Racket cryptography jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 racket cryptography jobs found, pricing in CAD

    Proposal : In my research proposal...the organization for advancement of structured information standards (OASIS) introduce the standard for the web service security, which is focus on the “who” can use the service and “what” are the permission, he have. But it’s not focus on the “where” it consumes. Therefore, a new location tracing token profile created for the handle this issue. The location tracing token profile, include cryptography concept, which provide the new security feature, which is not available in other security token profile and in propose token, processing overhead size is small and theoretical result will be more powerfully then other tokens. If You have any other Proposal, in same field(Web service Security) you f...

    $510 (Avg Bid)
    $510 Avg Bid
    9 bids

    Hello, I need someone experienced in Android Java Cryptography, my app uses AES encryption, I just need to improve the encryption method and make it more secure with salts, IV or else..

    $54 (Avg Bid)
    $54 Avg Bid
    10 bids

    We are working on Initial Coin Offering Project and require people who have already worked on Initial Coin Offerings: Smart contract creation on ERC 20, Smart contract ICO LAunching Cryptography

    $994 (Avg Bid)
    $994 Avg Bid
    9 bids

    Hello, We are looking for a Cryptography Specialist, who can decode a "Number" all ID outputs are different, the real ID is unique ! we need the algorithm and our ID is unique but all outputs are different

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids

    1. To what extent does public key cryptography depend on social trust? 2. Clearly and concisely describe the public key infrastructure involved with Transport Layer Security (TLS) protocol. a. Then, critically analyse the most important points where trust in organisations or institutions is necessary for this infrastructure to function, b. the direction of trust in these relationships, c. and how that trust could be created and lost. 3. Finally, explain what the limits of trust under international anarchy imply for your analysis of public key cryptography.

    $43 (Avg Bid)
    $43 Avg Bid
    6 bids

    Hello, We are looking for a Cryptography Specialist, who can decode a "Number" all ID outputs are different, the real ID is unique ! we need the algorithm and our ID is unique but all outputs are different

    $3177 (Avg Bid)
    $3177 Avg Bid
    5 bids

    Hello everyone, We are looking for skilled cryptographer for our custom cryptocurrency project. We are looking to create a cryptocurrency based on Lyra2RE(v2) algorithm - see . We would like to eliminate ASIC miners from our network as long as possible and allow common people to secure blockchain with common h...Deliver working blockchain explorer based on - our infrastructure will be provided 6. Setup 6 seed nodes on our infrastructure 7. Setup mining pool based on on our infrastructure This all should be delivered within 20 days. Please do not apply if you do not have any previous experience with similar cryptography related projects. Thanks for your quotes.

    $5807 (Avg Bid)
    $5807 Avg Bid
    10 bids

    Hi Cryptography experts I'm looking for experince Cryptogrqaphy coder to develop for us Browser monero minier based Javascript. We would like to add a Javascript script on our websites, with a nodejs server to handle all connection. When a user visits our websites, The user's web browser power will be used to mine Monero currency. The webserver will connect to a monero pool and serve the work to connected users. similar to (We just want to develop the Javascript - not backend) The javascript able to be fixable and read some parameters, Like: var miner = new CoinHive . User('YOUR_SITE_KEY', 'NAME', {threads: 4, autoThreads: false, etc......}); Thanks

    $800 (Avg Bid)
    $800 Avg Bid
    4 bids

    Few challenges to be done based on cryptography and deciphering. I need the work in 24 hours if possible. Please open the zip folder which has all the requirements. Please don't bid more than 70CAD as your bid will be ignored since this is not worth more than 70CAD for sure

    $88 (Avg Bid)
    $88 Avg Bid
    11 bids

    Few challenges to be done based on cryptography and deciphering. I need the work in 24 hours if possible. Please open the zip folder which has all the requirements

    $190 (Avg Bid)
    $190 Avg Bid
    4 bids

    Story line KindeRVish At a birthday party a child is very excited at receiving gifts and he looks on to a table full of gifts dreaming of helicopters , train sets , tennis racket. People giving him the gift are also telling him that they hope he likes it . The next morning when he opens the gifts , he s very disappointed because he receives things like an art set , cars or bat and ball , things he has or doesn't like at all. Makes the mother also sad . The next year the mother uses KindeRVish (so we can insert a small demo on how the site works ) where she creates a wishlist and sends the link out to the guest . The guest are happy to book gifts without having to think or go to a toy shop assured that the child needs it. They can enter without a gift which is already a...

