Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,957 cryptography trabajos encontrados

    ...e and web-based consignment stores for selling luxury items. What i need: - Two-sided and decentralized marketplace, designed with a mix as a normal marketplace and a trading webpage - Bid-ask system, this facilitates a real time transaction allowing users to Buy and sell products - Blockchain software that store the product and transaction on a portfolio so that, by virtue of some clever cryptography, users have the credentials to transfer the ownership of the assets they own. Blockchain technology ensures a secure way to Buy-sell products - Tool that helps users and companies check and understand the price and demand trends of luxury items in the secondary market...

    $1776 Average bid
    Acuerdo de Confidencialidad
    $1776 Oferta promedio
    16 ofertas

    ...que tengo almacenados en un servidor,con un certificado que se seleccione desde el cliente y que este almacenado en su navegador.<br />El proyecto esta realizado en MVC spring, html5 y javascript en la parte cliente, y el controlado esta realizado en Java.<br />He visto librerias que permiten realizar este tipo de firma seleccionando un certificado del navegador(@firma , crypto Applet,  web cryptography api)<br /><br /> ...

    $244 Average bid
    $244 Oferta promedio
    1 ofertas
    Desarrollo de Software
    Finalizado left

    Estamos desarrollando un proyecto muy ionteresante y novedoso. Buscamos freelancers con conocimientos de informática en algunos de los siguientes conceptos. unbound, squid, ssl bump, suricata, snort (intrusiones), linux kernel, kernel security, hardening, cryptography, tor, i2p, decentralized, odroid, bash sed hawk.<br />Cuantos más conceptos domine, más interesante nos será su propuesta.

    $244 Average bid
    $244 Oferta promedio
    7 ofertas

    I'm seeking an expert to help solve some Capture The Flag (CTF) challenges related to cryptography. The challenges are in text file format and involve symmetric encryption, asymmetric encryption, and hash functions.

    $19 Average bid
    $19 Oferta promedio
    21 ofertas

    I need a blockchain-based application prototype focused on GDPR compliance. The goal is to develop a functional application that addresse...blockchain-based application prototype focused on GDPR compliance. The goal is to develop a functional application that addresses the following key functionalities: - Data Encryption and Anonymization - User Consent Management - Data Access and Portability Ideal skills and experience: - Strong background in blockchain technology - Experience with GDPR and data privacy regulations - Proficiency in cryptography and data security - Development skills for building decentralized applications (dApps) - Familiarity with user consent frameworks and data management protocols Looking for a candidate who can transform this research paper into a working ...

    $75 Average bid
    $75 Oferta promedio
    7 ofertas
    Monero Key Generation in PHP
    3 días left
    Verificado

    I'm looking for a freelancer to implement Monero key generation using pure PHP. The solution must be self-contained and should not rely on RPC, external services, or third-par...solution must be self-contained and should not rely on RPC, external services, or third-party libraries. Required Functionality: -Generation of private keys -Generation of public keys -Generation of mnemonic seed Optional but Preferred Features: -Password-based encryption of keys -Two-factor authentication -Checksum validation Ideal Candidate: -Strong expertise in PHP -Solid understanding of cryptography, especially related to Monero and the CryptoNote protocol -Familiarity with secure coding practices Please include a brief overview of your approach, expected deliverables, and estimated timeline in...

    $149 Average bid
    $149 Oferta promedio
    85 ofertas

    ...open ports or vulnerable services Send terminal logs and screenshots showing success per node --- Tech Stack / Dependencies (Installed via script) Layer Tools / Configurations OS Alpine Linux 3.18 (minimal) VPN WireGuard (mesh topology) Firewall iptables Privacy Layer TOR (for 5 worker nodes only, using v3 Hidden Services) Runtime Python 3.12 Core Packages uvicorn, fastapi, web3, redis, cryptography, requests, hdwallet, torpy, etc. Logging Custom encrypted logging via Fernet encryption Backup Mechanism rsync or SSH tunnel (production → backup every 6 hours) Networking Hardened DNS, disabled IPv6, strict WireGuard peer configs Security All processes run as non-root users, chmod restrictions, no public SSH All of the above will be preconfigured in the script bundle pr...

