Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    12,980 encryption travaux trouvés au tarif de EUR

    hello, we are looking for a developer or development team to continue the development of our market place. Our site is developed based on a Symfony2. We want a high level of expertise in Symfony2, references and a reactivity We need to bring corrective and regularly amélioratives changes Each work will be an encryption and an estimate of the time Thank you best regards En français : bonjour, nous sommes à la recherche d'un développeur ou d'une équipe de developpement pour continuer le développement de notre place de marché. Notre site est developpé sur une base Symfony2. Nous souhaitons un niveau de compétences élevées sur Symfony2, des références et un r...

    €101 (Avg Bid)
    €101 Offre moyenne
    8 offres

    A reserving room before encryption framework is proposed to provide separable reversible data hiding for encrypted images in this project. An Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding (MGAMBTC) is used to enhance the hiding capacity. A receiver with only the hiding key can extract the secret data without knowing about the content. If the receiver has only the encryption key, it is not possible to extract the hidden secret data, but it is possible to decrypt an image similar to the original image. Only when the receiver has both the hiding key and the encryption key, it is possible to extract the secret data and completely recover the original content without any error. The experimental results demons...

    €101 (Avg Bid)
    €101 Offre moyenne
    3 offres

    ...controller which will be compared to the 2nd PIN stored in Meta Data Partition. If authentication is successful then Private partition2 will become visible to the host/machine. 3. Meta Data Partition: This is a partition that is only visible to the controller to store data/metadata like pin, encryption keys etc. o Every read & write operation destined for Pp1 & Pp2 partitions should automatically be encrypted/decrypted via the controller (encryption algorithm can be simply Xoring the data). o The key for encryption/decryption & both PINs should be changeable in Meta Data Partition. o IOCTLS should be used to mark any partition as PP1 or PP2 o Once the partition is visible to the host/machine (after authentication) it will behave like normal volumes ...

    €3161 (Avg Bid)
    €3161 Offre moyenne
    2 offres
    Create a GUI with python 6 jours left
    VERIFIÉ

    I have two scripts of code on python in which first script uses RSA algorithm to encrypt and decrypte an image and the second script uses DNA coding to encrypte and decrypte the image The GUI must takes an image then encrypte it using the rsa encryption code , then encrypte it more with the DNA , shows the result image ,after that take the result and decrypte it with the DNA and lastly decrypte it with RSA and shows the result which must be the same original image after decryption The scripts are ready , just to creat the GUI and correctly assign the codes

    €32 (Avg Bid)
    €32 Offre moyenne
    12 offres

    I want a python code that takes an image and encrypte it using DNA coding algorithm XOR , then takes the encrypted image and do the opposite and obtain the original image

    €27 (Avg Bid)
    €27 Offre moyenne
    10 offres

    Hello, I have an application based on laravel. I want to change the server and add the amazon s3 storage feature if you are expert with laravel,+ ffmpeg + Aes encryption and aws S3 Pleas apply to this job Note: I am looking for an expert only Please read the post well before applying.

    €31 / hr (Avg Bid)
    €31 / hr Offre moyenne
    27 offres

    Tasks: - File architecture with compression & encryption from vb6 UDT binary files & code to convert - Sync SSH form using FSW & 1 timer and needing better methodology and efficiency (zipping) -- Syncing should require utilization of memory management for zipping and unzipping files.

    €178 (Avg Bid)
    €178 Offre moyenne
    24 offres

    ...20-30 pages in total including tables and graphs. The key though is to answer the questions in the project description below. It would also help if you have reasonable computer knowledge to understand how data encryption works, because it means you will understand many of the concepts in publicly available market research reports. Please submit proposals quickly as I will likely close it early. *************************** PROJECT DESCRIPTION: I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect i...

