Cryptography wsntrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 cryptography wsn trabajados encontrados, precios en USD

    ...e and web-based consignment stores for selling luxury items. What i need: - Two-sided and decentralized marketplace, designed with a mix as a normal marketplace and a trading webpage - Bid-ask system, this facilitates a real time transaction allowing users to Buy and sell products - Blockchain software that store the product and transaction on a portfolio so that, by virtue of some clever cryptography, users have the credentials to transfer the ownership of the assets they own. Blockchain technology ensures a secure way to Buy-sell products - Tool that helps users and companies check and understand the price and demand trends of luxury items in the secondary market...

    $1776 (Avg Bid)
    Acuerdo de Confidencialidad
    $1776 Oferta promedio
    16 ofertas
    WSN omnett++ Finalizado left

    Quiero simular una red aproximadamente de 500 sensores inalambricos con omnett++. Necesitaría ayuda, ya que desconozco el funcionamiento de este simulador.

    $413 (Avg Bid)
    $413 Oferta promedio
    2 ofertas

    ...que tengo almacenados en un servidor,con un certificado que se seleccione desde el cliente y que este almacenado en su navegador.<br />El proyecto esta realizado en MVC spring, html5 y javascript en la parte cliente, y el controlado esta realizado en Java.<br />He visto librerias que permiten realizar este tipo de firma seleccionando un certificado del navegador(@firma , crypto Applet,  web cryptography api)<br /><br /> ...

    $244 (Avg Bid)
    $244 Oferta promedio
    1 ofertas
    Desarrollo de Software Finalizado left

    Estamos desarrollando un proyecto muy ionteresante y novedoso. Buscamos freelancers con conocimientos de informática en algunos de los siguientes conceptos. unbound, squid, ssl bump, suricata, snort (intrusiones), linux kernel, kernel security, hardening, cryptography, tor, i2p, decentralized, odroid, bash sed hawk.<br />Cuantos más conceptos domine, más interesante nos será su propuesta.

    $244 (Avg Bid)
    $244 Oferta promedio
    7 ofertas

    es un sistema de monitoreo remoto de cultivos mediante una WSN con IPv6, que obtendrán información de parámetros ambientales (temperatura, luminosidad y humedad relativa) del área de cultivos de la granja La Pradera

    $35 (Avg Bid)
    $35 Oferta promedio
    1 ofertas

    I am in need of an experienced individual to assist in the development of a Wireless Sensor Network (WSN) simulation . The main focuses of this project include performance evaluation, energy consumption analysis, and routing protocol comparison. Key Requirements: - Previous experience in WSN network simulation - Able to develop a proprietary MAC protocol - Proficiency in relevant programming languages and software such as NS2/NS3, MATLAB, or OMNeT++ - Strong understanding of WSN system design Your primary role will be to help me create a comprehensive simulation that accurately represents a WSN network, as well as develop and test a proprietary Medium Access Control (MAC) protocol. This will require a keen eye for detail, a solid understanding of network archi...

    $95 (Avg Bid)
    $95 Oferta promedio
    4 ofertas
    Advanced CTF Challenges Solving 3 días left
    VERIFICADO

    I'm looking for a skilled professional who can solve advanced level CTF challenges, in various categories. I need someone who can tackle challenges in Web Exploitation, Binary Exploitation, Cryptography, as well as other categories like web, forensics, osint, and more. Key Responsibilities: - Solve advanced level CTF challenges in multiple categories Ideal Skills and Experience: - Extensive experience with CTF challenges - Proficiency in solving challenges in Web Exploitation, Binary Exploitation, Cryptography, web, forensics, osint, etc. - Proven track record of solving advanced level CTF challenges - An understanding of security concepts Please note that the specific programming languages or platforms to be used in solving the challenges are not specified, but yo...