    $196 Average bid
    $196 Oferta promedio
    54 ofertas

    Seeking Cryptography Expert for Secure Protocol Project I’m developing a next-generation privacy-focused platform and need a skilled encryption architect to help design a hybrid encryption system for secure communication, storage, and identity. Key Objectives Build a modular, cross-platform encryption framework (web, mobile, desktop) Support end-to-end encrypted messaging, vault storage, and identity/auth flows Integrate decentralized identifiers and revocable access control Ideal Expertise Deep understanding of applied cryptography and hybrid encryption (e.g., Signal, OPAQUE) Experience building secure, scalable systems across platforms Familiarity with DIDs, access tokens, and secure key rotation This is a foundational role in a private, high-impact projec...

    $15 / hr Average bid
    $15 / hr Oferta promedio
    55 ofertas

    Job Title: Cryptography Developer (TFHE + Genetic Algorithm Optimization) Project Title: “Optimizing Torus Fully Homomorphic Encryption (TFHE) using Genetic Algorithm (TFHE+GA): An Indirect Approach” Project Overview: We are seeking a skilled and research-oriented developer to assist in the implementation and optimization of TFHE (Torus Fully Homomorphic Encryption) using Genetic Algorithm (GA) strategies. This role is part of a doctoral research project aimed at significantly improving bootstrapping performance, ciphertext size, and key sizes without compromising cryptographic security. Key Objectives: The developer will help achieve the following specific goals: a. Develop and evaluate GA-based strategies for optimizing the bootstrapping process in TFHE, targeting a...

    $492 Average bid
    $492 Oferta promedio
    47 ofertas

    POS System Integration with ZATCA Fatoora E-Invoicing Description: Hello, I am looking for an experienced developer or freelancer to integrate our existing POS (Point of Sale) system with the Saudi Arabia ZATCA (Zakat, Tax and Customs Authority) E-Invoicing sys...Reporting API Install and configure Digital Certificate (Cryptographic Stamp) for each invoice Implement QR code generation on POS invoices Perform integration testing in the Sandbox (test environment) Deploy final integration in the Production environment Requirements: Prior experience integrating with ZATCA Fatoora E-Invoicing (Phase 2) Strong knowledge of JSON APIs, digital certificates, and cryptography Understanding of Saudi VAT, tax, and invoicing regulations Experience in generating invoice QR codes and POS invoice ...

    $301 Average bid
    $301 Oferta promedio
    28 ofertas

    I need a Karnataka-based lecturer to create teaching videos for the following subjects: - R Programming (Lab and Theory) - Information Security and Cryptography - Cloud Computing - Business Intelligence Each subject will require approximately 40 hours of video content. Payment will be provided per subject. Ideal Skills and Experience: - Expertise in the listed subjects - Experience in video content creation - Teaching experience, preferably at a college or university level - Ability to explain complex concepts clearly and engagingly Please provide samples of previous work and a breakdown of your approach.

    $98 Average bid
    $98 Oferta promedio
    3 ofertas

    I'm seeking an expert to break an encryption code. Unfortunately, I don't have any details about the type of encryption used, nor do I have any information to provide. Ideal skills and experience include: - Expertise in various encryption methods - Strong analytical and problem-solving skills - Experience with cryptography and code-breaking - Ability to work with minimal information Please share your approach and any relevant experience.

    $10 Average bid
    $10 Oferta promedio
    6 ofertas

    I'm looking for an experienced Cyber Security and Ethical Hacking expert to mentor beginners in live interactive classes. Key Topics: - Network Security - Penetration Testing - Cryptography Ideal Skills and Experience: - Strong background in cyber security - Experience with interactive teaching formats - Ability to engage and educate beginners

    $282 Average bid
    $282 Oferta promedio
    8 ofertas

    ...calls) User wallet tracking, commission system All authentication and crypto operations must be secure and auditable You Will Be Provided: Full technical specification in PDF Folder structure, model list, and feature blueprint Support for planning the DB schema and route structure Wireframes or flow diagrams (optional) Skills Needed: Laravel (advanced level) Blade templating Secure PHP cryptography handling Experience with Monero wallet RPC Linux shell familiarity (PGP, gnupg) Clean code practices (no Laravel mix or JS bundlers) Bonus If You Have: Experience building darkweb or privacy marketplaces Familiarity with mnemonic/seed management Knowledge of crypto anonymity and security Security Is Everything This project prioritizes privacy, encryption, and no third-...