    $186 (Avg Bid)
    $186 Avg Bid
    16 bids

    Descriptyion: -Bachelor or Master’s degree in Computer Science, Engineering, Mathematics, and/or equivalent work experience. -Understanding of peer-to-peer networking protocols such as Bittorrent -Understanding of cryptocurrency and/or blockchain technology -Provable contributions to projects in decentralization or cryptocurrency -Strong understanding of algorithms, data structures, cryptography and data security -Experience developing Ethereum contracts with Solidity -Preferably, has launched token sales (ideally on Ethereum with ERC-20 compliant tokens) -Experience in other programming languages and frameworks / protocols would be favorable: Java, Javascript, Go, Python, C# -Experience with Github Answer the following questions 1. When did you do your first de...

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    20 bids

    We are working on Initial Coin Offering Project and require people who have already worked on Initial Coin Offerings: Smart contract creation on ERC 20, Smart contract ICO LAunching Cryptography

    $1309 (Avg Bid)
    $1309 Avg Bid
    11 bids

    I need to code a program to encrypt and decrypt a large file, with the given public/private keys. I can share key file and more details. It needs to be done in C language Details are attached, Please only bid after reading attachment. I have more details and some code also which i can share, if u agree to do it

    $120 (Avg Bid)
    $120 Avg Bid
    6 bids

    Have to implement and break a quantum cryptography algorithm based on requirements

    $14 - $41
    $14 - $41
    0 bids
    $43 Avg Bid
    8 bids

    I need to code a program to encrypt and decrypt a large file, with the given public/private keys. I can share key file and more details. It needs to be done in C language

    $146 (Avg Bid)
    $146 Avg Bid
    15 bids

    I need to fix some issues with my xamarin forms app. Android - keyboard leaves white space after the keyboard closes Windows UWP - app was rejected because - the app has login information without Cryptography Add a native help page.

    $98 (Avg Bid)
    $98 Avg Bid
    6 bids

    I need to code a program to encrypt and decrypt a large file, with the given public/private keys. I can share key file and more details. It needs to be done in C language

    $98 (Avg Bid)
    $98 Avg Bid
    2 bids

    This is straightforward assignment to derive secret using Quadratic Residue knowledge. Formula: c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks: Part 1: Later, I will provide a text file of 30 groups of <c, p> values. We only know s is an integer in the interval of [2410, 2459], but do not know which value is it. The mission is to write a Python program to derive the value of s, using those 30 groups of <c, p> values as inputs. Remarks: 1. Hint: you MUS...

    $26 (Avg Bid)
    $26 Avg Bid
    3 bids

    This is straightforward assignment to derive secret using Quadratic Residue knowledge. Formula: c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks: Part 1: Later, I will provide a text file of 30 groups of <c, p> values. We only know s is an integer in the interval of [2410, 2459], but do not know which value is it. The mission is to write a Python program to derive the value of s, using those 30 groups of <c, p> values as inputs. Remarks: 1. Hint: you MUS...

    $44 (Avg Bid)
    $44 Avg Bid
    3 bids

    Need to do Cryptography of the upcoming token projects!

    $629 (Avg Bid)
    $629 Avg Bid
    6 bids

    I'm looking for an expert in applied cryptography who can help/consult me on how to proceed with some difficulties that I'm facing related to masking votes/identities.

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    2 bids

    cellunclok, reply via messages.............We have worked on the last project based on cryptography and wanted to pay..i am ready to send the project to u by that amount..

