Filtre

Son aramalarım
Şuna göre filtrele:
Bütçe
ile
ile
ile
Tür
Beceri
Diller
    İş Durumu
    3,030 cryptography iş bulundu

    ...security, and the ability to translate complex concepts into clear, credible and commercially focused website content. • The role requires someone who understands / will be able to research and understand the cyber security domain, including governance, risk, compliance, standards, architecture, threat management and resilience, as well as cyber for emerging technologies e.g. AI, Post Quantum Cryptography, Microservices, Cloud, partnership with other organisations, etc.. • The content needs to reflect industry depth, strategic clarity and credibility with senior executives. • A separate provider is responsible for website design and build. Web design and development are out of scope for this role. However, the content specialist will be required to collaborate wi...

    €179 Average bid
    €179 Ortalama Teklif
    67 teklifler

    ...individual or group using the name Satoshi Nakamoto. In January 2009, the Bitcoin network officially launched with the mining of the first block, known as the “genesis block.” The whitepaper proposed a radical idea: a decentralized digital currency that would operate without a central authority such as a government or bank. Instead of relying on trust in institutions, Bitcoin would rely on cryptography and a distributed network of computers to verify and record transactions. This innovation came in the wake of the 2008 global financial crisis, a period when public trust in traditional banking systems was severely shaken. Embedded in Bitcoin’s genesis block was a newspaper headline referencing bank bailouts—widely interpreted as a subtle commentary on the...

    €18 / hr Average bid
    €18 / hr Ortalama Teklif
    7 teklifler

    ...assignment is to: • study the concepts in “”, • download and compile the official tests from , • create several fresh bit streams of suitable length using your own generator. I intend these to be pseudorandom sequences produced with the “Cryptography doctor” approach I have in mind, so please do not rely on the NIST software itself as a source of bits, only as the evaluator, • run every applicable test in the suite against my sequences, capture all intermediate statistics, and interpret the p-values with respect to the recommended 1 % / 5 % thresholds, • prepare a clear report that explains each step: how you built or installed the suite

    €21 Average bid
    €21 Ortalama Teklif
    15 teklifler

    This project requires real GPU computation, correct Bitcoin cryptography handling, and verifiable results. This is not a demo or theoretical project. The program must be fully functional and tested. Only apply if you have proven experience with CUDA, cryptography, or Bitcoin key handling.

    €99 Average bid
    €99 Ortalama Teklif
    1 teklifler

    ...Needed – GPU-Accelerated Bitcoin WIF Key Recovery Tool (Verification Required) Project Description: I am looking for an experienced CUDA / GPU developer to build and optimize a high-performance Bitcoin WIF private key recovery program. This project requires real GPU computation, correct Bitcoin cryptography handling, and verifiable results. This is not a demo or theoretical project. The program must be fully functional and tested. Only apply if you have proven experience with CUDA, cryptography, or Bitcoin key handling. Technical Requirements: - Written in C++ with CUDA - Runs on NVIDIA GPUs - Command-line interface (CLI) - Supports Bitcoin WIF (Base58Check) - Supports compressed and uncompressed private keys - Correct checksum validation - Generates private ...

    €147 Average bid
    €147 Ortalama Teklif
    34 teklifler

    I need a security-minded experienced and professional developer who can build a robust licensing subsystem for my commercial Windows application. The codebase mixes Python and C++, so I want the licensing layer written in both languages where each makes the mo...criteria • A licence signed on machine A refuses to activate on machine B. • Any byte-level change to the DLL or compiled Python shuts the app down gracefully. • Unit tests demonstrate correct RSA signing/verification and HWID matching. • All deliverables build and run on a clean Windows VM using only the provided scripts. If you have deep & professional experience in C++, Python, RSA cryptography, and low-level Windows security, I’m ready to start right away and will happily answer any...