    €443 (Avg Bid)
    €443 Offre moyenne
    36 offres

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    €599 (Avg Bid)
    €599 Offre moyenne
    9 offres

    Hi Vishal S., I have updated the project now (same description and amount) and will click on Hire Vishal S now, hopefully that works ok. Neill

    €96 (Avg Bid)
    €96 Offre moyenne
    1 offres

    Project Description: I am looking for experts who has experience in 1) ST20 (Sti55xx) cpu. 2) Experience in DVB encryption system. expecially, ecm, emm and data exchange (smartcard and STB) in smart card processing I will provide: 1) firmware jtaged from STB (both data in the Flash and RAM). 2) The function/sub-routine that I am looking for to decrypt those data in the firmware The developer needs to: 1) decompile the function/sub-routine that I am looking for into linux c code (example: function.c) 2) provide any additional decompiled function/sub-routine that can be useful for me. we can have detailed interactive discussion over any app if you need to.

    €616 (Avg Bid)
    €616 Offre moyenne
    8 offres
    Python script to read VCE files S'est terminé left

    Dear all, I would need a script python script capable of reading the proprietary file in Avanset VCE format. The files rely on SQLITE and encryption. I need to open old archives and transform them to PDF. I attached a file for testing purposes

    €20 (Avg Bid)
    €20 Offre moyenne
    9 offres

    ..."","(key)"); decrypt("", "","(key)"); } File encryption must be implemented using the following libraries: Salsa20 HC-256 SOSEMANUK The source code there is written in C, but it can be plugged into c++ and compiled into one file. It also needs optimization of RAM, and the correct read/write file, so that the memory is freed after the encryption of the file. Write code and test it strictly on Linux, because RAM on windows and linux in c++ is optimized differently. Also for clarity, there is an example of file encryption using An example can be found in the

    €429 (Avg Bid)
    À la une Urgent LDN
    €429 Offre moyenne
    21 offres

    Hello guys, I am looking for skilled FPGA programmer who could implement machine learnin...classification) of tiny metal objects etc on a FPGA SOM module. The FPGA will detect object using data from high resolution camera's (not less than 720P) usb port/camera interface,lidar module (atleast 6 sensor) & ultrasonic sensor module (atleast 7 sensor) i2c line and will be connected to servo motor and BLDC motor ESC. The FPGA should output in low latency H.264/H.265 format with AES 256 encryption/similar. More details will be revealed via chat. The freelancer is free to choose an ideal cost effective FPGA SoM module for this task. Please don't apply if you can't complete the task or unsure about your capacity to match the development task. The project needs to...

    €399 (Avg Bid)
    €399 Offre moyenne
    9 offres

    Hi Vishal S., you've done some research for me in the past and I was wondering whether you would be interested in doing something almost identical again (just for a different industry)? I need a list of merger and acquisition plus fundraising transactions involving data encryption companies over the last three years. What was the size of the acquired party in terms and revenue and employees, and what was their valuation on sale or merger or fundraise? Lett me know if you would be up for doing this. Neill

    €96 (Avg Bid)
    €96 Offre moyenne
    1 offres
    Php encryption output removal S'est terminé left

    Hi, i have a bootstrap panel which gives a multi-layer encryption output. I am looking to have the final layer of the output encryption removed. The final layer is AES.

    €25 (Avg Bid)
    €25 Offre moyenne
    8 offres

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €188 (Avg Bid)
    €188 Offre moyenne
    29 offres
    Program to encrypt S'est terminé left

    Action: In this step, you will implement your own encryption code. You may use a programming language of your choice. Then, you will need to choose a cryptographic library. Then, you will choose an appropriate encryption algorithm. Alternatively, you may a cryptographic utility, and write a shell code. : In this step, you need to implement a method for infecting a victim. Example: A victim may open a phishing email which contains a malicious executable/script as an attachment. 3. Monitoring: To be able to detect a ransomware, we need to be able to monitor your environment. Example: OSSEC Host IDS has a file integrity monitoring functionality. Provide your own detection component 4. Detection: In this stage, you will analyze the data collected by the monitoring co...

