Gpg encryptiontrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 gpg encryption trabajados encontrados, precios en USD

    ...libraries to generate all keys and calculate all RSA/Diffie-Hellman values in this step. Once both sides calculate PS, they use it along with the first two nonces as a seed to a pseudorandom number generator to generate the 4 communication keys. You are free to implement this step in any way using libraries. Let’s call the 4 keys {CC, IC, CS, IS}, representing the encryption key of the client, CC, the MAC key of the client, IC, the encryption key of the server CS, and the MAC key of the server, IS. The client the sends the server hash(nonce_client, nonce_server, premaster secret, CC, IC). The server sends to the client hash(nonce_client, nonce_server, premaster secret, CS, IS). Each side will verify the values they received and print either a success or failure messa...

    $10 / hr (Avg Bid)
    $10 / hr Oferta promedio
    16 ofertas

    I have 2 small issues on our server to fix. 1). We now NGINX "502 Bad Gateway" error on our Server when accessing an external site Our ...started throwing this 502 error - it used to work perfectly. We use CWP as the control panel. Need this fixed and an explanation as to how it may have been changed and how it was fixed by you. 2). Every hour we get messages like: Time: Sat Dec 31 20:02:51 2022 +0100 Account: ##### Resource: Process Time Exceeded: 209451 > 1800 (seconds) Executable: /usr/bin/gpg-agent Command Line: gpg-agent --homedir /var/www/html/ --use-standard-socket --daemon PID: 25663 (Parent PID:29055) Killed: No Most likely a CRON job. Need it fixed and an explanation as to what caused it and how it was fi...

    $33 (Avg Bid)
    $33 Oferta promedio
    15 ofertas

    ...without downtime & released periodically Licensing Model: Open to your recommendations (Perpetual based on module) Users Log (audit): Historic User Logs cannot be edited/amended/deleted/erased to know what was done with and in the applications (Such as creating many users and deleting it) Logs: Can be send to multiple systems (such as SIEM and other security tools) Security: SSO, Custom SAML, 2FA, Encryption, Penetration Testing Dashboards: Visualize tasks, processes, analytics, and more. Task Management: Documents, Spreadsheet, Folders, Projects, Tasks, Subtasks create an unlimited number of items — folders, projects, tasks, and subtasks — for your team and easily view which assignee is responsible for each specific initiative. Collaborate: Work cross-funct...

    $97 (Avg Bid)
    $97 Oferta promedio
    10 ofertas

    ...branded tool for remote desktop work, similar to Chrome Remote Desktop and Getscreen.me. The tool should support Windows 10, Windows 11, Windows Server 2019, MacOS Big Sur and up, MacOS, and Linux. The tool should be accessible through a web browser or a connection app. Features: Two factor authentication using email or Google Authenticator for secure access 256-bit AES SSL protection for data encryption File sharing and transfer capabilities Built-in chat window for communication with the remote user Buttons for common keyboard shortcuts (e.g., switch users, open Run box, open File Explorer) System information viewer to display live and historic data on hard disk usage, CPU usage, top 10 processes, data traffic, uptime, and memory usage Optional email notifications whe...

    $604 (Avg Bid)
    $604 Oferta promedio
    31 ofertas

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of...Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revokes the...

    $52 (Avg Bid)
    $52 Oferta promedio
    11 ofertas

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance o...Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revokes thei...

    $351 (Avg Bid)
    $351 Oferta promedio
    45 ofertas

    Hi, i need a newly configured server with the latest versions of the apps above. The server should be fast without a GUI. mysql needs to be deaktivated if its currently installed there (what i think it is). postgres access should be restricted to the local maschine and accessible with bash or pgadmin4. Finaly there should run my application with ssl encryption on the tomcat server. the ssl certificate should be auto renewed and a domain configured for the access. It would be great if we can do this job fast so that hopefully i get the new server running within 48 hours from starting the project. i want start the project shortly to finish it this year. I can create milestones if you want. Bests - Thomas I need an invoice before i can pay the final milestone.

    $173 (Avg Bid)
    $173 Oferta promedio
    43 ofertas
    Video Encryption Finalizado left

    I need an expert for video encrypt & decrypt. I will have many projects about videos.