    $638 (Avg Bid)
    $638 Oferta promedio
    30 ofertas
    Trophy icon Futuristic Logo Design Urgently Needed Finalizado left

    ...quantum cryptography project named "TANIA". This logo will be a central part of our branding and marketing efforts, symbolizing our commitment to cutting-edge security and technology. Design Requirements: 1. **Logo Name:** The logo must incorporate the name "TANIA". The name should be easily readable and stand out as the primary element of the logo. 2. **Symbol Integration:** Incorporate a stylized key into the letter 'T' of TANIA. This key should not only represent the traditional concept of encryption and security but also blend seamlessly with the modern and technological feel of quantum cryptography. (see picture attached) 3. **Style and Theme:** The overall style of the logo should be modern and sleek, reflecting the advanced and futu...

    $31 (Avg Bid)
    $31
    356 participaciones

    I'm seeking a skilled professional to create a solution designed specifically for encryption and decryption of cipher text. This cryptography project will focus strictly on the secure communication and data encryption of this particular type of text data. Ideal Skills and Experience: - Strong background in cryptography - Proven experience with cipher text - Familiarity with various encryption algorithms Please note, the specific algorithm to be used wasn't stated. However, your experience and advice will be crucial in determining the most suitable option. I would greatly value your expertise in suggesting the best route. Looking forward to your proposals.

    $20 (Avg Bid)
    $20 Oferta promedio
    1 ofertas
    Trophy icon Make a Linkedin cover photo for me Finalizado left

    ...Kafka CI/CD integration Databases: RDBMS (MySQL, PostgreSQL) NoSQL (MongoDB) Query optimization, ORM/ODM (SQLAlchemy, Mongoose) Data warehousing, Distributed systems Machine Learning: Deployment Pipelines, Production management Data and Model Pipelines Neural Networks, Deep Learning, Algorithms Applied ML, Network Models Cybersecurity: IDS, SIEM tools, Network Security Linux, Cloud Computing, Cryptography Risk and Incident Management Database security Data Analytics: Tableau, Data Visualization Predictive Modeling, Kaggle EDA, Regression Analysis Project Management, Communication Additional Skills: Docker containerization Cloud platforms (AWS, Azure, GCP) Version control (Git, GitHub) CI/CD tools (GitHub Actions) The cover photo should be stylish and depict me . I am a gen...

    $12 (Avg Bid)
    $12
    27 participaciones

    ...It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permission for, a “pairing” or “connecting” of devices each time they wish ...

    $892 (Avg Bid)
    $892 Oferta promedio
    50 ofertas

    I'm seeking a developer with strengths in cryptography, blockchain, and who is proficient in Solana to help me develop a decentralized wallet application. This wallet application should have the ability to: - Create and manage multiple wallets. - Send and receive cryptocurrency. - Provide a clear and detailed transaction history. - Execute multichain swapping of digital assets. - Handle 2 custom coins designed for our ecosystem. In addition to these functionalities, the app must run on both iOS and Android operating systems. Moreover, I'd like to collaborate with someone who has a knack for developing user-friendly interfaces. Your expertise can assist us in providing a seamless and engaging user experience. Finally, if you have previous experience in ICO website deve...

    $708 (Avg Bid)
    $708 Oferta promedio
    41 ofertas

    ...detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to embody the future project - H-index, CS Ranking(Computer Security and Cryptography) Given the long-term nature of this project, I'm looking for someone who is committed, reliable, and able to work independently. The selected professional will be expected to provide regular updates on their progress and deliver results in a timely manner. This opportunity is ideal for individuals who are passionate about cybersecurity and are looking for a challenging ...

    $1255 (Avg Bid)
    $1255 Oferta promedio
    9 ofertas

    We're looking for a programmer skilled in scraping and converting APIs into PHP or Python code (reverse engineering)! If you have the following skills, join us: 1. Proficiency in JavaScript: Ability to work with this popular programming language and fully interpret and modify codes. 2. Knowledge of Cryptography: Ability to understand and use cryptographic algorithms and methods to comprehend how data is encoded and to transform unencrypted data. 3. Familiarity with Progressive Web Apps (PWA): Deep understanding of PWA structure and methods to bypass installation on iOS. 4. Experience with network monitoring and traffic analysis software such as Fiddler: Ability to use these tools for analyzing network traffic and related information, including identifying and addressing PWA...