    $2995 Average bid
    $2995 Oferta promedio
    111 ofertas

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $28433 Average bid
    Acuerdo de Confidencialidad
    $28433 Oferta promedio
    20 ofertas

    I'm launching a startup focused on cryptography and security, specifically data encryption and cryptographic solutions. I'm looking for an experienced professional to: - Develop a comprehensive website (E-commerce, Informational/Blog, Portfolio/Showcase) - Design a modern, professional logo Ideal skills and experience: - Web development (security-focused is a plus) - Graphic design with a portfolio of logo designs - Experience in cryptography and security is a bonus

    $121 Average bid
    $121 Oferta promedio
    52 ofertas

    ...protocols. • Document architectural decisions, developer APIs, and technical documentation. Required Skills & Experience: • Strong experience in Go (Golang) or Rust (preferred languages for Cosmos SDK/Substrate). • 3–5+ years of blockchain development experience, preferably with custom chains (not just Solidity). • Deep understanding of: • Consensus algorithms (e.g., Tendermint, Aura, BABE) • Cryptography & key management • Blockchain state machines & tokenomics • Experience with Cosmos SDK, Substrate, or Tendermint Core. • Familiarity with gRPC, REST APIs, and tools like Docker, Kubernetes. • Experience integrating with frontend UIs and wallet providers. • Understanding of KYC/AML compliance, regulated fin...

    $308 Average bid
    $308 Oferta promedio
    10 ofertas

    I need a PKI or cryptography expert from the Philippines who can support both Windows and Linux. This is a lead role, so experience is crucial. Ideal skills include: PKI (Public key Infrastructure)/Cryptography exposure Windows Server OS or Linux IIS (Internet Information Services) PowerShell scripting Java scripting SQL database queries Network basics Tools and systems used to monitor network issues Experience in using Zendesk or any other Case management and reporting tools Python Bash commands Looking to hire ASAP.

    $2031 Average bid
    $2031 Oferta promedio
    2 ofertas

    ...System Architecture The application currently uses: Reflex framework for web development SQLModel/SQLAlchemy for database operations Local authentication system Models for UserInfo, AdminUser, CompanyData, and ContactEntry ___________________________________________________________________________________ Technical Requirements Required Skills Strong experience with zero-knowledge protocols and cryptography Proficiency in Python and modern web frameworks Experience with SQL databases and ORMs Understanding of secure key management Knowledge of end-to-end encryption implementation Specific Technologies Zero-knowledge proof systems (e.g., zk-SNARKs or zk-STARKs) Modern encryption libraries Secure key management solutions Database encryption tools Deliverables Detailed technical d...

    $229 Average bid
    $229 Oferta promedio
    59 ofertas

    ...feature extraction from live feeds Online learning with quantum models Adaptive algorithm selection based on market conditions Research & Development Requirements: Theoretical breakthroughs needed: Prove quantum advantage for specific financial problems Develop new quantum algorithms with exponential speedup Create error bounds for financial quantum calculations Design quantum-resistant cryptography for secure trading Experimental validation: Benchmark on real quantum hardware Compare with state-of-the-art classical methods Demonstrate practical speedup on real financial data Publish results in Nature, Science, or PRX Quantum Patent portfolio development: Core quantum algorithms for finance Hybrid orchestration techniques Error mitigation strategies Hardware-specif...

    $342700 Average bid
    $342700 Oferta promedio
    27 ofertas

    I need a comprehensive zero trust architecture incorporating post-quantum cryptography. The aim is to enhance our security measures, particularly in identity and access management, and to address critical network security concerns. Key requirements include: - Strengthening identity and access management to ensure only authorized users can access sensitive resources. - Implementing robust mechanisms for preventing unauthorized access, detecting and mitigating threats, and securing communication channels. Ideal skills and experience: - Expertise in post-quantum cryptography. - Proven experience in designing and implementing zero trust architectures. - Strong background in identity and access management systems. - Knowledge of advanced network security protocols and threat det...