    $118 (Avg Bid)
    $118 Oferta promedio
    49 ofertas

    In this project students are asked to implement a an XTEA Encryption/Decryption VHDL Engine, implemented in both C code and VHDL code. It supposed to be built as a custom hardware module and be interfaced to the NIOS II soft processor in the Alter- Intel Cyclone V FPGA chip [De-10Nano board]. The HDL code implements 2 number of pins: first an input from stdr_logic_vector type form of 32-bit length, and second an output with 32-bit of the same type. The Key is 32-bit in length, and they must be stored inside the VHDL code. The input reception and output generation may take multiple clock cycles or states but could be designed in less than that if was applicable. The internet could be surfed to lookup codes for both C and VHDL but the group is responsible to convert and modify the cod...

    $492 (Avg Bid)
    $492 Oferta promedio
    16 ofertas

    i have javascript code i want to obfusticate it with encryption key and it should still work and then I can decrypt it by the key

    $31 (Avg Bid)
    $31 Oferta promedio
    28 ofertas

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance o...Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revokes thei...

    $64 (Avg Bid)
    $64 Oferta promedio
    18 ofertas
    Javascript Rewrite Finalizado left

    First off, I'm not sure if my project request is possible. PLEASE review the following details before you place a bid. I have a small javascript project that works. The issue is that a portion of the script appears (to me) to have been encrypted. What I am seeking is for the script to work, without ANY encryption. I have attached the entire zipped project (3 files). Please note that the "encrypted" part, if that is what it is, begins on line 48 of the "" file. I will be available to respond to any questions. Thank you.

    $20 (Avg Bid)
    $20 Oferta promedio
    6 ofertas

    PLEASE APPLY IF YOU HAD PRIOR EXPERIENCE ON THIS. I am looking for someone to provide me a windows command to encrypt and decrypt a windows file using Gpg4win . should use a password to encrypt/decrypt the file.

    $115 (Avg Bid)
    $115 Oferta promedio
    7 ofertas

    We have our application services developed and deployed across d...implementation and do some security audits 5+ years of experience in implementing API authentication using Oauth2.0 for various grant types 5+ years of experience in architecting and building microservices using Laravel Hands-on experience with CI/CD process across multiple servers Strong understanding and experience with auth technologies such as SAML, Oauth2.0 & OpenID Experience with End to End encryption, Multifactor Authentication (MFA), Single Sign-on (SSO) and Mobile Device Management (MDM) will be considered as a great plus Experience in cloud technology - Azure/AWS/GCP with docker, kubernetes will be considered as a great plus Experience in designing and performing security audits will be considered a...

    $105 (Avg Bid)
    $105 Oferta promedio
    6 ofertas

    Job is to create a project in C++ Builder, add the needed files from Crypto++ stack to make a Salsa and AES-ECB encryption/decryption. Thus a function which can encrypt a text string in Salsa + EAS-ECB, and a function which can decrypt the encrypted text string. You should only bid if you have good experience with C++ Builder. The files can be downloaded at

    $139 (Avg Bid)
    $139 Oferta promedio
    16 ofertas
    PGP encryption Finalizado left

    I have a website that use wordpress, actually the client upload a file in json or excel via an ftp and with a script it import the information to a database under PHP myadmin in WordPress or with a cron we have a export every 5 mins json or excel depend on the script we are using. But we are looking to secure the procedure where the client upload the file as a pgp then we use a script to extract it to json or excel so that our script can import it to the database and same for export, our script export the file in a folder then we concert it in pgp. We use Cpanel environement Please note that we have two type of script it either json or excel.

    $515 (Avg Bid)
    $515 Oferta promedio
    35 ofertas

    When I log in automatically using C # http, I encounter http header authentication. The authentication comes from an encrypted string calculated by the js method on the page. This js method is static, but I can't find which js method is encrypting. I need someone to help me write the encrypted js method into a c # method or a na...When I call this method, I find another way to get the parameter values, input them into the method, and get the final same encrypted string. I am engaged in computer crawler work. I have a lot of work to be outsourced, and the payment fund is stable and reliable. I need to be able to find background developers who use C #+CEFSHARP technology, and senior front-end developers to help me crack encryption parameters, WEBSOCKET and other web communication...