    €177 (Avg Bid)
    €177 Offre moyenne
    16 offres
    C Programming Expert S'est terminé left

    I am looking to hire an experienced C Programming Expert in Operating Systems, Encryption and other advance topics

    €86 (Avg Bid)
    €86 Offre moyenne
    10 offres

    ...Also the speed of encryption will be very important, namely because of speed I chose stream algorithm instead of block algorithm. I work with transmitting important files over unsecured channels on a regular basis, at the moment I used and use the usual openssl aes-128-cbc, but the encryption speed leaves much to be desired... Therefore, I need a stable utility, but for Salsa20/SOSEMANUK and that quickly encrypted files that weigh from 1kb up to 50kb +. I would like to see it work in the following variants: 1) Sources c++ which can be compiled into usable variant ELF for linux, so it could be put to /bin folder and used as console openssl, extended fileencryptor -enc -in / -out / -key (256bit key) 2) C++ source code, where file encryption is implemented by

    €469 (Avg Bid)
    €469 Offre moyenne
    6 offres

    I have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE sm...have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE smtp, but i got errors while trying to test it if i add a relay smtp, or any other server, and i click test i got the error: (( Swift_TransportException Unable to connect with TLS encryption )) Im searching only who is the professional to fix this problem by adding SENDINBLUE scripts into my server, or he made anything to let my server accept any kin...

    €27 (Avg Bid)
    €27 Offre moyenne
    35 offres

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    €140 (Avg Bid)
    €140 Offre moyenne
    7 offres

    ...Test-Driven Development. * Have experience developing well-designed REST APIs. * Understanding of Blockchain architectural design patterns as well as supporting infrastructure. * Expertise in providing end-to-end solutions (Life Cycle for infrastructure including SDLC). * Knowledge of ERC20, ERC721, and other protocols. * In-depth knowledge of blockchain logic. * Understanding of fundamental encryption mechanisms. * Experience in peer-to-peer networking. * Understanding of Smart Contracts and consensus techniques, as well as experience developing blockchain apps or proofs-of-concept (POCs) in Solidity on Ethereum. * Hands-on development expertise in the following areas: Solidity, JavaScript, Golang, and JSON. * A strong interest in blockchain technology and like learning and deve...

    €33 / hr (Avg Bid)
    €33 / hr Offre moyenne
    68 offres
    ENCRYPTION FOR AN CHAT APP S'est terminé left

    Hey , looking for an encryption expert for a social media app.

    €753 (Avg Bid)
    €753 Offre moyenne
    14 offres

    I need to check a bank, where the request is encrypted EAX mode encryption (

    €477 (Avg Bid)
    €477 Offre moyenne
    14 offres

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC , and Diffie-Hellman key

    €162 (Avg Bid)
    Urgent
    €162 Offre moyenne
    11 offres

    Want to make a string Encryption and decryption software using Dot net

    €33 (Avg Bid)
    €33 Offre moyenne
    14 offres

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC

    €471 (Avg Bid)
    €471 Offre moyenne
    19 offres

    I need help with Encryption calculations and signatures in Python. I will share more details in chat.

    €38 (Avg Bid)
    €38 Offre moyenne
    9 offres
    Work Encryption S'est terminé left

    Only Serious people need. Work from home and digital platform like instagram, Facebook, linkedin, etc .

    €2 / hr (Avg Bid)
    €2 / hr Offre moyenne
    4 offres

    Looking for a conference paper ( Cryptography/ IoT security/ Network Security/ Federated learning ) ex: 1. A novel Continuous authN in IoT devices , Functional encryption for data privacy etc

    €240 (Avg Bid)
    €240 Offre moyenne
    12 offres

    Looking for asp .net website Main Features Send, receive messages. (auto delete message older than 7 days) Group chat Login Registration pages Control Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User...Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User should be able to send msg itself to different devices. Adding a payment gateway for Premium feature—monthly payment or onetime payment. Paid feature should have Encrypted chat system- Chats and file sharing with encryption chat history lifetime. Max file s...

