 06 Aug 2018 Consist of 4 question eg. Consider the linear recursi0n relationXn+2 =C0Xn+1 + C1Xn + C2 ( mod2) that generatesthe sequence:0,1, 1, 0, 1... Find the next 3elementsofthesequence, and determine the period of the recursion relation. Xn+2=Xn+1+Xn+1, 0,1,1,0,1,0,0,1 Problem Topic : Affine Cipher
...Freelance Position - Per Project Basis - Schedule to be discussed Hourly wage to be discussed Benefits: Work with fast growing, globally operated startup, cofounded by a renowned EPFL professor Join a young and innovative team Gain industry related work experience in machine learning and cryptography High chance of future
We need an expert in blockchain as a consultant. Bring your resume. It is bes...in blockchain as a consultant. Bring your resume. It is best to graduate from a prestigious university. Or information engineering, cryptography, computer doctor. Or a consultant who has worked on a well-known project. The treatment is very rich every year. $$$$$$$$$/year!