    €1271 - €2543
    Özellikli Mühürlü Gizlilik Anlaşması
    €1271 - €2543
    53 teklifler

    Project Description: I am looking for an expert Android/WearOS developer for a fixed-price, one-time project. I need a custom background service for my Samsung Galaxy Watch Ultra to act as a personal "black box" for auditing my own work environment (health and safety logging). Core Requirements: Persistent Foreground Service: Must stay active for 8+ hours (handling Doze mode a...LTE is available. No UI popups or interaction required. Device Management: Implementation of Device Owner / Kiosk Mode (DPM) to ensure the service remains active during the entire work shift. Deliverables: Full Kotlin source code. Signed APK for ADB installation. Simple guide for installation via ADB. Required Skills: Android Native (Kotlin), WearOS SDK, Background Services (WakeLocks), Cryptog...

    €1405 Average bid
    €1405 Ortalama Teklif
    50 teklifler

    I need help decoding a couple of encrypted messages using a standard dictionary code from 1927-1935. I have the messages and the solutions in two examples. There is a third and maybe a fourth and fifth. I need to find the dictionary (or dictionaries) an...messages and the solutions in two examples. There is a third and maybe a fourth and fifth. I need to find the dictionary (or dictionaries) and the method of coding. The messages are in scanned image formats. Requirements: - Experience with historical encryption techniques - Proficiency in handling and decoding dictionary codes - Access to standard dictionaries for 1930s Ideal skills: - Cryptography expertise - Attention to detail and accuracy Please provide samples of similar work. Will require an NDA and IP contract for ...

    €364 Average bid
    €364 Ortalama Teklif
    36 teklifler

    ...when holders burn the Primary Asset, so a secure burn-and-mint mechanism has to be baked directly into the state machine. Technical focus • Cosmos SDK is the chosen framework; please be comfortable extending Tendermint and writing custom Rust / Go modules. • The chain must scale horizontally before anything else, while still keeping latency low enough for responsive dApp UX. • Robust cryptography, clear key-management flows, and a deterministic state machine are non-negotiable. What I expect to receive - Full node implementation with custom consensus logic and asset modules - Oracle-driven minting engine wired to external REST/GraphQL feeds - Burn-and-Mint bridge contracts/modules linking Primary and Reward assets - Deployment scripts, CI tests, and...

    €394 Average bid
    €394 Ortalama Teklif
    13 teklifler

    I need a JSON Web Key (JWK) for API security, compliant with RSA specifications (RFC 7518). The RSA key must be 2048 bits. Requirements: - Generate a JWK with x5c and x5t - RSA 2048 bits compliance - Adhere to RFC 7518 standards Ideal Skills and Experience: - Expertise in cryptography and JWKs - Familiarity with RFC 7518 - Proven experience with RSA key generation

    €26 Average bid
    €26 Ortalama Teklif
    19 teklifler

    I'm very interested in your job "Ui AI twin based on Uometry" I’m excited to bring your visionary project, Ui, to life. As a developer experienced in AI, cryptography, and secure digital identity solutions, I believe I can help you create the transformative, sovereign digital twin experience you’ve outlined. The integration of quantum-inspired interactions, sacred geometry, and personalized behavioral data is a groundbreaking concept that I am eager to contribute to. I have a strong background in AI, cryptography, and mobile development, and I am passionate about creating innovative and secure digital experiences. I will ensure your app is not only cutting-edge but also scalable, secure, and aligned with your vision. I look forward to collaboratin...

    €30 / hr Average bid
    €30 / hr Ortalama Teklif
    1 teklifler

    ...It must be a Windows desktop application developed using Python, with MySQL/MariaDB as the database backend. The project scope is clearly defined and fixed. No additional features beyond what is mentioned below. --- TECHNOLOGY STACK (MANDATORY) Python 3.10 or higher Desktop GUI: PyQt5 / PyQt6 / PySide6 (preferred) Database: MySQL / MariaDB PDF generation: ReportLab Licensing & cryptography: cryptography / PyOpenSSL Packaging: PyInstaller (final EXE) Application must work fully offline after installation --- CORE FUNCTIONAL REQUIREMENTS 1. Licensing System (Mandatory) Application must run only if a valid license file is present License must be: Time-bound (valid from / valid to) Machine-bound (hardware or system hash) License verification must occu...