    €221 (Avg Bid)
    €221 Offre moyenne
    13 offres
    VPN APPLCATON S'est terminé left

    Hello Guys, Hope you are doing well. I have been looking for Server Engineer and Application Developer to make application for VPN Access. Windows PC VPN Mac VPN iPhone VPN (iOS) Android VPN APK Router VPN Chrome VPN Extension IPsec with encryption, IPsec with Layer 2 Tunneling Protocol (L2TP), SSL 3.0 or Transport Layer Security (TLS) with encryption, Layer Two Forwarding (L2F) or Point-to-Point Tunneling Protocol (PPTP) Warm Regards, Ashwani Dudeja

    €2350 (Avg Bid)
    €2350 Offre moyenne
    15 offres
    Social Media App S'est terminé left

    . A new social platform for singles to meet and mingle. We’r...with the founder and a great opportunity to build out your portfolio. Key features to be built: Geo-location enabled Onboarding verification system (think identity and proof of address) to hold the integrity of the platform Twitter-like User profile feed User profile allowing photos, videos, polls, and reels Ability to “follow” and block others, also “like” posts and stories Ability for ads Encryption-capability Roadmap features: Integration with external systems to purchase entertainment tickets (sports, concerts, etc) Allows user to directly purchase and invite others There’s so much that can be done! If any of this interests you, please reach out to Xak with an attached resume an...

    €32918 (Avg Bid)
    €32918 Offre moyenne
    81 offres

    ...is much more open to security assaults in the 21st century than it was in the past. Homomorphic encryption, for example, is used to maintain the security and privacy of data in the cloud since it offers greater dependability than other solutions. Despite the fact that Fully Homomorphic Encryption offers improved privacy and security, there are a number of challenges with key management and storage. Therefore, to overcome this drawback homomorphic encryption can be infused with the PSO (Particle Swarm Optimization) algorithm to achieve effective key management. The main motive of the project is to enhance the key generation, sharing, and management process which is done using Homomorphic encryption with the help of the PSO Algorithm. Moreover, Diffe Helman ca...

    €16 / hr (Avg Bid)
    €16 / hr Offre moyenne
    6 offres

    Everyone is familiar with getting license keys to activate software. These keys are normally based on various encryption schemes, and serve to validate that a particular user is authorized to run the software. For this purpose, Please make a Validating Key and Key gen pair. () 1. Input at least three different Local parameters like MAC Id, HDD ID and CPU ID.. (Suggestions Welcome) 2. Take input :: Requesting Person Name, Company name, Email, Software name and Machine Serial Number 3. Create an encrypted (.req) file with all above information 4. On Key -Gen side, Decode all information 5. Generate license for required features(1/16) , as in code project example. 6. Set License type (Demo / Complete) and date of expiry

    €145 (Avg Bid)
    À la une
    €145 Offre moyenne
    6 offres
    RSA Encryption S'est terminé left

    I need a RSA Encryption software using Tkinter Framework. It should contain options for uploading a text file and able to view and encrypt the text using RSA.

    €155 (Avg Bid)
    €155 Offre moyenne
    30 offres
    Data Engineer -- 2 S'est terminé left

    Role/JD : Data Engineer • 6 years of experience in Designing Azure data lake using data bricks, PySpark, SparkSQL. • Hand on experience on Azure SQL Server, Azure services - Function App, Event Hub, Encryption/Decryption mechanism. • Experience on largest and leading-edge projects, leading cloud transformation and operations initiatives. • Own the technical architecture and direction for a client • Deploy solutions across the Azure platform for major enterprise projects • Producing high quality documentation for consumption of colleagues and development teams • Being a thought leader in introducing DevOps mindset and practices within teams • Helping teams build CI/CD pipelines • Helping development teams solve complex problems in innova...

    €7 / hr (Avg Bid)
    €7 / hr Offre moyenne
    6 offres

    need write a java application to create german public transportation ticket barcodes. For those a combination of encryption, decryption and signing processes need to be done. We are looking for support with experience with the bouncy castle library.

    €680 (Avg Bid)
    €680 Offre moyenne
    17 offres

    ...I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect it and analyse it, so I need someone to do the work for me. The Asian and North American markets are of particular interest to us which we need to get right, the other regions are less important but still need to be considered. The reason for the report is simple. We are considering whether to expand an existing data software encryption business into certain regions of the world. If so, how, and in what order? The report findings will feed in...