    $321 Average bid
    $321 Oferta promedio
    8 ofertas

    I need a Python API that will encrypt passwords using the Fernet symmetric encryption algorithm from the `cryptography` library. Requirements: - The API will receive both plain text and hashed passwords as input. - The encrypted password should be returned as a Base64 encoded string. Ideal Skills and Experience: - Proficiency in Python - Experience with the `cryptography` library, especially Fernet - Familiarity with creating and deploying secure APIs - Understanding of encryption algorithms and secure password handling

    $68 Average bid
    $68 Oferta promedio
    24 ofertas
    iOS App Unit Testing
    Finalizado left

    I need unit tests written for an existing iOS app and its autofill credential provider. Full coverage. All methods must be covered. Requirements: - Use XCTest framework. - Focus...autofill credential provider. Full coverage. All methods must be covered. Requirements: - Use XCTest framework. - Focus on these main app functionalities: - User authentication - Data storage and retrieval - Cryptography (Passkey generation) - For autofill credential provider, cover: - Credential fetching - Credential saving - User interface interactions Ideal skills and experience: - Proficiency in XCTest and iOS app development - Experience with unit testing, especially in authentication and data handling - Strong understanding of cryptography and secure cred...

    $206 Average bid
    $206 Oferta promedio
    16 ofertas

    Looking for people for domain knowledge and ability to embark on the process of developing a cryptocurrency, the technician must have knowledge of: Fundamentals of Cryptocurrencies - Understand what cryptocurrencies are, how they work, main currencies (Bitcoin, Ethereum, etc.). - Know the concepts of blockchain, cryptography, public and private keys. 2. Blockchain and Registration Technology - Know how blockchain networks work, their types (public, private, permissioned). - Know consensus protocols (Proof of Work, Proof of Stake, etc.). 3. Digital Wallets (Wallets) - Configure, use and protect wallets of different types: hot wallets, cold wallets, hardware wallets. - Understand the importance of private key security. 4. Transactions and Smart Contracts - Execute an...

    $16111 Average bid
    $16111 Oferta promedio
    16 ofertas

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $11134 Average bid
    Acuerdo de Confidencialidad
    $11134 Oferta promedio
    38 ofertas

    I am looking for an experienced developer who can create a high-performance C++ application for generating cryptocurrency wallets based on specific criteria. The mai...performance (addresses/sec), session duration, and the number of generated wallets. 5. GPU Optimization: • Maximum utilization of GPU power (e.g., via CUDA or OpenCL) to accelerate generation. • Ability to control hardware load. The program must be capable of generating “vanity” wallets (addresses with custom patterns). I’m looking for a specialist with strong knowledge of blockchain architecture, cryptography, and experience with C++ and GPU computing. A user-friendly interface and Google Sheets integration are also important. There is also a Python example with configured filters that...

    $234 Average bid
    $234 Oferta promedio
    19 ofertas

    Job Title: Cryptography Developer (TFHE + Genetic Algorithm Optimization) Project Title: “Optimizing Torus Fully Homomorphic Encryption (TFHE) using Genetic Algorithm (TFHE+GA): An Indirect Approach” Project Overview: We seeking a skilled and research-oriented developer to assist in the simulation, implementation and optimization of TFHE (Torus Fully Homomorphic Encryption) using Genetic Algorithm (GA) strategies. This role is part of a doctoral research project aimed at significantly improving bootstrapping performance, ciphertext size, and key sizes without compromising cryptographic security. Key Objectives: The developer will help achieve the following specific goals: a. Develop and evaluate GA-based strategies for optimizing the bootstrapping process in TFHE, tar...

    $479 Average bid
    $479 Oferta promedio
    49 ofertas

    Por favor, regístrate o inicia sesión para ver los detalles.

    Destacado Sellado Acuerdo de Confidencialidad

    I'm looking for an experienced developer with expertise in post-quantum algorithms, specifically Crystal-Kyber, to build an Element app plugin based on our provided encryption algorithm. The ideal candidate should have: - Proficiency in post-quantum cryptography - Experience with Element app development - Strong programming skills, particularly in encryption-related applications Key tasks include: - Implementing provided encryption algorithm - Ensuring secure key exchange, and message encryption/decryption - Integrating seamlessly with Element app Please share relevant experience and approach.

