Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    1,351 hashing trabajados encontrados, precios en USD
    Trabajo Hashing Finalizado left

    Hola, buenas noches Necesitaría tener un ejercicio de Hashing de Algoritmia. La fecha límite sería hasta el lunes 1 de septiembre hasta las 15:00. La descripción del ejercicio la adjunto aun así la pongo por aquí: 1. Hashing. Se desea implementar un buscador de documentos de manera que al introducir una palabra de búsqueda nos devuelva el nombre de todos los documentos donde aparece esa palabra (no debe devolver el documento completo, sólo el nombre del documento). La implementación debe realizarse usando obligatoriamente una tabla hash y de dos maneras diferentes como se indica a continuación: i. Gestionando las colisiones mediante una técnica de direccionamiento cerrado a elegir por...

    $27 (Avg Bid)
    Urgente
    $27 Oferta promedio
    2 ofertas

    ...skilled Laravel developer to carry out an essential task—resetting the Admin Panel password for my Laravel 6.0 website. Key Tasks: -ensuring the new password gets hashed securely -standard password reset procedure, maintaining existing encryption methods as I'm uncertain of the specific encryption standard used. Requirements: - Expertise in Laravel 6.0 - Experience with standard Laravel password hashing - Exceptional problem solving, particularly in cases with limited source information - Intermediate understanding of Laravel's native or custom password encryption standards beneficial. Backup files for the Laravel project are available. It is imperative to maintain the confidentiality of all information gained while working on this project. Note: all work mus...

    $30 (Avg Bid)
    $30 Oferta promedio
    15 ofertas

    ...meter to discourage trivial modifications of weak passwords. - Display warnings for passwords that exceed the maximum length without truncation. - Implement an "eye" icon for toggling password visibility. Security Enhancements: - Check passwords against a list of breached passwords and prompt users to change them if matched. - Use Argon2 for password hashing with a unique salt for each password. - Integrate an additional HMAC layer for hashing with a highly secure secret salt. - Implement two-factor authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session r...

    $24 (Avg Bid)
    $24 Oferta promedio
    33 ofertas

    ...What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the tas...

    $11 (Avg Bid)
    $11 Oferta promedio
    3 ofertas

    ...(ORM). ? Pydantic, used by FastAPI, for the data validation and settings management. ? PostgreSQL as the SQL database. ? React for the frontend. ? Using TypeScript, hooks, Vite, and other parts of a modern frontend stack. ? Chakra UI for the frontend components. ? An automatically generated frontend client. ? Dark mode support. ? Docker Compose for development and production. ? Secure password hashing by default. ? JWT token authentication. ? Email based password recovery. ✅ Tests with Pytest. ? Traefik as a reverse proxy / load balancer. ? Deployment instructions using Docker Compose, including how to set up a frontend Traefik proxy to handle automatic HTTPS certificates. ? CI (continuous integration) and CD (continuous deployment) based on GitHub Actions....

    $177 (Avg Bid)
    $177 Oferta promedio
    74 ofertas

    ...I have not much time to do it myself. Key Project Requirements: - Version Control: Git - Database Connection: MySQL - Functionality: User registration and login, product catalog management (store, fetch, and modify products in the database) - Use of Design Patterns: Singleton, Observer, MVC, and any others you feel are necessary Additional Skills and Experience: - JUnit - Netbeans - Password hashing techniques (if time permits, otherwise store passwords as plaintext.) - Experience with implementing design patterns in Java applications - Proficiency in MySQL and database management Please provide examples of similar projects you've completed in the past. Prior experience with e-commerce applications is a plus. PLEASE REFER TO FOR DETAILED INSTRUCTIONS. I have prepared 3

    $129 (Avg Bid)
    $129 Oferta promedio
    10 ofertas

    I am currently using Google Cloud Platform (GCP) and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked ...