    €430 (Avg Bid)
    €430 Offre moyenne
    34 offres

    we are looking Android Expert for encryption and decryption API integration

    €45 (Avg Bid)
    €45 Offre moyenne
    10 offres
    €12 Offre moyenne
    6 offres
    Product Security, Product Manager S'est terminé left

    ...-Ensuring that the company's overall strategy and goals are supported by those of the product The Product Security, Product Manager will receive a vision and roadmap with solutions to address the information security needs of our clients. They will help innovate and deliver security features including: -Customer feedback loop -BYO keys -Suspicious login notification -Enabling MFA, 2FA, etc -Encryption at rest Requirements: Define vision and strategy for products and convert them into a workable blueprint for internal and client teams Provide technical leadership for requirements gathering implementation, testing, and delivery Assist product team with sprints from ideation through deployment identifying client needs, designing, and validating concepts, develop...

    €66 / hr (Avg Bid)
    €66 / hr Offre moyenne
    16 offres

    Vicetext is a typing plug-in that can help two individuals to make online communications private by encrypting their messages, it is based on blockchain technology (Web 3.0) while allowing people to chat with Web 2.0 software such as WhatsApp, Discord, and Twitter. Visit to see more.

    €8433 (Avg Bid)
    €8433 Offre moyenne
    26 offres

    We have a number of clients where our software is hosted on our client's server. The clients own the server as well as the SQL database licenses. They create our SQL access. Our clients makes backups of the databases so have full visibility of our databas...We need guidance and support on how to encrypt the databases so they clients cannot access the databases at all, and the data needs to be encrypted even when they do backups as well so they are not able to restore the services. Secondly we host our application on their servers as well and we need to get the application folders encrypted and secured If you have extensive knowledge on database encryption please apply to this project. Note this is a project on an hour to hour rate based on the number of hours needed Kind ...

    €16 / hr (Avg Bid)
    €16 / hr Offre moyenne
    16 offres
    SFTP Set Up (Troubleshooting) S'est terminé left

    I have already set up openssh, publickey, privatekey, ports etc, but WINSCP is giving the error "connections. Did you want to use FTP protocol instead of SFTP? Prefer using encryption."

    €18 (Avg Bid)
    €18 Offre moyenne
    11 offres

    Microsoft implementation of DES, the implementation, the key is automatically generated by the program itself and will be stored in RAM memory during execution of the program code. Your task is to make a copy of the RAM and then analyse that copy, identify and extract the key.

    €29 (Avg Bid)
    €29 Offre moyenne
    5 offres

    We need help setting up a deployment pipeline for our web app that is written in react. We use AWS as our cloud provider but would like a solution that is platform agnostic. Therefore the task is to create a docker compose script that can build and deploy the web app on an AWS instance. You will need to set it up using TLS encryption using letsencrypt.

    €493 (Avg Bid)
    €493 Offre moyenne
    34 offres

    This goes to anyone who has knowledge in secure software and has experience dealing with RSA public and private keys. You will need to customize the supplied json order file to provide information and then encrypt that json order using aes encryption with the supplied ke and IV then base64 encode the result. However, you may need to convert the message to a byte array from strings to work with the encryption algorithm and generate a message digest using SHA512. I will provide additional files and further instructions upon contacting me. Please also provide your budget first as I am on a strict budget, thank you.

    €17 (Avg Bid)
    €17 Offre moyenne
    2 offres
    VPN Service S'est terminé left

    HI We need web Site VPN Service example of what i want updated You need to create a website VPN SERVICE and an application on andro...every month 7. config types - PPTP, OpvenVPN, L2TP/IPsec, Network Manager 8. It is possible to pause the subscription 9. Types of blocking - OpenVPN ECC - Data channel: AES-256-GCM cipher initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp521r1 - L2TP/IPsec Preshared Key with ESP 3DES encryption and integrity control, 3DES key length is 112 (2*56) bits - PPtP - 128-bit MPPE encryption - Traffic between servers - Data channel: Cipher 'AES-256-GCM' initialized with 256-bit key; Control channel: TLSv1.3, TLSv1.3 cipher TLS_AES_256_GCM_SHA384, 521 bit EC, curve: secp...

    €1168 (Avg Bid)
    €1168 Offre moyenne
    32 offres

    Meilleurs articles de la communauté encryption