    $178 Average bid
    $178 Oferta promedio
    28 ofertas

    I'm looking for an expert to help with cryptographic algorithms, specifically in homomorphic encryption and attribute-based encryption (ABE). Also, MPC and secret sharing. The algorithms will be used for sec...cryptographic algorithms, specifically in homomorphic encryption and attribute-based encryption (ABE). Also, MPC and secret sharing. The algorithms will be used for secure computation. Key Requirements: - Expertise in homomorphic encryption and ABE - Experience in developing cryptographic algorithms - Strong background in secure computation techniques Ideal Skills and Experience: - Advanced degree in cryptography or related field - Proven track record in developing and implementing cryptographic protocols - Familiarity with current trends and research in homomorphic enc...

    $21 / hr Average bid
    $21 / hr Oferta promedio
    40 ofertas

    ...integrate Bitcoin into traditional financial markets and make it more accessible to retail investors. However, Bitcoin must continue to navigate regulatory hurdles, technical challenges, and competition from other cryptocurrencies like Ethereum, Solana, and central bank digital currencies (CBDCs). Conclusion Bitcoin has come a long way since its creation in 2009. From a radical idea in a cryptography forum to a trillion-dollar asset class, it has challenged our understanding of money, trust, and value. Whether it becomes a universally adopted currency or remains a niche investment asset, Bitcoin has already left an indelible mark on the world. Its journey is a testament to the power of decentralized innovation, and its future—though uncertain—remains one of the mo...

    $914 Average bid
    $914 Oferta promedio
    50 ofertas

    Total Budget: USD $25,000.+ Platform OMNI - This is a five phase project with technologies that include: 3D AI ARCore ARKit Augmented Reality (AR) Barcode Blockchain CAD Computervision Database Digital Rights Management (DRM) E-commerce Email Encryption / Cryptography Exchanges / Marketplaces GPS IP Addressing NFT Optical Character Recognition (OCR) Photogrammetry POS Terminal QR Code RFID Sensors Smart Contracts SMS Virtual Reality (VR) You will start with Phase I - AI-Powered Creator Duplication Platform Project overview Develop a full-stack, AI-driven application that enables creators to create lifelike AI duplication using multimedia uploads, integrated with social media, for dynamic interaction and monetization. Requirements for Phase I:...

    $20256 Average bid
    $20256 Oferta promedio
    52 ofertas

    ...administrators; technical and user documentation in Brazilian Portuguese. **Essential Skills:** * Experience in complex, integrated management systems (ERP/CRM). * Knowledge of software architecture, full-stack development, databases. * Experience with systems integration, APIs, web services. * Practical knowledge of AI/Machine Learning for business. * Expertise in information security, cryptography, access control. * Experience with banking integration. * Ability to translate business requirements into technical solutions. * Excellent communication and project management skills. * **Fluency in Brazilian Portuguese is essential (communication, documentation, support).** **Additional Information:** Seeking a long-term partnership. Proposals should detail metho...

    $93 Average bid
    $93 Oferta promedio
    4 ofertas

    I'm seeking a skilled developer or cryptography expert to analyze and decode an encrypted QR code found on a ticket. The QR code is likely encrypted using the VDV barcode standard or a related secure format (e.g., UIC 918.3). Requirements: - Primary goal: Extract personal information (e.g., name, ID) from the QR code. - Access to relevant documentation on VDV barcode standard or UIC 918.3 will be provided. - Deliverables: A detailed report on the decoding process, along with the extracted data. Ideal Skills and Experience: - Expertise in cryptography and data decryption - Familiarity with barcode standards, particularly VDV and UIC - Strong analytical skills - Ability to produce comprehensive technical reports

    $25 Average bid
    $25 Oferta promedio
    18 ofertas

    I need help breaking an LFSR (Linear Feedback Shift Register) algorithm to predict simulated decimal numbers. We aim to improve our understanding of cryptography and LFSR. Requirements: - Analyzing decimal number sequences. - Knowledge of LFSR and prediction techniques. - Experience with Python or MATLAB is a plus, but not required. Ideal Skills: - Cryptography and algorithm analysis - Data analysis and manipulation - STM32 data handling This project is mainly for educational purposes, focusing on LFSR and cryptography. - Having FPGA verilog/vhdl coding skills may also be a necessary condition. If the bruteforce method is to be applied, scanning the bruteforce code with the FPGA can be completed immediately with parallel processing on your own FPGA, as it will take ...