    $532 (Avg Bid)
    $532 Oferta promedio
    14 ofertas

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by the Autodesk program the file:- Dynamo Script ( .dyn)

    $204 (Avg Bid)
    $204 Oferta promedio
    5 ofertas
    encryption software Finalizado left

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by Autodesk program the file :- Dynamo Script ( .dyn)

    $200 (Avg Bid)
    $200 Oferta promedio
    6 ofertas

    Hello can you help me with this project it’s going to be similar to lab 4 that I have attached. I have attached the project pdf too ( 193.22 KB) this one Division.c #include "system.h" #include "altera_avalon_pio_regs.h" #include <stdio.h> /* register offset definitions */ #define DVND_REG_OFT 0 // dividend register address offset #define DVSR_REG_OFT 1 // divisor register address offset #define STRT_REG_OFT 2 // start register address offset #define QUOT_REG_OFT 3 #define REMN_REG_OFT 4 #define REDY_REG_OFT 5 #define DONE_REG_OFT 6 /* main program */ int main () { alt_u32 a, b, q, r, ready, done; printf("Division accelerator test #2: nn"); while (1){ printf "Perform division a / b = q remainder rn"); printf("En...

    $620 (Avg Bid)
    $620 Oferta promedio
    12 ofertas

    I want to get real-time stock chart data. But they communicate with encrypted data. I'm looking for someone to unlock the encryption by analyzing the data from the site. JS should be different and have a good understanding of communication.

    $131 (Avg Bid)
    $131 Oferta promedio
    15 ofertas

    From Raspberry Pi 4 model b with sensors like temp, spo2, heartrate collecting data from it and encrypting in the edge level Using Homomorphic Encryption and decryption with the same algorithm while retriveing data from cloud

    $114 (Avg Bid)
    $114 Oferta promedio
    6 ofertas

    ...literally more hackers registrations in my database that actual customers, and I don't know how to stop. I use a Capthcha, but it has not slowed at all... I would need sign up via Facebook and Google and manually on the site, log in with SESSION variables filled with data for customer from page to page. updating address and license information, change password, forgot password, and build in encryption for passwords, currently store raw data. Log database access errors and possibly develop an api to allow me to eventually develop an admin page for me and other helpers to log into to access any info on customers, orders, classes, etc. I am familiar with and have used PDO and parameters, but want it professionally done to minimize holes in security. I want to be able to trus...

    $498 (Avg Bid)
    $498 Oferta promedio
    86 ofertas

    Invisibl...codebase. This task should take less than 10 hours to complete: efficiency is the goal here. Requirements: Looking for a lightweight prototype solution with C# console app projects to demonstrate how Symmetrical & Asymmetrical Encryption works. One C# console app project for Symmetrical Encryption and one C# console app for Asymmetrical Encryption. Each console app would prompt for message and password (if necessary), print the encrypted data and then unencrypt the data (using a password if necessary). You can use SDK nuget packages for RSA and/or AES encryption. No database or cloud hosting required. Technologies: Language(s): C# Library/Framework(s): .NET 6.0, AES , RSA Please deliver the work in the following format(s)...

    $34 / hr (Avg Bid)
    $34 / hr Oferta promedio
    13 ofertas

    You are required to write an application for a simple file transfer between a client and server. The application should have a connection-oriented communication to send a large file...language like C, C++, C# and Java should be preferred. Your aim is to provide a number of services during the file transfer to make it more secure and more robust. Here are the services you need to implement: o Key Exchange (creation of keys and IVs) o Authentication o Confidentiality o Compression You are not required to re-implement algorithms. You are free to choose any available compression, encryption and MAC libraries. You can use PGP as a starting point about the services covered. For sake of simplicity apply all services at once. You can assume that server has a public key and it is known by th...

    $38 (Avg Bid)
    $38 Oferta promedio
    8 ofertas
    PHP website upgrade Finalizado left

    I need a php developer modify a php website from 5.6 to 7.2 and carry out some changes to improve security and some additional functions and bug fixes. The project is pure php...from 5.6 to 7.2 and carry out some changes to improve security and some additional functions and bug fixes. The project is pure php accessing a MySQL database. PHP 7 uses different connection libraries, so this needs fixing first. Once the version upgrade is successful and shown to be fully working, we will need a series of changes making: 1. change password fields in the database and website encryption / display 2. add user reset password and email functionality Code is in GitHub and contributor will be allowed access. We use VirtualBox/Vagrant to test code locally (especially for PHP5.6) and will give inst...

    $307 - $921
    Sellado
    $307 - $921
    229 ofertas

    Hello everyone! I’m looking for a way to move a score from RenPy to a webserver using an URL, but in order players not to change it, it has to go encoded. So, the idea is to create a mathematical encryption in Ren'Py so when the player gets a score, the game makes something like this: $ player_score = 250 $ key = (10,99) … do something … $ player_score_encrypted = player_score * key imagebutton auto .... action OpenURL(""+key+"&score="+player_score_encrypted) Then on the server side using PHP: $player_score_encrypted = (isset($_GET['score'])) ? $_GET['score'] : 0; $key = (isset($_GET['key'])) ? $_GET['key'] : 0; $player_score = $ player_score_encrypted / $key; Obviously, this is way to s...