    $145 (Avg Bid)
    $145 Oferta promedio
    18 ofertas

    ...in. Python might work or some sort of hashing algorithm. It will need a user front end also. Basically I need to Generate a Private Key (HEX) from a public Bitcoin Address from a Private Key Range (Bits). For instance I need to generate a Private Key (HEX) from the Private Key Range (Bits) from the Start key in HEX format of a user inputed minimum range of say - 0000000000000000000000000000000000000000000000020000000000000000 to the End key in HEX format of say - 000000000000000000000000000000000000000000000003ffffffffffffffff for the bitcoin wallet address of for example - 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so Please send my 2 attached documents - PROJECT BRIEF and Bitcoin Private Key Finder website layout You will need bitcoin knowledge and hashing/algorithm knowledge ...

    $706 (Avg Bid)
    $706 Oferta promedio
    49 ofertas

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but w...currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security...

    $13 (Avg Bid)
    $13 Oferta promedio
    26 ofertas

    ...Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the chall...

    $13 / hr (Avg Bid)
    $13 / hr Oferta promedio
    7 ofertas

    I am looking to enhance the security level and add features to my current Payten payment gateway through PHP. This gateway is functionally intact yet bordering obsolescence. Our ideal candidate should have substantial experience with Payten, PHP, and secure payment gateways. The scope of work involves: -Upgrading Payten to the latest standard hashing algorithm (SHA3) -Addition or improvement of specific features, which will be disclosed further during the discussions. Proficiency in PHP and a solid understanding of secure payment gateways is desirable. The intended applicant needs to have prior experience with Payten to be considered. I am open to additional recommendations to future-proof our payment gateway. The amount you bid is what I will accept! after bidding I will not si...

    $176 (Avg Bid)
    $176 Oferta promedio
    61 ofertas

    I'm seeking a proficient C# developer, who's skilled in creatin...applications. My project specifically requires the development of an application utilizing algorithms, data structures along with MVC and WPF. • You'll be implementing a MVC structure which should include user authentication, efficient database interaction, and dynamic webpage creation. Ideal Skills: • Mastery in C# • Extensive experience with MVC and WPF • Knowledge about sorting, graph, and hashing algorithms is preferred but not mandatory • Strong understanding of database interactions • Reliable in creating dynamic web pages. Please note, being detail-oriented and capability of effective workflow management is also expected for seamless project execution. Look...

    $161 (Avg Bid)
    $161 Oferta promedio
    51 ofertas

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 addresses, need code in python to exlpain the encoding / decoding of the address, all steps, all code need commenting As someone committed t...handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational spirit, I'd love to learn under your guidanc...

    $134 (Avg Bid)
    $134 Oferta promedio
    2 ofertas

    I'm looking for a prof...them, focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    $165 (Avg Bid)
    $165 Oferta promedio
    27 ofertas

    I'm looking for a skilled and experienced specialist in JavaScript programming and encryption for a specific task. Your mission will be to simulate an encryption function from another website. Here are the project specifics: - Deep understanding of encryption is mandatory. You need to be conversant with different types of encryption like symmetric, asymmetric, and hashing. For this project, we're particularly interested in custom encryption. - You'll have to work on the encryption algorithm and the custom encryption specification. - Familiarity with common web technologies and encryption libraries would be beneficial. Ideal Skills: - JavaScript - Custom Encryption - Algorithm implementation This project requires a person with an eye for detail and an ability to del...

    $346 (Avg Bid)
    $346 Oferta promedio
    29 ofertas

    Hello prospective bidders, I am in need of a crypto expert that can assist me in implementing encryption, decryption, and hashing principles to my project. About the Project: - Specific cryptographic services required include Encryption, Decryption, and Hashing. - I believe understanding the balance between security and performance is vital, as we wouldn't want to sacrifice one for the other. - The main platforms for applying these services need to run on HackerRank. Requirements: - Demonstrable knowledge on encryption, decryption and hashing principles. - Prior experience in implementing cryptographic services on web-based platforms and HackerRank. - Medium to high understanding of cyber security principles. - Good communication and problem-solving skills. ...

