Cipher program Freelancerları ya da İşleri mi Arıyorsunuz?
Cipher program konusunda yardıma mı ihtiyacınız var? Bugün bir freelancerı işe alın! Cipher program alanında uzman mısınız? Cipher program becerilerinizi kullanın ve bugün online para kazanmaya başlayın! Freelancer dünyadaki işler için en büyük pazardır. Şu anda üzerinde çalışmanızı bekleyen 17,764 iş var!
İş Vermek İstiyorum Çalışmak İstiyorum
Cipher program İşleri:
Proje/Yarışma | Tanım | Tekilfler/Girdiler | Beceriler | Başlangıç | Bitiş | Fiyat (EUR) | |
---|---|---|---|---|---|---|---|
Build a blockchain - 26/04/2018 05:54 EDT | Need to implement a blockchain implementation of: 1. Registration unit: Registers users, conductors and transit agencies 2. Ticketing Unit: A) Creates a multi-modal trip itinerary given the origin, destination and preferences of a user B) Interacts with transit agencies involved in the multi-modal trip and gets the tickets C) Unifies the tickets into one ticket D) Encrypts the information o... | 10 | Blockchain | Apr 26, 2018 | Bugün6g 1s | €375 | |
Python 3 decryption. | I need you to develop a script for me. Iimplement a python 3 code that decrypts the the encryoted [url kaldırıldı, görüntülemek için giriş yapın] shall take the cipher text as input and output would be in plain text. | 21 | Python, Windows Masaüstü, Yazılım Mimarisi | Apr 19, 2018 | Apr 19, 2018Bitti | €21 | |
Cloud computing search project | I want make a multi-keyword ranked search on a encrypted cloud environment. First i want to apply hierarchical clustering while indexing then apply search on cloud server by user query. The files as well as index should be outsourced to the cloud with encryption. Then apply cipher text search | 2 | Java, JSP, SQL, Bulut Bilişim | Apr 15, 2018 | Apr 15, 2018Bitti | €109 | |
EASY, URGENT: Create an SVG Caesar Cipher wheel | Hello, I would like a Caesar cipher wheel designed. It consists of two wheels, one on top of the other. PDF attached to show an example. File type SVG Measurements: Outer wheel diameter 12mm When cut out and stacked, it will look like the one in the picture. | 8 | Grafik Tasarımı | Apr 5, 2018 | Apr 5, 2018Bitti | €8 | |
python 3 code for Mikey v2 cipher with example of implimanation | There are a lot codes for MICKEY V2 cipher in different programming languages including Python however I need 1-Python 3 code easily written with a lot off comments to show how it is work with screenshots. 2-example with data set to show the implementation. 3-I need to be easy to run and fast. 4-Pseudocode for MICKEY cipher V2 | 2 | C Programlama, Python, Yazılım Mimarisi | Apr 1, 2018 | Apr 1, 2018Bitti | €151 | |
java application for the purpose of data encryption, decryption, secure key exchange, and digital signature | Hi there , I need someone who already worked with the java security libraries to implement this application for me, this project was assigned to undergraduate CS students in my college as a course project on Network Security subject, so i knew it does not worth that much of work , almost all functions are built-in functions , No need to implement any thing from scratch so please do not ask more ... | 20 | Java, Bilgisayar Güvenliği, Yazılım Mimarisi, Yazılım Test Etme, Security Sales | Mar 30, 2018 | Mar 30, 2018Bitti | €158 | |
JAVA to C# code conversion | I have one JAVA Desktop application I need to convert one specific functionality of it in to C#.I'll provide the java code and all other required data. The ultimate goal is the c# application must generate the same output JAVA application generates. The code JAVA code is as follows: protected void init() { byte[] key = getPlatformHook().generateKey(getSeedFile()); [url ... | 15 | Java, C# Programlama, Yazılım Mimarisi | Mar 30, 2018 | Mar 30, 2018Bitti | €23 | |
Substitution cipher | Develop a tool to automatically cryptanalyze English ciphertext produced by the substitution cipher studied | 5 | Java | Mar 29, 2018 | Mar 29, 2018Bitti | €33 | |
AES GCM trouble shoot | I have 10 cipher text that I think are encrypted with AES CGM (check attachment) I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the nonce and authentication tag is included in the cipher text, I'm guessing first 12 bytes are nonce (you can see a pattern of repetition) and last 16 bytes are tags because the total payload increased by 24 bytes after encryption. The proble... | 9 | Java, .NET, Bilgisayar Güvenliği, Algoritma, C++ Programlama | Mar 29, 2018 | Mar 29, 2018Bitti | €500 | |