    $20 / hr (Avg Bid)
    Destacado
    $20 / hr Oferta promedio
    52 ofertas

    I'm searching for an experienced developer to create a crypto flash coin generation platform based on BEP20 or Binance n...Registration and Login: A robust system that guarantees seamless user registration and login. - Coin Generation Algorithm: Implement an algorithm that facilitates efficient and reliable generation of coins. - Wallet Integration: Integrate a user wallet into the platform for seamless transactions. The design of the platform should be minimalistic, clean, and user-friendly. Your knowledge in cryptography is highly desirable as the system needs to be secure and should employ cryptographic security measures to ensure the safety of transactions and user data. An appreciation for fintech and past experience in similar jobs will make you an ideal candidate fo...

    $918 (Avg Bid)
    $918 Oferta promedio
    3 ofertas

    As the owner of a web-based platform, I've encountered a troublesome problem concerning Google Pay integration. Specifically, the issue lies within cryptography - however, the exact aspect of cryptography posing the problem remains unclear due to lack of further information. Therefore, I need an expert who possesses a deep understanding of payment processing systems, particularly Google Pay, and who is proficient with cryptographic systems on the web platform. Your tasks will include the following, depending on the discovered problem: - Debugging and resolving encryption problems - Sorting out decryption issues - Overcoming challenges related to key generation and management Despite the puzzle-like nature of the job, a meticulous and patient troubleshooter with stro...

    $75 (Avg Bid)
    $75 Oferta promedio
    11 ofertas

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use t...

    $99 (Avg Bid)
    $99 Oferta promedio
    8 ofertas

    ...a web-based application for iot edge device that focuses on securing sensitive data and minimizing packet loss using forward error correction techniques. This project will be a great opportunity for you to apply your knowledge of cryptography and networking concepts. Key Requirements: - The main aim of the project is to secure sensitive data using ECC based elgamal. - need to integrate this with forward error correction algorithms like reed solomon, ldpc. -integrate this with web based chat application Ideal Skills and Experience: - Proficiency in cryptography and packet loss concepts of networking - Experience with web application development - Understanding of ECC and elgamal -strong in forward error correction algorithms - Strong programming skills in languages th...

    $128 (Avg Bid)
    $128 Oferta promedio
    2 ofertas

    I require a competent programmer to create a RSA (South African) drivers license decryption class library in C#. The library needs to take encoded strings (Barcode scan) as input and generate a decoded file as output. Key requirements: - Extensive experience with C# - Capability to handle encoded strings - Generate a decoded file ...required data. - The library need to work within a .NET Core 3.1 API. - A detailed explanation of how to use use this library needs to be provided. PLEASE NOTE: The focus is on creating a reliable and efficient library, hence a solid understanding of performance optimization is necessary. A strong grasp of cryptography, as well as drivers license formats would be beneficial.

    $143 (Avg Bid)
    $143 Oferta promedio
    25 ofertas

    I am seeking an expert in network simulation and coding to assist with my research project. My project is based on a computer network, WSN specifically, which needs to be accurately simulated and further customized. The network topology itself may be open to your suggestions, and I'm looking forward to discussing this in detail. Ideal Skills and Experience: - Expertise in Computer Network Simulation, specifically with NS2/NS3 - Strong coding skills to implement new variables into the simulation - Experience in research-oriented projects would be a plus. The successful completion of this project will involve developing a realistic network simulation, and then implementing custom variables to test specific research-related scenarios. The ability to create a detailed, effici...

    $222 (Avg Bid)
    $222 Oferta promedio
    4 ofertas

    To win this contest you will need to have 5 selected design related to "Zero-Knowledge Proof" or "ZK Proof" concept which is a Blockchain and Cryptography and Math related topic. So feel free to be creative and not just stick to simple typography. I am willing to purchase as many as 60 designs at the same rate, so we might get multiple winners or I will deal with you after the contest ends. Capitalisation: either "Zero-Knowledge Proof" or "ZERO-KNOWLEDGE PROOF" Here are the quotes you can choose from: Zero-Knowledge Proof: Because my secrets are too good to share. I'm like a Zero-Knowledge Proof — complex, mysterious, and verifiable Trust me, I'm a Zero-Knowledge Proof expert. No further questions, please. Zero-Knowledge ...