    $14 (Avg Bid)
    $14 Oferta promedio
    3 ofertas
    $6 Oferta promedio
    1 ofertas

    Create a new .net 7.0 application that will fully i...the protocol LNURL-auth. The following functions of LNURL-auth need to be implemented: -register -login -link -auth Documentation for LNURL-auth can be found here: Please read the documentation and make sure you fully understand the project before applying. To apply, please type what the sha256 of "helloworld" is to show you know knowledge of hashing, and please type the last sentence of the documentation to show you have read it fully. A linux machine will be given that ready for you to deploy to. The database will be sql server. **Ideal Skills and Experience:** - Proficient in .NET 7.0 framework. - Strong background in developing authentication systems. - Python experience is a plus

    $211 (Avg Bid)
    $211 Oferta promedio
    30 ofertas

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $150 (Avg Bid)
    $150 Oferta promedio
    6 ofertas

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $110 (Avg Bid)
    $110 Oferta promedio
    5 ofertas

    I need a Windows, iOS and anndroid/iphone application developed using C# and perhaps flutter for the mobile app. The application should possess specific features that secure the system. The end point protection app would work as a whitelist and block everything else from installing/running. This would work by hashing files and checking against a database of known safe apps. Apps should also be able to be ring fenced ie. not able to escalate permissions of run other apps for services from within, or make internet traffic etc. You can see an end point protection example called threatlocker.

    $2694 (Avg Bid)
    $2694 Oferta promedio
    70 ofertas

    ...calculation formulas for cryptocurrency mining This is current result and formula I have for BTC (but its wrong): Certainly! Here is the information presented in regular text: Certainly, here is a general formula for calculating the daily mining yield for an Antminer S9, with the data filled in: Mining Yield = (Hashing Power * Block Reward * 86400) / (Network Hashrate * (1 - Mining Pool Fee)) - (Power Consumption * 24 * Cost Per kWh) Here are the filled-in data for an Antminer S9: - Hashing Power: 13.5 TH/s (Terahashes per second) - Block Reward: 6.25 BTC (Bitcoin) - Network Hashrate: (current network hashrate of Bitcoin) - Mining Pool Fee: (fee charged by the mining pool) - Power Consumption: 1350 W (Watts) - Cost Per kWh: (electricity cost per kilowatt-hour) Pleas...

    $607 (Avg Bid)
    $607 Oferta promedio
    5 ofertas

    ...calculation formulas for cryptocurrency mining This is current result and formula I have for BTC (but its wrong): Certainly! Here is the information presented in regular text: Certainly, here is a general formula for calculating the daily mining yield for an Antminer S9, with the data filled in: Mining Yield = (Hashing Power * Block Reward * 86400) / (Network Hashrate * (1 - Mining Pool Fee)) - (Power Consumption * 24 * Cost Per kWh) Here are the filled-in data for an Antminer S9: - Hashing Power: 13.5 TH/s (Terahashes per second) - Block Reward: 6.25 BTC (Bitcoin) - Network Hashrate: (current network hashrate of Bitcoin) - Mining Pool Fee: (fee charged by the mining pool) - Power Consumption: 1350 W (Watts) - Cost Per kWh: (electricity cost per kilowatt-hour) Pleas...

    $20 (Avg Bid)
    $20 Oferta promedio
    1 ofertas

    I'm looking for a professional developer who would be able to create price-comprising (like ) applications using Flask. The application should contain the following features: - Login - Register - Hashing user's data - Searching results sort - Search filters - Email verification by code - The project must be developed in Python, with use of HTML, JS and SQL - It should manifest as a web application. - Flask is the chosen web framework. You will also have to write a report for in format below :// ://

    $157 (Avg Bid)
    $157 Oferta promedio
    35 ofertas

    Im looking for a mathematician expert to help me create a hash. The idea is that a string is converted into ASCII Keys. These ASCII keys are then combined to create a number in scientific notation. Then essentially we need to redefine the keys using the sceintific notation number.