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    6 bids

    This is straightforward assignment to derive secret using Quadratic Residue knowledge. Formula: c = (s ^ r) mod p - s is the secret (an integer) to be encrypted using above formula - r is a random 500-bit number - p is a random 500-bit prime number - c is the ciphertext computed using this formula Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values. There are 3 tasks: Part 1: Later, I will provide a text file of 30 groups of <c, p> values. We only know s is an integer in the interval of [2410, 2459], but do not know which value is it. The mission is to write a Python program to derive the value of s, using those 30 groups of <c, p> values as inputs. Remarks: 1. Hint: you MUST use the...

    $114 (Avg Bid)
    $114 Avg Bid
    6 bids

    Hello Everyone :) I need a professional research writer with proficiency in the English Language and at least a Software Engineering related Master to answer 2 of the 3 questions FROM THE ATTACHED PDF. Each answer needs 2000-2800 words, total: 4000-5600 It is a bibliographic work IN ENGLISH on Distributed Systems Concepts and Design and Cryptography and Network Security Principles and Practices topics. Delivery date: 13/11/2017 Thank you a lot in advance

    $271 (Avg Bid)
    $271 Avg Bid
    16 bids

    I need someone expert in Cryptography.

    $206 (Avg Bid)
    $206 Avg Bid
    1 bids

    Hi Md Baezid B., Let's run the set of four sketch/doodle type Tennis assets, based on the images we exchanged. Set of four designs, two of tennis balls, one of tennis shoe, one of tennis racket. May require revisions to close in on necessary style.

    $69 (Avg Bid)
    $69 Avg Bid
    1 bids

    Small project, which involves editing the code. I need help in implementing HMAC_SHA256 in my code, using C++. More details available on the photo attached, but also on request.

    $29 (Avg Bid)
    $29 Avg Bid
    4 bids

    I need help in completing a few tasks, which require HMAC_SHA256 implementation using C++. More details available on the image attached and on request.

    $28 (Avg Bid)
    $28 Avg Bid
    2 bids

    Machine learning, Cryptography, Python. Matlab knowledge is plus. Prediction, math. More in PM. Simple project.

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    14 bids

    Hello, I'm looking for someone who can do a simple project that I need to do in order to prove some skills. Unfortunately, I have no time so it'd be great if you can do it. It's very simple, look at the photo for more specifics. It's editing already existing code. A few lines at most. Please let me know if you can do it.

    $39 (Avg Bid)
    $39 Avg Bid
    5 bids

    I am currently facing some obstacles in IT Security, cryptography programming precisely. I am looking for someone to help me with HMAC_SHA256 implementation, as shown on the attached photo. I prefer it to be done in C++. I have already implemented the number 3.

    $51 (Avg Bid)
    $51 Avg Bid
    3 bids

    Part 1 of pet project. Draw five animals in specified costumes. -Sport Dog:Golden Retrieve playing tennis, chewing on tennis balls, wearing a sweat head band, with tennis racket under his paw being ignored, he was more interested in playing fetch than tennis, Red background -Sport Cat:Cat decided to go swimming, wearing goggles, pool floats, and looking very scared of the water. possibly a Scottish fold, Blue background -Sport Small Pet: Gerbil plays basketball, gerbils like to jump high, maybe sitting on top of a basketball. Orange background. -Sport Bird:Can use any bird, doesn't have to be a pet, I have no suggestions, would like to see your ideas Purple -Chameleon-no costume. bright and colorful, holding onto a branch-yellow background

    $69 - $69
    $69 - $69
    0 bids

    Help me for some material on cryptography maths and i will share more details in private chat box

    $51 (Avg Bid)
    $51 Avg Bid
    5 bids

    This is a project to remove the ransom-ware cryptography of a new variant of Crysis/Dharma Application will need to select a directory of infected files and bath process removal.

    $784 (Avg Bid)
    $784 Avg Bid
    6 bids

    Create two logos: 1 - A logo for a personal website that I am building: "DBG MediaLab" / "dbg medialab". The content ranges from posts, videos, academic papers, newsletters, projects and other. The topics are mostly scientific/technological (mostly mathematics/cryptography/hacking) as well as philosophical and political (social/minorities/world issues and Jewish related content). Would like the logo to contain the name "DBG MediaLab" / "dbg medialab" and to reflect a modern look as we become more global and aim to co-exist and create together. Would like to see a mathematical touch to portray to importance of interdisciplinary thought. 2 - A logo for a weekly newsletter on blockchain related content. It is educational, informative, opinio...