AES CTR Cryptography | I have 10 cipher text that are encrypted with AES CTR I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I know the IV/Nounce is included in the chipher I want you to show me how I can decrypt the data. To know that you have successfully decrypted the data, some cipher text should contain "Game" when decryted, though most part of the actual message will not be in ASCII. ... | 13 | Java, .NET, Bilgisayar Güvenliği, Algoritma, C++ Programlama | Mar 29, 2018 | Mar 29, 2018Bitti | €454 | |
AES Cryptography Expert | I have 10 cipher text that are encrypted with AES I know that the symmetric key is IvKVlyODk8I4VPhWosQtLw== I need a professional to find out what kind of aes counter mode is being used to encrypt the data, and the data must contain some kind of nonce/IV or something since the first few bytes are all the same. Also the cipher blocks are all in different sizes and not in multiple of 16. I wan... | 7 | Java, Bilgisayar Güvenliği, Algoritma, C++ Programlama, Matematik | Mar 29, 2018 | Mar 29, 2018Bitti | €127 | |
Project for Arkabrata D. | Hi Arkabrata D., I noticed your profile and would like to offer you my project. I have some cryptography questions that I found a little bit challengeable: like permutation cipher, shift ciphers etc. I will provide you with the questions over chat. | 1 | Matlab ve Mathematica , İstatistik, Finans, Matematik, , İstatistiksel Analiz | Mar 28, 2018 | Mar 28, 2018Bitti | €33 | |
network security ( code in c++ ) | As a developer in a company specialized in cyber security solutions development, you were assigned a task to develop a C++ application for the purpose of data encryption, decryption, secure key exchange, and digital signature. You are required to develop an application that satisfies the following security standards: 1) The application should make use of a computationally secure and f... | 7 | Bilgisayar Güvenliği, C++ Programlama | Mar 26, 2018 | BugünBitti | €146 | |
network security project (C++) | As a developer in a company specialized in cyber security solutions development, you were assigned a task to develop a C++ for the purpose of data encryption, decryption, secure key exchange, and digital signature. You are required to develop an application that satisfies the following security standards: 1) The application should make use of a computationally secure and fast encryption... | 13 | Bilgisayar Güvenliği, C++ Programlama | Mar 26, 2018 | BugünBitti | €31 | |
Add TLS 1, TLS1.1, TLS 1.2 and SSLv3 to CentOS 7 / cPanel Server | Hello, I need to activate TLS versions and SSL3 versions on a CentOS Server to have compatibility with old mail clients. We have change this options on WHM but are not shown on the SSL tests or server ports. We need to check cipher suites to ensure security. | 6 | Sistem Yöneticisi, Linux, Apache | Mar 22, 2018 | Mar 22, 2018Bitti | €33 | |
Credit Card Page update | Need to update this page code: [url kaldırıldı, görüntülemek için giriş yapın]~gvsites/[url kaldırıldı, görüntülemek için giriş yapın] Let me know if you can do it. I will give you the [url kaldırıldı, görüntülemek için giriş yapın] UN & pass if you know how to fix and update. To: millsfuelservice@[url kaldırıldı, gö... | 5 | PHP, Web Sitesi Tasarımı, Yazılım Mimarisi, e-Ticaret, HTML | Mar 4, 2018 | Mar 4, 2018Bitti | €53 | |
Write content related to cryptography for website | I need 5 content posts related to the following: Substitution method, hill cipher etc. | 2 | Kriptografi | Mar 4, 2018 | Mar 4, 2018Bitti | €41 | |
I need a python programmer for a simple program | Program should encrypt/decrypt given file using a simple XOR cipher with the given key file. So when the XOR cipher is applied to the now encrypted file, it should return the original file in the original format. Given/Inputs: two text files File 1: multiline text file: needs to be encrypted/decrypted with a simple XOR cipher using the key-file given. File 2: Key text file: will be a file o... | 9 | Python | Mar 1, 2018 | Mar 1, 2018Bitti | €38 | |
Implement Fleissner Grille Cipher in Python 3 | Implement Fleissner Grille Cipher in Python 3. Details about Fleissner Grille Cipher will be provided. | 9 | Python, Yazılım Mimarisi | Mar 1, 2018 | Mar 1, 2018Bitti | €32 | |
(New) Build a Website | We need a Web develoment for our new company based in Asia called Cipher Group Limited. We provide the online forex trading service to retail customer. We would like to see designs that use the color white and Blue (or Water) base. Please reffer to follwoing website we preffer. [url kaldırıldı, görüntülemek için giriş yapın] [url kaldırıldı, görüntülemek... | 70 | PHP, Web Sitesi Tasarımı, Grafik Tasarımı, WordPress , HTML | Mar 1, 2018 | Mar 1, 2018Bitti | €1815 |
Showing 1 to 20 of 636 entries
En İyi Cipher program Freelancerlarını İşe Alın:

39

1228

183

122

90