    $11 (Avg Bid)
    $11 Oferta promedio
    9 ofertas

    ...This feature is crucial as it will be the first point of interaction for users before they can access the exclusive features of our app. Key responsibilities include: - Collecting specific user information including username, password, account name, and email during registration. - Implementing password security. You'll need to apply a hashing process to password security in the registration process. Experience in password security and knowledge on hashing are must-haves. The ideal candidate should have previous experience in developing a secure and efficient registration process, particularly for React web apps backed by PostgreSQL. Strong knowledge of user authentication and data security is essential. ==== React Admin Theme:

    $18 / hr (Avg Bid)
    $18 / hr Oferta promedio
    46 ofertas

    Seeking freelance software developer for decentralised web app project. Skills needed: - Experience with React and Node.js - Strong understanding of REST APIs, - Working knowledge of IPFS or similar decentralised storage - Implementing end-to-end encryption, SSL/TLS - Data security concepts - hashing, key management - Containerisation with Docker, Kubernetes basics - Experience with CI/CD pipelines, Git workflows - Ability to write tested, maintainable code - Passion for privacy-focused technologies This is an opportunity to work on an innovative decentralised platform built for security and customisation. Looking for an expert in modern web app stacks with interest in emerging tech like IPFS and encryption. Please send a portfolio/resume if you have the required skills and are

    $2496 (Avg Bid)
    $2496 Oferta promedio
    33 ofertas

    I am looking for a developer to assist with 2x way data communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything tog...am looking for a developer to assist with 2x way data communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything together and ensure all code works for all test cases. AES256 is used for encryption algorithm, while the HmacSHA256 for hashing algorithm. Key requirements: - Good understanding of ESP32 MCU, Python, and JavaScript - Good understanding of data encryption, decryption and hashing techniques, particularly using AES256 & HmacSHA256 It is a small project needs to be completed...

    $63 (Avg Bid)
    $63 Oferta promedio
    9 ofertas

    ...network of existing blockchains. This is why it is said that the blockchain network is an immutable technology. Debugging will consist of creating and deploying a brand new smart contract on the blockchain. It turns out that a developer is required here even more than at the start, because blockchain debugging requires carrying out an audit of your first smart contract. Just use the correct hashing algorithms and follow the steps outlined. If you are an experienced developer, you should be able to create your own blockchain. With a good server and plenty of time, you should get there. You will quickly realize, however, that creating a blockchain is not the most difficult challenge to overcome in the long term. Indeed, one thing is to create your blockchain network, the other is...

    $750 - $1500
    Sellado
    $750 - $1500
    21 ofertas
    Web developer Finalizado left

    I am looking for a web developer to create a custom-built website for me. The website will require a login authentication page for user registration. Key functionalities that I want on the website include: - User registration functionality Ideal skills and experience for this job: Frontend should be made with react and password hashing using python hashlib and database sqllite Please provide examples of previous custom website development projects you have worked on

    $41 (Avg Bid)
    $41 Oferta promedio
    29 ofertas

    I am looking for a JavaScript developer to create a unique hashing function. This function needs to return an input that is hashed in hex format with 64 characters long. The hash must come with a decryption function.

    $17 (Avg Bid)
    $17 Oferta promedio
    25 ofertas

    ...ensure alignment with solution goals. Collaborate with project managers and developers to guide development processes in line with solution requirements. Ensure solutions are scalable and adaptable for future modifications, considering the organization's goals. Qualifications And Experience Minimum 4 yrs+ experience with snowflake- snowflake SQL, Snow pipe, streams, Stored procedure, Task, Hashing, Row Level Security, Time Travel etc. Proficiency in SQL, data structures, and database design principles. Strong experience in ETL or ELT Data Pipelines and various aspects, terminologies with Pure SQL like SCD Dimensions, Delta Processing etc. 3+ years of Experience of working with AWS cloud services- S3, Lambda, Glue, Athena, IAM, CloudWatch, Redshift etc. 5+ years of p...