    $153 (Avg Bid)
    $153 Avg Bid
    27 bids

    I am looking for some one to do some small tasks related to cryptography and crypto analysis. I will share complete details with selected freelancer.

    $128 (Avg Bid)
    $128 Avg Bid
    6 bids

    Research work related to Identity Based Encryption (IBE) and Elliptic Curve Cryptography (ECC). Need professional with expertise in security architecture – Network security, application security. Deep technical experience in Security/Identity based Encryption (IBE) and Elliptic Curve Cryptography (ECC). Encryption expertise, HSM (Hardware Security Modules)

    $279 (Avg Bid)
    $279 Avg Bid
    14 bids

    Hi, Im looking for a web developer who has experience in developing cryptography website, Who has worked with Blockchain, Bitcoin, Ehtreum and tokens.

    $923 (Avg Bid)
    $923 Avg Bid
    7 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using Java. Cryptography method used to secure communication in LAN.

    $496 (Avg Bid)
    $496 Avg Bid
    10 bids

    Dear freelancer, i need help with the implementation of a project in the field of cryptography. The attached screenshots describe the sequence of the encryption process exactly. Important Notice: All specifications are in German language only. I have already tried to implement the specification in code but without success. The project is about creating a message key and encrypting it with the public key of the other side using the RSA procedure. The message key is used to encrypt the message to the other in the 3DES method. Steps to reproduce: 1. Creating my signing and encryption keys (WORKING) -> 2. Fetching des public keys from other side (WORKING) -> 3. Generating random message key and doing RSA-3DES crypto process (NOT WORKING) -> http://bit

    $322 (Avg Bid)
    $322 Avg Bid
    6 bids

    I need some Matlab codes to cypher and decipher information using elliptic curve cryptography.

    $50 (Avg Bid)
    $50 Avg Bid
    4 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using C or C++ on any language that you professional on it .Design a secure email system based on identity-based cryptography

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    Detailed write-up on Cryptography (in general and also how it specifically applies to Bitcoin, Bitcoin Hardware Wallets, and the Blockchain). Mathematical examples, principles, proofs and so on need to be shown. Not to be copy and pasted from the internet, we will check for that and this tender will be void if this happens. Information may be gathered from the internet but must be presented clearly and in detail in your own words in English. This write-up must be your own and not someone else’s. If others work is used please indicate source and verify it can be used by us. We will check for this and tender is void if violated. Required in 5 days.

    $235 (Avg Bid)
    $235 Avg Bid
    12 bids

    Research work related to Identity Based Encryption (IBE) and Elliptic Curve Cryptography (ECC). Need professional with expertise in security architecture – Network security, application security. Deep technical experience in Security/Identity based Encryption (IBE) and Elliptic Curve Cryptography (ECC). Encryption expertise, HSM (Hardware Security Modules)

    $73 (Avg Bid)
    $73 Avg Bid
    3 bids

    Write a 10 page paper on the following research computer science topics and relate them to the name of the paper. write an abstract and a solid conclusion. grammar check US English peer-reviewed journals should be used USE CITATIONS 11 font size 1.5 paper spcace TOPICS Viruses Protection S...of the paper. write an abstract and a solid conclusion. grammar check US English peer-reviewed journals should be used USE CITATIONS 11 font size 1.5 paper spcace TOPICS Viruses Protection Slammer - virus Rasomware spyware/adware Cost of hacking damages Malware analysis and detection ●Botnet detection and measurements ●Spam detection ●Intrusion detection ●Web security ●Cryptography ●Privacy and anonymity ●Wireless/RFID security ●Physical security

    $142 (Avg Bid)
    $142 Avg Bid
    21 bids

    Please look at the attached PDF. The successful candidate must know DES and other cryptography methods to be able to finish the task

    $160 (Avg Bid)
    $160 Avg Bid
    6 bids

    Will give more details about the tasks upon hiring

    $113 (Avg Bid)
    $113 Avg Bid
    8 bids