    $148 Average bid
    $148 Oferta promedio
    28 ofertas

    ...a focus on AI-driven anomaly detection. Key Areas of Focus: - Security level - Adaptability to new threats (primary emphasis) - Implementation complexity - Cost efficiency Defense Mechanisms to Evaluate: - AI-driven anomaly detection - Blockchain-based identity verification - Biometric liveness detection - Cryptographic authentication Emerging Technologies to Explore: - Quantum-resistant cryptography - Real-time AI-based threat mitigation (primary emphasis) - Advanced machine learning models The final deliverable should highlight the effectiveness of different approaches and underscore the necessity for multi-layered security frameworks against evolving spoofing tactics. Ideal candidates should possess strong expertise in cybersecurity, particularly in spoofing attacks and d...

    $89 Average bid
    $89 Oferta promedio
    6 ofertas

    ...Part-Time .NET Developer with strong expertise in C#, .NET, .NET Core, and a solid understanding of Cryptography and Blockchain technologies. Key Responsibilities: , develop, and maintain applications using C# and .NET Core. secure coding practices and encryption techniques. Blockchain components (smart contracts, blockchain APIs, decentralized applications). with our internal team to understand requirements and deliver scalable solutions. and troubleshoot issues related to cryptographic processes and blockchain integration. Required Skills: hands-on experience with C#, .NET Framework, and .NET Core. 2.In-depth understanding of Cryptography principles (encryption, hashing, digital signatures, etc.). with Blockchain development

    $6 / hr Average bid
    $6 / hr Oferta promedio
    53 ofertas

    ...hardware design. The core of the project leverages **Radix-8 Booth encoding** to optimize the multiplier's performance in terms of **power consumption**, **delay**, **hardware area**, and **operational range**, compared to traditional methods. The design will be implemented on a **Xilinx Artix-7 FPGA** and evaluated using **Xilinx ise 14.7* tools. This project is aimed at applications in **cryptography** and **modular arithmetic** operations, where fast and resource-efficient modular multiplication is crucial. I am seeking a skilled **FPGA/Verilog/VHDL designer** with strong experience in: - Verilog HDL coding (or VHDL if preferred, but Verilog is a plus) - Radix- 8 Booth Encoding multipliers - Modular Arithmetic, especially Modulo (2ⁿ ± 1) systems - FPGA re...

    $139 Average bid
    $139 Oferta promedio
    12 ofertas

    I need an APA-format paper on the technical aspects of two-key encryption. Requirements: - Abstract, Introduction, Literature Review, Body, Conclusion, References sections - High-level explanations instead of detailed mathematical formulas Ideal skills and experience: - Expertise in cryptography and encryption methods - Experience writing academic papers in APA format - Ability to synthesize technical information into high-level summaries

    $13 / hr Average bid
    $13 / hr Oferta promedio
    42 ofertas

    C# Developer – Quantum-Safe Cryptography & Blockchain (Full-Time / Part-Time) Location: Remote (with some overlap in [insert preferred time zone]) Open to full-time or part-time engagements About the Role: We're looking for an experienced C# developer with a strong understanding of cryptography and blockchain architecture, particularly with interest or experience in quantum-safe (post-quantum) cryptographic algorithms. You’ll help design, implement, and integrate future-proof cryptographic solutions into our blockchain-based systems using .NET technologies. Key Responsibilities: Implement and integrate post-quantum cryptographic algorithms into blockchain components Extend blockchain modules (e.g., wallets, smart contract layers) with C#/.NET Ensure ...

    $12 / hr Average bid
    $12 / hr Oferta promedio
    7 ofertas

    I need a developer experienced in cryptographic signature verification with Crypto++. The project involves creating two C++ applications (signer and verifier) on Linux. Key Requirements: - Generate RSA public-private key pair (4096 bits) - Digitally sign a shared se...in cryptographic signature verification with Crypto++. The project involves creating two C++ applications (signer and verifier) on Linux. Key Requirements: - Generate RSA public-private key pair (4096 bits) - Digitally sign a shared secret with the private key - Validate the signature using the public key, signature, and shared secret Ideal Skills: - Proficient in C++ - Strong background in cryptography, especially RSA and Crypto++ - Experience developing applications on Linux Please provide relevant experience in ...