    $9022 (Avg Bid)
    $9022 Oferta promedio
    2 ofertas

    ...Responsibilities: Design and develop a complex application using Java, Spring Boot, and React. Backend Development:Implement User Management using Spring Security. Develop features using JPA, native queries, DTOs, and Model Mapper. Knowledge of working with session management in Spring. Payment integration (e.g., Stripe). Incorporate Kafka and Redis for relevant modules. Ensure robust security with password hashing using bcrypt. Document the API using Swagger. Implement JUnit testing and demonstrate integration testing. Follow TDD/BDD methodologies. Build dynamic UI components using React features like JSX, useState, useEffect, useContext, useReducer, and React Router. Focus on responsive design using CSS flexbox and grid. Include State management with React Redux. CI/CD using Je...

    $511 (Avg Bid)
    $511 Oferta promedio
    30 ofertas

    Project Details 1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. J...

    $576 (Avg Bid)
    $576 Oferta promedio
    73 ofertas

    DSA Expert Needed for Beginner Level Problems I am in need of a DSA expert who has hands-on experience with various data structures and algorithms. I require assistance with the following specific areas: - Arrays and Lists - Trees and Graphs - Hashing and Sorting I have specific problems and challenges related to DSA that I need help with. The complexity level of the problems is beginner. Ideal Skills and Experience: - Strong understanding of data structures and algorithms - Proficiency in working with arrays, lists, trees, graphs, hashing, and sorting - Ability to solve beginner level DSA problems - Experience in providing clear explanations and guidance for DSA concepts - Excellent communication skills to effectively communicate and explain solutions If you are a DSA ...

    $597 (Avg Bid)
    $597 Oferta promedio
    15 ofertas

    I am looking for a skilled freelancer to develop a Diffie-Hellman Calculator with specific functionality including encryption and decryption capabilities. (Python programming language)) The project also requires the development of an MD5 Hashing Calculator that can both generate and verify hashes. Additionally, I need a user-friendly interface with a 2D visualization and animation feature. Skills and experience needed for this project: - understanding of encryption and decryption algorithms or using existing ones - Proficiency in MD5 hashing algorithms - Experience in developing user-friendly interfaces - Proficiency in 2D visualization and animation techniques - Ability to create clear and concise documentation and user guides. if you can use open source codes from github...

    $170 (Avg Bid)
    $170 Oferta promedio
    27 ofertas

    1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. Job Postings and B...

    $580 (Avg Bid)
    $580 Oferta promedio
    74 ofertas

    1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. Job Postings and ...

    $607 (Avg Bid)
    $607 Oferta promedio
    82 ofertas

    Por favor, regístrate o inicia sesión para ver los detalles.

    Acuerdo de Confidencialidad

    We need support to resolve some penetration points raised by information security for hybrid mobile applications using Expo & React-Native as front-end and back-end Web API is in C# the issues raised are for Android 1-Application uses hashing algorithms that are known to consist of possible collisions (such as SHA-1 and MD5). Security Recommendations: It is recommended to be using safer/stronger hashing alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configuration is known t...

    $162 (Avg Bid)
    $162 Oferta promedio
    18 ofertas

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $175 (Avg Bid)
    $175 Oferta promedio
    11 ofertas
    website development Finalizado left

    I am looking for experienced developers to develop a ticket booking platform in Laravel. I have specific design preferences for the website and I need various functionalities and features included in the platform. The platform should have features including secure user authentication using password hashing and encryption; tracking of ticket sales; CRM integration; payment gateway integration; email/SMS notifications; third-party API integrations; and a custom CMS. Additionally, the platform should be easily scalable and customizable. I am looking for proficient developers and designers who can provide a modern and responsive website. As well as being able to provide the functionalities mentioned above, the successful developer must also be able to adhere to a timeline and strive t...