    $20 (Avg Bid)
    $20 Oferta promedio
    1 ofertas

    A reserving room before encryption framework is proposed to provide separable reversible data hiding for encrypted images in this project. An Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding (MGAMBTC) is used to enhance the hiding capacity. A receiver with only the hiding key can extract the secret data without knowing about the content. If the receiver has only the encryption key, it is not possible to extract the hidden secret data, but it is possible to decrypt an image similar to the original image. Only when the receiver has both the hiding key and the encryption key, it is possible to extract the secret data and completely recover the original content without any error. The experimental results demons...

    $119 (Avg Bid)
    $119 Oferta promedio
    4 ofertas

    ...controller which will be compared to the 2nd PIN stored in Meta Data Partition. If authentication is successful then Private partition2 will become visible to the host/machine. 3. Meta Data Partition: This is a partition that is only visible to the controller to store data/metadata like pin, encryption keys etc. o Every read & write operation destined for Pp1 & Pp2 partitions should automatically be encrypted/decrypted via the controller (encryption algorithm can be simply Xoring the data). o The key for encryption/decryption & both PINs should be changeable in Meta Data Partition. o IOCTLS should be used to mark any partition as PP1 or PP2 o Once the partition is visible to the host/machine (after authentication) it will behave like normal volumes ...

    $4288 (Avg Bid)
    $4288 Oferta promedio
    14 ofertas

    Tasks: - File architecture with compression & encryption from vb6 UDT binary files & code to convert - Sync SSH form using FSW & 1 timer and needing better methodology and efficiency (zipping) -- Syncing should require utilization of memory management for zipping and unzipping files.

    $190 (Avg Bid)
    $190 Oferta promedio
    23 ofertas

    ...20-30 pages in total including tables and graphs. The key though is to answer the questions in the project description below. It would also help if you have reasonable computer knowledge to understand how data encryption works, because it means you will understand many of the concepts in publicly available market research reports. Please submit proposals quickly as I will likely close it early. *************************** PROJECT DESCRIPTION: I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect i...

    $471 (Avg Bid)
    $471 Oferta promedio
    35 ofertas

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    $649 (Avg Bid)
    $649 Oferta promedio
    7 ofertas

    Hi Vishal S., I have updated the project now (same description and amount) and will click on Hire Vishal S now, hopefully that works ok. Neill

    $102 (Avg Bid)
    $102 Oferta promedio
    1 ofertas

    Project Description: I am looking for experts who has experience in 1) ST20 (Sti55xx) cpu. 2) Experience in DVB encryption system. expecially, ecm, emm and data exchange (smartcard and STB) in smart card processing I will provide: 1) firmware jtaged from STB (both data in the Flash and RAM). 2) The function/sub-routine that I am looking for to decrypt those data in the firmware The developer needs to: 1) decompile the function/sub-routine that I am looking for into linux c code (example: function.c) 2) provide any additional decompiled function/sub-routine that can be useful for me. we can have detailed interactive discussion over any app if you need to.

    $681 (Avg Bid)
    $681 Oferta promedio
    8 ofertas

    Dear all, I would need a script python script capable of reading the proprietary file in Avanset VCE format. The files rely on SQLITE and encryption. I need to open old archives and transform them to PDF. I attached a file for testing purposes

    $21 (Avg Bid)
    $21 Oferta promedio
    9 ofertas

    ..."","(key)"); decrypt("", "","(key)"); } File encryption must be implemented using the following libraries: Salsa20 HC-256 SOSEMANUK The source code there is written in C, but it can be plugged into c++ and compiled into one file. It also needs optimization of RAM, and the correct read/write file, so that the memory is freed after the encryption of the file. Write code and test it strictly on Linux, because RAM on windows and linux in c++ is optimized differently. Also for clarity, there is an example of file encryption using An example can be found in the

    $450 (Avg Bid)
    Destacado Urgente Acuerdo de Confidencialidad
    $450 Oferta promedio
    20 ofertas

    Hello guys, I am looking for skilled FPGA programmer who could implement machine learnin...classification) of tiny metal objects etc on a FPGA SOM module. The FPGA will detect object using data from high resolution camera's (not less than 720P) usb port/camera interface,lidar module (atleast 6 sensor) & ultrasonic sensor module (atleast 7 sensor) i2c line and will be connected to servo motor and BLDC motor ESC. The FPGA should output in low latency H.264/H.265 format with AES 256 encryption/similar. More details will be revealed via chat. The freelancer is free to choose an ideal cost effective FPGA SoM module for this task. Please don't apply if you can't complete the task or unsure about your capacity to match the development task. The project needs to...