    $22 Average bid
    $22 Oferta promedio
    9 ofertas

    Project Title: ...Brute-force protection analysis Cross-device compatibility (Android 10+/iOS 15+) Certifications: NXP NTAG 424 DNA validation GDPR/CCPA compliance documentation Deliverables Full source code with documentation Signed APK (Android) & IPA (iOS) Technical implementation guide Developer Requirements Must Have: 3+ years mobile development experience Portfolio of NFC/security-focused apps AES/Java Cryptography Architecture expertise Experience with NTAG 424 DNA or similar secure tags FAQ Q: Can we use hybrid encryption? A: No - PIN-derived symmetric encryption only per spec Q: Support for other NFC tags? A: Only NTAG 424 DNA required Q: Cross-platform vs native? A: Developer's choice but must justify approach Project Terms Timeline: 10 days Total...

    $107 Average bid
    $107 Oferta promedio
    86 ofertas

    I'm seeking a seasoned Perl developer to set up encrypted serial communication with an ITL Smart Hopper device. The communication will be via a USB-to-serial interface, and the task in...managing encrypted exchanges, including key negotiation and sequence bit handling. Key Responsibilities: - Implement secure data transmission - Handle command and response interactions - Facilitate data encryption and decryption Ideal Candidate: - Proficient in Perl programming - Experienced with serial communication (RS232/USB) - Skilled in binary data handling within Perl - Knowledgeable in cryptography - Familiar with the SSP/eSSP protocol and ITL devices (highly preferred) - Able to deliver clean, well-documented code We will supply the necessary protocol documentation and a remote testi...

    $186 Average bid
    $186 Oferta promedio
    6 ofertas

    I'm looking for a skilled developer to create an API that will enable RSA encryption of personal identification data from my Microsoft Access application. The interaction with the API will be done directly through VBA code. The encrypted output should be a Base64 encoded string. Key Requirements: - Proficiency in creating APIs and working with Microsoft Access - In-depth understanding of RSA cryptography - Familiarity with VBA coding - Ability to output in Base64 encoded string format Ideal candidates will have practical experience with similar projects and a strong background in data security and encryption.

    $283 - $850
    Sellado
    $283 - $850
    32 ofertas

    ...NASA's communications with space missions. The puzzle should be designed for children aged 6 to 12, making it a fun and educational challenge. Key Requirements: - The puzzle should be in a printable PDF format. - The difficulty level should be appropriate for 6 to 12 year olds. - Basic math should be used as the cryptography method. Ideal Skills: - Experience in creating educational content for children. - Strong understanding of basic mathematics and cryptography. - Proficiency in designing printable PDF content. I would like the answer to the cryptogram to be Tidbinbilla helps NASA talk to space missions. It is one of three stations that communicate with spacecraft. I have attached a screenshot of the style i am after. needs to be in black ...

    $32 Average bid
    Destacado Urgente Garantizado Concurso principal
    $32
    120 participaciones

    I have a proven concept of blockchain like consensus mechanism and it can scale the entire industry. I need someone who understands mathematics, cryptography, blockchain, developing and looking for founders as well to build this. I think it’s the best invention since Bitcoin.

    $74853 Average bid
    $74853 Oferta promedio
    32 ofertas

    I need a crypto specialist who can help with cryptocurrency analysis and withdrawals. Metamask. TrustWallet. Fake brokers - Main task: to help withdraw my cryptocurrencies, which I myself do not encounter - Specific skills: cryptanalysis, breaking cryptography algorithms, identifying protocol gaps - Ideal candidate: An experienced specialist with experience in the field of cryptocurrencies and able to ensure data protection and secure communication. I am looking for a reliable and professional specialist who is able to help me in this difficult situation. Russian. English (translator)Latvian, Better: email,WhatsApp,FB.

    $34 - $279
    Sellado
    $34 - $279
    15 ofertas

    I am seeking a highly skilled and experienced cryptography expert to assist with various aspects of my project. The specific requirements will be determined as the project progresses, but may involve: - Developing or implementing encryption/decryption methods - Creating or analyzing cryptographic protocols - Conducting cryptanalysis to test the strength of our systems Your expertise will be crucial in ensuring the security and integrity of our communications and data. Please be prepared to demonstrate your knowledge of various cryptographic algorithms and your ability to select the most appropriate for our needs. Skills in secure communication, data protection, and blockchain development are also highly desirable.

    $129 Average bid
    $129 Oferta promedio
    33 ofertas

    Principales artículos de la comunidad cryptography