    $9 (Avg Bid)
    Garantizado
    $9
    272 participaciones

    I require an experienced cryptographer skilled in C programming for a unique assignment. This role involves developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The...

    $17 (Avg Bid)
    $17 Oferta promedio
    3 ofertas

    I'm seeking a researcher well-versed in cryptography for an advanced project targeting two specific areas: Symmetric and Asymmetric cryptography. Key responsibilities: - Detailed research into Symmetric and Asymmetric cryptography - Clearly convey advanced, complex cryptography concepts Ideal applicant: - Extensive experience with cryptography research - Ability to explain complex cryptography ideas to an advanced audience Please include your relevant experience in your application. Looking forward to potentially working together on this fascinating project.

    $114 (Avg Bid)
    $114 Oferta promedio
    35 ofertas

    ...and Application Middleware, PhoneGap/iOS/Android SDKs, CI/CD, etc. • Strong understanding of mobile and web application security concepts, session management, performance optimization, automated testing techniques, high availability engineering, and database technologies for mobile and web applications. • Familiarity with cryptography, key management, and security solutions on both mobile and server sides, including an understanding of security protocols and cryptography like PKI, SSL, RSA, authentication, encryption, and digital signatures. • Experience working with payment solutions, including mainframe environments, is advantageous. Additional Skills:- • Profound knowledge of emerging technologies and a strong grasp of how technology aligns ...

    $161 (Avg Bid)
    Local
    $161 Oferta promedio
    2 ofertas

    ...cybersecurity professional for mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience in cybersecurity, preferably with recognized companies. Pro...

    $11 - $18 / hr
    Destacado Sellado
    $11 - $18 / hr
    9 ofertas

    I need a professional progra...program. The problem lies in the document authentication process, specifically with reading the chip data of ID cards. The ideal candidate should have: - Proficiency in Java and experience with the jmrtd program - Prior experience dealing with document authentication, especially with ID cards - Strong problem-solving skills and ability to troubleshoot complex issues - Good understanding of cryptography and secure communication The main tasks in this project include: - Diagnosing the root cause of the issue when reading the chip data - Implementing a solution that ensures successful document authentication for ID cards - Testing the updated program to ensure it works as expected Your expertise and efficiency in resolving this issue will be highly ap...

    $116 (Avg Bid)
    $116 Oferta promedio
    11 ofertas

    I am seeking knowledgeable developers to construct a centralized cryptocurrency exchange with a comprehensive inclusion of Bitcoin, Ethereum, and Ripple. Key requirements for the task are: - Efficient Development: You should have a strong backgr...cyber threats, you'll need to harness your end-to-end cryptographic knowledge to ensure top-notch security measures. - Engaging User Interface: The ability to build an intuitive, easily navigable and engaging user interface is crucial. Proven experience designing user-friendly platforms is advantageous. The ideal candidate will have a blend of technical versatility in blockchain technology, cryptography, and platform interface design. A comprehensive understanding of commonly traded cryptocurrencies Bitcoin, Ethereum, and Ripple is...

    $19 / hr (Avg Bid)
    $19 / hr Oferta promedio
    15 ofertas

    ...functionality. - Provide comprehensive documentation and support resources for users, including tutorials, FAQs, and troubleshooting guides. **Key Requirements:** - Proven experience in developing cryptocurrency platforms or similar financial systems, with a focus on Bitcoin (BTC) transactions. - Expertise in relevant programming languages, frameworks, and technologies, such as blockchain development, cryptography, and secure web development. - Strong understanding of Bitcoin (BTC) protocol specifications, wallet management principles, and security best practices. - Effective communication skills and a collaborative approach to project management, including regular updates, feedback sessions, and milestone reviews. - Demonstrated ability to deliver high-quality projects on time ...