    €223 Average bid
    €223 Ortalama Teklif
    12 teklifler

    Hi , Looking for .NET Code Security Expert is a professional specializing in building and auditing secure applications using Microsoft's .NET framework. Need to focus on secure coding practices, threat mitigation, secure design, validation controls, authentication/authorization, cryptography, and handling vulnerabilities like SQL Injection and XSS to protect against cyber threats, often certified through programs like CASE.NET. They integrate security throughout the Software Development Life Cycle (SDLC) Looking forward to your response. Regards, Dipak

    €5 / hr Average bid
    €5 / hr Ortalama Teklif
    31 teklifler

    ...investigations, and provided insights to support decision-making. I am passionate about solving real-world problems using AI and security-driven approaches. I enjoy working at the intersection of machine learning, cybersecurity, and data science, with a particular interest in secure machine learning systems, threat detection, and intelligent data modeling. Key Skills: Machine Learning, Cybersecurity, Cryptography, Data Analysis, Statistical Modeling, Python, Java, C, SQL, MLops (Airflow, Mlflow, Docker, FastAPI), Forensics Tools, Network Security (Wireshark), SPSS, SAS, R....

    €6511 Average bid
    €6511 Ortalama Teklif
    33 teklifler

    ...ERC-standards, and, where it makes sense, an L2 or private side-chain—yet the architecture must still communicate with other chains for true interoperability. Here’s the flow I have in mind: • On-chain smart contracts store only encrypted hashes/pointers; actual PHI lives off-chain (IPFS, Filecoin, or an encrypted database—open to your recommendation). • Role-based permissions and public-key cryptography determine who can write or read a record, aligning with HIPAA requirements. • A lightweight middleware layer (REST or GraphQL) bridges existing EHR systems and handles FHIR mapping so providers can plug in with minimal refactoring. • Cross-chain messaging or bridging (e.g., Chainlink CCIP, LayerZero, or a custom relay) proves that a re...

    €87 Average bid
    €87 Ortalama Teklif
    7 teklifler

    ...tamper with data in transit or at rest. Scope • Only the web apps in my staging and production environments are in scope; no network or mobile testing is required. • Attention should centre on TLS configuration, session handling, key management, and any custom encryption routines embedded in the codebase. Typical tooling might include Burp Suite, OWASP ZAP, SSL Labs, and your preferred cryptography analyzers, but feel free to suggest alternatives that achieve deeper coverage. Deliverables 1. A concise executive summary highlighting overall risk. 2. A detailed technical report listing each discovered vulnerability, its CVSS or comparable severity rating, proof-of-concept evidence, and step-by-step remediation advice. 3. A brief call or recorded walkthrough c...

    €422 Average bid
    €422 Ortalama Teklif
    49 teklifler

    Job Description We are looking for a developer to create and integrate Aadhaar Secure QR Code decoding and verification into both an Android app and a Web app. The solution should scan the Aadhaar Secure QR, decrypt and verify UIDAI-signed data, and extract demographic details ...Secure QR Code * Decode & verify UIDAI digital signature * Extract details: Name, DOB/YOB, Gender, Address, Photo (if available) * Integrate with Android (camera scan) and Web (webcam scan) * Use open-source libraries (e.g., pyaadhaar) or third-party APIs * Follow UIDAI offline verification guidelines ### Skills Required * QR code processing * Android development * Web development * API / cryptography / data verification experience * Aadhaar / KYC experience preferred ### Project Type Fixed p...