    $318 (Avg Bid)
    $318 Oferta promedio
    38 ofertas

    Hello I would need a simple app. The app will consist of a calender : **1. User Registration:** - Admin creates a new user by providing a username and password. - Store the user's credentials securely in a database, with password hashing and salting for security. **2. User Login:** - User enters their username and password on the login page. - The system checks the provided credentials against the database records. - If the credentials are valid, the user is granted access to their account. **3. User Home Page:** - Upon successful login, the user have access to calender and chat **4. Availability Calendar:** - On the user's home page, display a calendar where users can set their availability. - Users can click on specific dates and indicate their availability (e.g.,...

    $156 (Avg Bid)
    $156 Oferta promedio
    12 ofertas

    ...should hit “Next” (the MD5 Hash should be created - example: 6e022294bfc9bc54969e8e3f3e997727) and the MD5 Hash should be automatically entered into the first question response of this survey: The user should then be able to go on and complete the survey. Skills and Experience Needed: - Strong understanding of encryption algorithms, specifically MD5 hashing - Experience in developing secure data handling systems - Familiarity with survey systems and data storage protocols - Ability to ensure data integrity and privacy through encryption techniques...

    $166 (Avg Bid)
    $166 Oferta promedio
    28 ofertas

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $119 (Avg Bid)
    $119 Oferta promedio
    13 ofertas

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $128 (Avg Bid)
    $128 Oferta promedio
    14 ofertas

    Project Description: Title: Hashing SwiftUI URL Links for iOS Platform We are looking for a skilled developer to help us implement a hashing algorithm for our SwiftUI app on the iOS platform. The project requires the use of the SHA-256 hashing algorithm and will involve generating hashed URLs for our app's links. Requirements: - Use SHA-256 hashing algorithm to hash the URLs - Ensure compatibility with iOS platform - Implement specific requirements for the length and complexity of the hashed URLs Ideal Skills and Experience: - Proficiency in Swift and SwiftUI development - Experience with implementing hashing algorithms, particularly SHA-256 - Familiarity with iOS platform and app development best practices - Strong problem-solving skills and atte...

    $170 (Avg Bid)
    $170 Oferta promedio
    28 ofertas

    -Client Tool Functionalities: System-Tray Integration: The program should be compiled as an .exe file and run in the Windows System Tray to minimize user disruption. Folder Monitoring: Monitor a specific folder in the filesystem for new or changed files. Validation: Before uploading, the program should validate the files to ensure they contain only the allowed char...usernames and passwords for authentication. User-Specific Tables: Individual tables for each user for importing the CSV data. Each table has five columns as per the CSV format. Programming Languages and Tools: Backend: Consider using Python with Flask or Django for REST API. Database: MySQL, PostgreSQL, or another relational database. Security Measures: Use HTTPS Password hashing in th...

    $472 (Avg Bid)
    $472 Oferta promedio
    56 ofertas

    Check if it is possible to realize this task: I am writing a Python script that performs automatic authentication in a web form. The web form itself operates in conjunction with JS and the backend, and before sending authorization data to the backend, a specific JS file uses the Digest authentication algorithm. This involves hashing various parameters using hash functions. From my research, I understand that it takes the login + password + request method + URL and some other data, but in my ready-made Python script variation, the hash generated is shorter than what the original JS file on the form generates. Task: Understand the authentication logic from the JS script's side and implement this logic in Python so that authentication can be automated without the JS file. The JS...

    $161 (Avg Bid)
    $161 Oferta promedio
    12 ofertas

    Por favor, regístrate o inicia sesión para ver los detalles.

    Destacado Urgente Sellado

    Principales artículos de la comunidad hashing