    $669 (Avg Bid)
    $669 Oferta promedio
    33 ofertas

    ...Processes - Handling Unix signals, processes, and threads management (fork, exec). Virtual Memory - Concepts, page tables, and memory management techniques. Caches - Understanding caching, memory hierarchy, and cache-related strategies. Synchronization and Deadlocks - Locks, mutexes, barriers, and deadlock prevention. Networking - IP, TCP, DNS, and secure channel foundations. Secure Channels and Cryptography - Fundamentals of secure communications, public key infrastructure. Pipelining and Processors - CPU pipelining, hazards, out-of-order execution. Out-of-Order Execution and Side Channels - Advanced CPU architecture features and security implications. Meltdown/Spectre - Discussing speculative execution vulnerabilities. Past final exam has been attached with this proposal. Plea...

    $128 (Avg Bid)
    $128 Oferta promedio
    8 ofertas

    I'm looking for a skilled researcher in the field of cryptography, specifically focused on Oblivious Transfer (OT). Find all OT extension implementations and compare them for efficiency and security (sometimes the security assumptions are different hence the security levels are also different. Efficiency can be compared in terms of average memory usage and average time required to complete one OT/OTe of same size in different libraries). Key Requirements: - Strong background in cryptography - Proven experience in conducting research within this field - Ability to evaluate security and efficiency of cryptographic libraries - Familiarity with the implementation of OT in different environments, particularly within OT libraries. The primary goal of this project is to prov...

    $87 (Avg Bid)
    $87 Oferta promedio
    8 ofertas

    ...problem-solving process. What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate ...

    $11 (Avg Bid)
    $11 Oferta promedio
    3 ofertas
    Cryptogrphy expert Finalizado left

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Oferta promedio
    12 ofertas

    I am looking for an expert in blockchain technology to create a Metamask wallet that supports the Ethereum network. This project will involve: - The core feature of sending and receiving ETH. This is a feat... - An integration with hardware wallets functionality. User security is paramount to this project. As such, the aim is to have our Metamask wallet integrate with hardware wallets, which is an advanced security measure. Successful implementation should ensure a higher level of safeguarding for Ethereum transactions. Ideal freelancer for this project should be well-versed in blockchain and cryptography, and have prior experience in creating and working with blockchain wallets, particularly Metamask. Knowledge of how to integrate wallets with hardware devices will be especial...

    $163 (Avg Bid)
    $163 Oferta promedio
    8 ofertas

    ...cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized for this prediction. - Successful prediction has potential for great gambling strategies. ## What YOU Can Do: - With your knowledge and experience in RNGs and cryptography, I am hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strat...

    $70 / hr (Avg Bid)
    $70 / hr Oferta promedio
    5 ofertas

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that i...hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the succes...

    $123 (Avg Bid)
    $123 Oferta promedio
    53 ofertas

    I'm looking for a skilled developer who can integrate Metamask and Phantom Wallet into my existing PHP script. The main objective is the implementation of sign-in functionalities using these crypto wallets. Key Responsibilities: - Integrate Metamask wallet into the PHP script - Integrate Phantom Wallet into the PHP script - Enable signing in via bo...freelancer for this task should possess: - Expertise in Blockchain technology - Proficiency in integrating wallet systems, specifically Metamask and Phantom wallet - Proficient knowledge of PHP scripting - Experience in implementing sign-in functionalities with Blockchain wallets will be a plus. Your role will be critical for the security and functionality of the project, thus understanding of cryptography and blockchain princ...

    $52 (Avg Bid)
    $52 Oferta promedio
    29 ofertas

    I'm seeking an adept Rust programmer who can assist me in creating a new application. This application's central function is to handle real-time data processing, specifically focusing on cryptocurrency data. Key responsibilities: - Develop a robust and efficient application in Rust - Integrate real-time data processing capabilities - Enable swift and accurate ha...data processing, specifically focusing on cryptocurrency data. Key responsibilities: - Develop a robust and efficient application in Rust - Integrate real-time data processing capabilities - Enable swift and accurate handling of crypto data The successful candidate should have: - Profound understanding of Rust programming language - Proven experience in real-time data processing - Strong cryptography and blo...