    €176 Average bid
    €176 Ortalama Teklif
    20 teklifler

    ...Transaction Transmission and Propagation o Network Verification Process • Mining and Consensus Basics o Bitcoin Mining Introduction o Spending the Transaction PART II: CRYPTOGRAPHIC FOUNDATIONS Chapter 3: Cryptographic Keys and Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 • Cryptographic Fundamentals o Public Key Cryptography o Why Use Asymmetric Cryptography? o Elliptic Curve Cryptography Explained o Private Keys and Public Keys • Address Evolution and Types o Output and Input Scripts o IP Addresses: The Original Address for Bitcoin (P2PK) o Legacy Addresses for P2PKH o Base58check Encoding o Compressed Public Keys • Modern Address Standards o Legacy Pay to Script Hash (P2SH) o P2SH Collision Atta...

    €19 / hr Average bid
    €19 / hr Ortalama Teklif
    52 teklifler

    ...Identity management (e.g. SAML, SSO, OIDC, SCIM, etc) security best practices. • Application and infrastructure security testing methodologies and tools. • Vulnerabilities (old and new), and options for defense / mitigation. • Product vulnerability management lifecycle. • Working with and/or supporting product engineering teams. • Security audits, penetration tests, and/or bug bounty programs. • Cryptography and cryptographic primitives. • Strong written and verbal communication skills. • Full SDLC Support for new product features being developed. This would include Threat Modeling, Design Review, Manual Code Review, Exploit writing, etc. • Work with other security teams to provide support for Incident Response and Vulnerability Respon...

    €124 Average bid
    €124 Ortalama Teklif
    31 teklifler

    I have to submit a 3,000-word portfolio that demonstrates how cryptography is used in real-world applications, and I need it back within 10 hours. The written part must concentrate on cryptographic applications—think secure messaging, blockchain, electronic voting, or any other use cases that clearly show theory meeting practice. Alongside the narrative, I want concise, well-commented code snippets (Python preferred, but another mainstream language is fine if justified) that readers can run straight away. Here’s what I expect: • 3,000 words ± 5 %, focused on applied use cases. • At least two runnable examples that compile or execute without extra setup—common libraries such as Python’s cryptography or PyCrypto are OK. • Cl...

    €170 Average bid
    €170 Ortalama Teklif
    60 teklifler

    I’m kicking off the Finternet App—the first of two products in our roadmap—and I need a front-end specialist who can translate heavyweight finance and cryptography into an experience that feels light, clear, and agentic. Tech stack & collaboration You’ll lead the React, and TypeScript front-end, plugging into APIs from our blockchain, cryptography, and settlement teams. Expect daily access to domain experts who can clarify protocol-level details so you can stay focused on UX. Scope of work The initial milestone concentrates on four pillars: • Financial transaction management with real-time status updates • Cryptographic operations management—signing, verification, and key handling surfaced cleanly to users • Unified ...

    €13 / hr Average bid
    €13 / hr Ortalama Teklif
    54 teklifler

    I am looking for a skilled cybersecurity or cryptography developer who can build an advanced AES encryption/decryption system on Kali Linux. The system should include: AES‑256 encryption and decryption Secure key handling Command‑line interface (CLI) or GUI Optionally: hashing, key‑derivation (PBKDF2/Argon2), or file‑level encryption Clean and documented code (Python or C preferred) Experience with Kali Linux, OpenSSL, Python cryptography libraries, or custom AES implementations is required.

    €11 / hr Average bid
    €11 / hr Ortalama Teklif
    13 teklifler

    ...Questions (Must be answered in the proposal) 1. Do you have prior experience in designing or analyzing block ciphers, not just implementing existing algorithms such as AES? 2. Have you ever performed differential or linear cryptanalysis on a cipher? 3. Are you theoretically familiar with SPN and Feistel structures? 4. Have you contributed to or co-authored any academic publication in security or cryptography? 5. Can you formally define IND-CPA security and explain how it can be tested experimentally?...