    $421 (Avg Bid)
    $421 Oferta promedio
    9 ofertas
    Project for Vishal S. Finalizado left

    Hi Vishal S., you've done some research for me in the past and I was wondering whether you would be interested in doing something almost identical again (just for a different industry)? I need a list of merger and acquisition plus fundraising transactions involving data encryption companies over the last three years. What was the size of the acquired party in terms and revenue and employees, and what was their valuation on sale or merger or fundraise? Lett me know if you would be up for doing this. Neill

    $101 (Avg Bid)
    $101 Oferta promedio
    1 ofertas

    Hi, i have a bootstrap panel which gives a multi-layer encryption output. I am looking to have the final layer of the output encryption removed. The final layer is AES.

    $28 (Avg Bid)
    $28 Oferta promedio
    7 ofertas

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $208 (Avg Bid)
    $208 Oferta promedio
    24 ofertas
    Program to encrypt Finalizado left

    Action: In this step, you will implement your own encryption code. You may use a programming language of your choice. Then, you will need to choose a cryptographic library. Then, you will choose an appropriate encryption algorithm. Alternatively, you may a cryptographic utility, and write a shell code. : In this step, you need to implement a method for infecting a victim. Example: A victim may open a phishing email which contains a malicious executable/script as an attachment. 3. Monitoring: To be able to detect a ransomware, we need to be able to monitor your environment. Example: OSSEC Host IDS has a file integrity monitoring functionality. Provide your own detection component 4. Detection: In this stage, you will analyze the data collected by the monitoring co...

    $187 (Avg Bid)
    $187 Oferta promedio
    16 ofertas
    C Programming Expert Finalizado left

    I am looking to hire an experienced C Programming Expert in Operating Systems, Encryption and other advance topics

    $90 (Avg Bid)
    $90 Oferta promedio
    9 ofertas

    ...Also the speed of encryption will be very important, namely because of speed I chose stream algorithm instead of block algorithm. I work with transmitting important files over unsecured channels on a regular basis, at the moment I used and use the usual openssl aes-128-cbc, but the encryption speed leaves much to be desired... Therefore, I need a stable utility, but for Salsa20/SOSEMANUK and that quickly encrypted files that weigh from 1kb up to 50kb +. I would like to see it work in the following variants: 1) Sources c++ which can be compiled into usable variant ELF for linux, so it could be put to /bin folder and used as console openssl, extended fileencryptor -enc -in / -out / -key (256bit key) 2) C++ source code, where file encryption is implemented by

    $495 (Avg Bid)
    $495 Oferta promedio
    6 ofertas

    For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.

    $161 (Avg Bid)
    $161 Oferta promedio
    6 ofertas

    ...Test-Driven Development. * Have experience developing well-designed REST APIs. * Understanding of Blockchain architectural design patterns as well as supporting infrastructure. * Expertise in providing end-to-end solutions (Life Cycle for infrastructure including SDLC). * Knowledge of ERC20, ERC721, and other protocols. * In-depth knowledge of blockchain logic. * Understanding of fundamental encryption mechanisms. * Experience in peer-to-peer networking. * Understanding of Smart Contracts and consensus techniques, as well as experience developing blockchain apps or proofs-of-concept (POCs) in Solidity on Ethereum. * Hands-on development expertise in the following areas: Solidity, JavaScript, Golang, and JSON. * A strong interest in blockchain technology and like learning and deve...

    $35 / hr (Avg Bid)
    $35 / hr Oferta promedio
    59 ofertas

    Hey , looking for an encryption expert for a social media app.

    $783 (Avg Bid)
    $783 Oferta promedio
    14 ofertas

    I need to check a bank, where the request is encrypted EAX mode encryption (

    $503 (Avg Bid)
    $503 Oferta promedio
    14 ofertas

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC , and Diffie-Hellman key

    $165 (Avg Bid)
    Urgente
    $165 Oferta promedio
    9 ofertas

    I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC

    $502 (Avg Bid)
    $502 Oferta promedio
    17 ofertas

    I need help with Encryption calculations and signatures in Python. I will share more details in chat.

    $40 (Avg Bid)
    $40 Oferta promedio
    7 ofertas