    $554 (Avg Bid)
    $554 Oferta promedio
    65 ofertas

    ...from first principles. Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the ...

    $13 / hr (Avg Bid)
    $13 / hr Oferta promedio
    7 ofertas

    ...without too much adaptation from what you’d need in other sectors. On the backend, Node.js, Go, Python, Scala and other languages will be valuable. Data analysis. The blockchain records a wealth of information, and if you have a background in data science you may be eligible for some of the top careers in cryptocurrency. Security and Cryptography. These skills will always be useful for any technical blockchain role. Experience in blockchain development, cryptography, and smart contract programming are essential. An understanding of staking mechanisms would also be beneficial. Please include any relevant examples of your past work within this field in your bid....

    $752 (Avg Bid)
    $752 Oferta promedio
    77 ofertas

    I'm urgently in need of a cyber security expert to guide me through my high-level educational assessments. Key Areas for Assistance: • Authentication • Access Control • Operating System Security • Vulnerabilities • Cryptography • Public Key Infrastructure • Threat Modelling Ideal Candidate Qualifications: • Demonstrated experience in network, information, and application security • Proven track record in dealing with the specified key areas • Ability to provide comprehensive, understandable guidance Please note that the timeline is critical and I need someone who can start immediately. Provide your experience and expertise in these areas. Looking forward to your bids.

    $87 (Avg Bid)
    $87 Oferta promedio
    28 ofertas

    I need an experienced Rust developer who can assist in designing, implementing, and testing smart contracts for an Automated Market Maker (AMM) on Solana. Key functionalities include: - Token Swapping: The primary feature we seek is a token swapping functionality. - Comprehensive Token Support: It's vital that our platform can support any Solana token withou...maker (AMM) concepts and protocols (e.g., Uniswap, SushiSwap). Ability to work independently and collaboratively in a fast-paced environment. Good communication skills and a proactive attitude towards problem-solving. Nice to Have: Previous experience working on decentralized finance (DeFi) projects. Knowledge of other programming languages such as Solidity, C++, or Python. Understanding of cryptography and cybersecur...

    $928 (Avg Bid)
    Acuerdo de Confidencialidad
    $928 Oferta promedio
    2 ofertas

    We are currently seeking a seasoned coder proficient in C, C++, and Assembler (x64) languages to assist wit...Demonstrable capabilities in new feature development. - Familiarity with system integration and modification. - Solid background in managing medium complexity tasks. - An in-depth understanding of operating system internals, especially Windows. - Knowledge of how different network protocols. - Experience in reverse engineering and familiarity with tools like IDA Pro, Ghidra, or OllyDbg. - Knowledge of cryptography and secure data handling. - Proven track record in exploit development and vulnerability research is a huge benefit. - A bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, OS...

    $23 / hr (Avg Bid)
    $23 / hr Oferta promedio
    15 ofertas

    ...to provide a secure and user-friendly solution that enhances privacy, eliminates the need for third-party intermediaries, and gives users full control over their personal data. Requirements: Proficiency in Blockchain Development: We're seeking a developer with expertise in blockchain technologies, including Ethereum, smart contracts, and decentralized applications (dApps). Familiarity with Cryptography: Knowledge of cryptographic principles and techniques is essential for this role, as our project involves implementing advanced security features to safeguard user data. Experience with Identity Management Systems: Previous experience working on identity management systems or related projects is highly desirable. Strong Problem-Solving Skills: The ability to tackle complex t...