    €423 Average bid
    €423 Ortalama Teklif
    92 teklifler

    ...FastAPI endpoint. 2. Your service signs that XML with the .p12 certificate I supply, then inserts the required QR code. 3. It forwards the signed file to the target URL I will provide. 4. Whatever the remote server returns comes back as JSON; simply pass that JSON straight through to the original caller. Technical notes • Target stack: Python 3.x, FastAPI, async/await. Feel free to use cryptography, PyOpenSSL, or any reliable library for handling the .p12 signature, and qrcode or similar for QR generation. • Please handle the certificate in memory only and remove any temp artifacts after use. • No GUI is needed—just a clean REST endpoint and clear logging. Deliverables • FastAPI app exposing a POST /process (or comparable) route. •...

    €18 / hr Average bid
    €18 / hr Ortalama Teklif
    105 teklifler

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    €84 Average bid
    €84 Ortalama Teklif
    5 teklifler

    ...Implementation of these components in Python as part of a modular encryption framework Requirements: Strong experience in Python Familiarity with cryptography, block cipher structures, or mathematical algorithms Good understanding of neural networks (NN) and ideally XAI techniques Full confidentiality — all code, ideas, and files must remain my property and cannot be reused or shared Workflow: I provide a general overview to confirm your understanding. We agree on milestones and delivery steps. After signing an NDA, you will receive the complete technical design and detailed requirements. Please send me: Examples of related work (cryptography, AI, algorithmic projects, etc.) Your estimated timeline Your proposed cost Thank you, and I look forward to wor...

    €128 Average bid
    €128 Ortalama Teklif
    43 teklifler

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    €85 Average bid
    €85 Ortalama Teklif
    1 teklifler

    ...modern blockchain technologies. Candidates from Dhanbad and Jharkhand will be given the highest preference. But the opportunity is open for all candidates from Jharkhand only. Mandatory Technical Skills (Core Blockchain Skills)Blockchain Fundamentals Strong understanding of Blockchain architecture Understanding of decentralized systems (P2P networks, consensus algorithms) Knowledge of hashing, cryptography, wallets, nodes, miners/validators Smart Contract Development: Solidity (Mandatory) Experience with Ethereum, BNB Chain, Polygon, Solana, etc. Understanding of ERC-20, ERC-721, ERC-1155 standards Smart contract testing frameworks (Hardhat, Truffle) Gas optimization techniques Backend & Web3 Development: , Node.js (Express/) for backend services REST & GraphQL AP...

    €238 Average bid
    €238 Ortalama Teklif
    12 teklifler

    I’m working on a university coursework module centred on Data Encryption, with an explicit emphasis on Asymmetric Encryption. The assignment is theory-heavy but still expects algorithmic clarity, so I need concise, well-structured written answers that: • Explain core asymmetric concepts (key generation, encryption/decryption flow, mathematical underpinnings) in plain language suitable for an academic submission. • Compare at least two algorithms—RSA is mandatory, and you may contrast it with ElGamal, ECC, or another relevant scheme—to highlight strengths, weaknesses, and typical use-cases. • Provide clean, language-agnostic pseudocode for each algorithm section (key generation, encryption, decryption, signature where applicable). Comment each step so t...

    €108 Average bid
    Acil
    €108 Ortalama Teklif
    8 teklifler

    I’m looking for someone who can take me from concept to store-ready builds of a fully private messenger that r...two devices on each platform, verified in TestFlight / internal track. – Independent inspection confirms that messages stored on the server are indecipherable. – No crashes during a 48-hour soak test with at least 100 concurrent conversations. – Complete source code, build scripts, and minimal setup guide delivered before sign-off. If you’ve shipped secure chat apps before—or have deep cryptography experience—let’s talk specifics and map out the milestones together. Please also list the requirements for such a business, and your estimates on monthly expenses. Keep it short and be direct in proposals, I don't wa...

    €1098 Average bid
    €1098 Ortalama Teklif
    136 teklifler

    I need an expert to protect personal data using cryptography. The primary technique to be used is hashing. Key requirements include: - Expertise in cryptographic techniques, especially hashing - Experience with data protection regulations - Ability to implement secure hashing algorithms Ideal Skills: - Strong background in cybersecurity - Familiarity with various hashing algorithms - Knowledge of compliance standards for personal data protection

    €19 Average bid
    €19 Ortalama Teklif
    9 teklifler

    ...Firebase. The key is the hash itself, or the hash is indexed against a unique registration ID. DB stored: [ID, H, Creator ID, Timestamp]. 4. Return Flask returns a Flask ID Registration ID (or a combination of the hash ->Frontend The unique ID (the "signature" you mentioned). and creator ID) to the user. The key returned to the user is not a traditional digital signature (which involves Public Key Cryptography), but rather a Proof of Prior Registration. The "Signature" is the Verifiable Information needed to check the Ledger: Signature/Proof = Registration ID + Timestamp The real "signature" is the stored hash $H$ itself, because only the original content can re-generate that exact hash. 3. Verification Phase (The Check) If a third-party finds the...

    €51 Average bid
    €51 Ortalama Teklif
    12 teklifler

    I need a seasoned cryptography specialist to review our existing encryption protocols, key-management setup and digital-signature workflows with one clear objective: prove that everything we run can stand up to recognised standards and regulations. Here’s what the engagement will look like: • You receive full technical documentation and limited test-environment access to the three areas in scope. • You analyse algorithm choices, key sizes, entropy sources, storage and rotation practices, signature generation and verification paths, plus any supporting libraries or HSM integrations. • You map each finding to the most relevant benchmark—Saudi NCS, NIST guidance, FIPS 140-3, ISO 27001 Annex A controls, ETSI, or comparable frameworks—highlighting a...

    €8160 Average bid
    €8160 Ortalama Teklif
    4 teklifler

    I’m putting together the written component of a university-level course project on cryptography and data protection, and I want the documentation to revolve squarely around modern encryption techniques. The content must walk students step-by-step through symmetric encryption, asymmetric encryption, and the most common cryptographic hash functions, explaining how each works, why it matters, and where it is typically applied. What I need from you is a clear, well-structured document (approximately 25–30 pages, though quality comes first) that blends theory with concise, real-world examples. Include diagrams or simple code snippets where they genuinely help comprehension, but keep the narrative accessible to students encountering these ideas for the first time. Deliverab...

    €108 Average bid
    €108 Ortalama Teklif
    29 teklifler

    ...recovery, 2FA enrolment and email relay configuration Acceptance The app must compile and run on Windows 10/11, lock on inactivity, and refuse to open the vault without the correct master password plus second factor when enabled. All secrets should remain encrypted when at rest and must not be retrievable in plain text by simple file inspection. If you have relevant experience with desktop cryptography, WinUI/WPF, and 2FA integration, I’d love to see a quick outline of your proposed tech stack and timeline....

    €80 Average bid
    €80 Ortalama Teklif
    12 teklifler

    ...in the full Signal protocol—X3DH for the first handshake, ECDH+Double Ratchet for forward secrecy, AES-GCM-256 with HKDF-HMAC-SHA-256 for payload protection. On paper everything looks correct, yet in practice messages still slip out in plaintext or throw a “failed to send” error whenever the recipient hasn’t generated keys or an old session is corrupted. What I need now is an experienced cryptography engineer who has actually debugged Signal-based stacks to step in right away, review my current implementation and make the encryption rock-solid. The most pressing pain point is the message-encryption phase itself; sessions sometimes never initialise or silently fall back to no cipher at all. Deliverables I expect: • Diagnose why sessions aren&rs...