    $2292 (Avg Bid)
    $2292 Oferta promedio
    86 ofertas

    I’m seeking a knowledgeable writer with considerable experience in cryptography, specifically in the area of symmetric key cryptography. Key Responsibilities: - Crafting a comprehensive paper on symmetric key cryptography - Ensuring content is engaging and accurate - Meeting strict deadlines ( 17/03/2024, 10 am) Ideal Candidate: - Has notable experience in symmetric key cryptography - Excellent writing skills, ability to distill complex concepts into digestible content - Previous work in this field will be advantageous. Kindly include these experiences in the application. Please, only come on board if you are confident in your ability to deliver compelling and informative content on Symmetric Key Cryptography. I'm looking forward to worki...

    $21 (Avg Bid)
    $21 Oferta promedio
    5 ofertas

    I'm looking for a talented developer who can bring my vision for a next-level messaging app to life. This isn't your basic communication application, and I want the additional features to reflect that. Key Deliverables: - A fully-functional messaging app for iOS and Android. - Full suit...calling. - Elevated security measures, such as end-to-end encryption to ensure privacy and protect user data. - Fun engagement features like a wide range of stickers and emojis. Your Experience: I'm ideally looking for someone who has experience in mobile app development, especially communication or social networking apps. Given the sensitive nature of messaging, hands-on experience with applied cryptography or related fields would really set you apart. Let's take messagi...

    $4677 (Avg Bid)
    $4677 Oferta promedio
    100 ofertas

    I'm in need of an expert in cryptography, specifically proficient in SHA256, to assist with a custom implementation of a decryption algorithm for data retrieval. The primary responsibilities for this role will include: - Decrypting the SHA256 algorithm with a specific iv and key. - Developing a capability for retrieving transactional data post decryption. - Ensuring the preservation of data integrity during the entire process. Ideal candidates should have experience in data decryption, knowledge of SHA256, and a proven history of successful implementation. The ability to handle confidential transactional data safely and comply with all data security standards is also necessary. This project demands attention to detail, precision, and robust understanding of cryptographic ...

    $47 (Avg Bid)
    $47 Oferta promedio
    4 ofertas

    ...- Testing and validating RNG algorithms to ensure their security and reliability - Collaborating with the development team to integrate RNG solutions into our blockchain platform - Monitoring and maintaining the performance of on-chain RNG systems - Keeping abreast of the latest developments in blockchain technology and RNG algorithms The ideal candidate will have: - A strong background in cryptography, blockchain technology, and RNG algorithms - Proficiency in programming languages such as Solidity, C++, or Python - Experience working with on-chain RNG solutions in a production environment - Excellent problem-solving skills and attention to detail - Strong communication and collaboration skills In return, we offer competitive compensation, a supportive work environment, and op...

    $36 / hr (Avg Bid)
    $36 / hr Oferta promedio
    28 ofertas

    I am a beginner in Capture The Flag (CTF) problem-solving, seeking expert assistance. Here are the specifics: - Challenge Categories: I'm mainly interested in understanding and solving problems related to Cryptography, Web Exploitation, and Binary Exploitation. - Programming Languages: The languages I am currently proficient in are Python and C++. Hence, any guidance needs to be provided considering these languages. It is essential for the freelancer to have substantial experience in CTF problem-solving across the specified categories along with proficiency in both Python and C++. Please make use of simple and easy-to-grasp terminologies, given my beginner status. Looking forward to broadening my knowledge base in this fascinating realm. i will give you the problem and you...

    $12 (Avg Bid)
    $12 Oferta promedio
    3 ofertas

    The purpose of this project is to evaluate the cryptographic algorithms of a set of generated numbers from a specific MATLAB software using the NIST SP 800-22 Diehard test. The key objective is to scrutinize the randomness of data produced by the software, in o...Processing a given set of numbers generated from MATLAB software. - Conducting Diehard tests to evaluate the cryptographic algorithms implemented. - Reporting findings in a clear, comprehensive manner. - Providing any insights or recommendations to improve cryptographic standards if needed. This project is aimed at statisticians, mathematicians, and data researchers with a keen interest in cryptography. Your analysis can play an instrumental role in enhancing the robustness of the cryptographic functions of this specific...

    $31 (Avg Bid)
    $31 Oferta promedio
    3 ofertas