    €19 / hr Average bid
    €19 / hr Ortalama Teklif
    39 teklifler

    ...memadai untuk keperluan forensik. • Lakukan penetration testing pascapenerapan dan serahkan laporan uji lengkap beserta rekomendasi lanjutan. • Dokumentasi teknis singkat agar tim internal dapat memelihara peningkatan ini di masa depan. Keahlian yang saya cari • Pengalaman mendalam dalam secure coding untuk aplikasi desktop (mis. C#, Java, atau C++). • Familiar dengan praktik OWASP, cryptography, dan penetration testing tools seperti Burp Suite atau OWASP ZAP. • Mampu menyusun dokumentasi yang ringkas namun komprehensif. Batas waktu sudah saya tetapkan secara ketat; jelaskan estimasi durasi Anda ketika mengajukan proposal. Proposal akan saya nilai berdasarkan: 1. Kedalaman solusi keamanan yang ditawarkan. 2. Relevansi portofolio dan sertif...

    €14 / hr Average bid
    €14 / hr Ortalama Teklif
    10 teklifler
    Trophy icon ThinkBox Secure Logo Design
    Bitti left

    Logo Design Contest: ThinkBox - Secure Desktop Environment About ThinkBox: ThinkBox is a cutting-edge secure desktop environment built for Jetson Nano hardware. It combines advanced hardware security (secure element cryptography), HID forwarding, low-latency video streaming, and a modern desktop interface with a sleek, glass-morphism design aesthetic. ThinkBox bridges the gap between secure embedded computing and professional desktop environments. What We're Looking For: We need a professional, modern logo that represents innovation, security, and intelligent computing. The logo should: - Convey security, trust, and technology - Incorporate or be inspired by the "box" concept (but don't feel constrained by it) - Work well in both light and d...

    €8 Average bid
    €8
    217 girdi

    I need an experienced developer who has **proven experience** with the Wise (formerly TransferWise) API, specifically with Strong Customer Authentication (SCA) for accessing balance statements. ### Current Situation - We have a Node.js/Express backend appli...Verified key pair matches (modulus comparison) - Deployed to production with all fixes - Still getting `x-2fa-approval-result: REJECTED` from Wise **If you've solved Wise SCA authentication issues before, this is the job for you.** --- ## Skills Required - Wise API - TransferWise API - SCA Authentication - RSA Signatures - Node.js - - Webhook Implementation - API Integration - Cryptography **Payment**: Milestone-based - 50% when you successfully sync transactions from Wise API - 50% when webhooks are working and ver...

    €26 / hr Average bid
    €26 / hr Ortalama Teklif
    185 teklifler

    I’m expanding my development team with a dedicated encryption authority who can take ownership of all cryptographic decisions and implementation details. We’re already integrating AES, RSA and Elliptic Curve Cryptography (ECC) into our stack; what we need now is someone who can guide the work, spot weaknesses early, and translate cryptographic theory into production-ready code that the whole team can understand and maintain. Beyond writing rock-solid routines, you’ll review the existing encryption layer, explain best practices in plain language to the other engineers, and stay available for quick consults as features evolve. A passion for secure key management, side-channel resistance and performance optimisation will make you a perfect fit. Deliverables I’...

    €17 / hr Average bid
    €17 / hr Ortalama Teklif
    10 teklifler

    I need a concise yet academically...so a final-year undergraduate can follow it. • Include a fully worked numerical example showing all relevant modular-exponentiation calculations. • Analyse advantages and limitations, clearly stating why the scheme is secure (discrete-log problem) and where it is vulnerable (small prime groups, man-in-the-middle, quantum threats). • Compare Diffie-Hellman with RSA, AES, and lightweight cryptography (LWC), noting when each is preferred. Target length is about 1,200–1,500 words. Please deliver the text in an editable format (Word or LaTeX) along with a compiled reference list. I’ll consider the task complete once the introduction slots cleanly into my template, citations resolve correctly, and all five content point...

    €116 Average bid
    €116 Ortalama Teklif
    22 teklifler

    I have a challenge-style cryptography question that ends with a hidden flag. I need someone to fully decrypt the message, capture the flag, and write a clear, reproducible report. Scope • Analyse the ciphertext, identify the probable encryption scheme, and perform the full decryption process. • Document every step you take—commands, tool settings, scripts, or manual reasoning—and include a screenshot after each major action. • Add a concise note under each screenshot explaining what was done and why it worked. • Conclude with the recovered flag and a short summary of lessons learned. The report must be self-contained, easy to follow, and delivered in PDF (screenshots embedded) plus any scripts you create. Feel free to use tools such as Cyber...

    €73 Average bid
    €73 Ortalama Teklif
    17 teklifler

    I’m building a new blog that spotlights tomorrow’s technologies, and I’d like to kick things off with a series of ...reshaping everyday life. • Original content only, optimized for on-page SEO (compelling headlines, sub-headings, meta description, and a handful of relevant keywords). • A short takeaway section at the end of every article to encourage shares and discussion. Optional room to grow: once the AI series is live, I may branch into Quantum Computing (with pieces on Quantum Algorithms, Hardware, and Cryptography), so a writer comfortable with both fields is a plus. I’ll provide target keywords and a simple style guide; you deliver the polished drafts in Google Docs, ready for publication. If you enjoy translating complex tech into ...

    €13 / hr Average bid
    €13 / hr Ortalama Teklif
    126 teklifler

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    €18054 Average bid
    Gizlilik Anlaşması
    €18054 Ortalama Teklif
    19 teklifler

    I’m putting together a Jeopardy-style Capture-the-Flag event and need a collection of fresh, advanced-level puzzles. The board will cover three core categories—Cryptography, Forensics, and Web Exploitation—so every challenge you craft should push seasoned players while staying fair and solvable. Here’s what I expect to receive: • 10–12 original challenges evenly split across the three categories • A short story-style prompt for each task, the exact flag format, and the intended solve path • An accompanying write-up that explains the solution in detail (commands, tools, or scripts used) • Any necessary artifacts: PCAPs, vulnerable web apps, encrypted files, or compiled binaries • A quick validation script or manual step...

    €79 Average bid
    €79 Ortalama Teklif
    7 teklifler

    I’m putting together a new Jeopardy-style Capture-the-Flag event aimed squarely at seasoned competitors. I need a full suite of original, high-difficulty tasks across three pillars—Cryptography, Reverse Engineering, and Web Exploitation. Each challenge must include a clear flag format, an authoritative write-up explaining the intended solve path, and any auxiliary files, binaries, or dockerised services needed for local testing. What I’ll count as a complete delivery: • 3-5 Cryptography puzzles featuring modern primitives or clever protocol flaws, each solvable without brute-forcing. • 3-5 Reverse Engineering binaries (Linux or Windows PE) that showcase obfuscation, unusual calling conventions, or anti-debug tricks. • 3-5 Web Exploitati...

    €72 Average bid
    €72 Ortalama Teklif
    13 teklifler

    ...• Encrypted audit trail generation (PDF + AWS S3) • Basic dashboard for API usage logs • API key management and rate limiting • Optional: Stripe or Paddle integration for subscription billing Preferred Tech Stack • Backend: Python (FastAPI) or Node.js • Cryptography: liboqs (Open Quantum Safe), TLS 1.3 hybrid • ZK Proofs: Circom or Noir • Storage: AWS S3 • Deployment: Docker + Hostinger KVM 4 or AWS EC2 • Monitoring: Prometheus or Datadog Before We Proceed, Could You Confirm: 1. Have you worked with post-quantum cryptography (Kyber, Dilithium) or liboqs before? 2. Are you comfortable building modular APIs with secure endpoints and encrypted audit trails? 3. Would you be open to integrating zero-knowledge proof sys...

    €1333 Average bid
    €1333 Ortalama Teklif
    83 teklifler

    Önde Gelen cryptography Topluluk Makaleleri