Sha 256 decryption työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    5,169 sha 256 decryption työtä löytyi, hinnoittelu EUR
    Substitution Cipher 6 päivää left

    Encryption with Key and Decryption WITHOUT key

    €16 (Avg Bid)
    €16 Keskimäär. tarjous
    8 tarjoukset
    Project for Anh D. 8 päivää left

    Hi Anh D., We just talked about the encryption/decryption testbed.

    €514 (Avg Bid)
    €514 Keskimäär. tarjous
    1 tarjoukset

    The application should use openssl libraries. The user upload a file to encrypt/decrypt. The application can show the performance/metrics of encryption like time and memory. The user can select the different algorithm and mode on the application.

    €151 (Avg Bid)
    €151 Keskimäär. tarjous
    9 tarjoukset
    Re-build a wordpress theme 19 tuntia left
    VARMENNETTU

    I need to have a wordpress theme created, from an existing website design. It's an existing theme, but the developer abandoned the project many years ago. I don...walks you through the entire backend, so it can be re-created. The website is [kirjaudu nähdäksesi URL:n] The YouTube video is [kirjaudu nähdäksesi URL:n]

    €392 (Avg Bid)
    €392 Keskimäär. tarjous
    51 tarjoukset
    Project for Shilian S. 2 päivää left

    Hi Shilian S., This me, my real profile, we just talked on the encryption and decryption app

    €804 (Avg Bid)
    €804 Keskimäär. tarjous
    1 tarjoukset

    ...need to be equal in each bracket (e.g. 8 players, 16 players, 32 players, 64 players, 128 players, 256 players, etc). It is quite hard to run a tournament quickly with more than 256 players as it requires too many rounds to finish, (i.e. if Round 1 is 256 players = 128 games. Round 2 is 128 players = 64 games. Round 3 is 64 players = 32 games. Round 4

    €395 (Avg Bid)
    €395 Keskimäär. tarjous
    6 tarjoukset

    Public Function smethod_0(rsacryptoServiceProvider_0 As RSACryptoServiceProvider, byte_0 As Byte()) As Byte() If byte_0 Is Nothing Then Throw New ArgumentNullException("data") End If If [kirjaudu nähdäksesi URL:n] Then Throw New InvalidOperationException("Private key is not loaded") End If Dim num As Inte...

    €44 (Avg Bid)
    €44 Keskimäär. tarjous
    3 tarjoukset

    Hello, we are in need of an APK app that connects with Stalker/Xtream-codes API just like MAG 254 / 256 box. This app should be able to support Live TV, VOD, Recording, TV Series etc through a web portal and/or m3u. Interface can be similiar to MyTV Online or STB emulator, if you wish to have pictures or videos we can send you that.

    €1208 (Avg Bid)
    €1208 Keskimäär. tarjous
    16 tarjoukset
    Solving 256 Loppunut left

    Need math expert with good progaming skills to help sovle math formula to be implemented in new software

    €47 / hr (Avg Bid)
    €47 / hr Keskimäär. tarjous
    26 tarjoukset

    I am looking for someone to help me design my Kajabi platform for many products that I have on offer. There will be ongoing work...first job of helping to custom design a membership site that I created. Those apply must have experience working with Kajabi. Please respond back to this ad by saying Boo ya ka sha in the subject or first line or your bid.

    €402 (Avg Bid)
    €402 Keskimäär. tarjous
    7 tarjoukset

    Implemented hybrid encryption algorithm (AES+ EHC) to obtain: • The average time for encryption/decryption for DES, AES, EHC and THE HYBRID ALGORITHM (EHC + AES). • The memory consumption for each. • Throughput consumption for each. • The power consumption for each. more information will be provide

    €88 (Avg Bid)
    €88 Keskimäär. tarjous
    2 tarjoukset

    ...compromise: yum-config-manager --save --setopt=mysql80-community-source.skip_if_unavailable=true failure: repodata/[kirjaudu nähdäksesi URL:n] from mysql80-community-source: [Errno 256] No more mirrors to try. [kirjaudu nähdäksesi URL:n]: [Errno 14] curl#6 - "Could not resolve host: [kirjaudu nähdäksesi URL:n]; Unknown error"

    €20 (Avg Bid)
    €20 Keskimäär. tarjous
    8 tarjoukset

    I would like to modify an application that I already have, by adding features and tweaking some ...issues that occur. The application is a testing application that's used for training purposes. I would like to add EMV functionality to it, as well as user interface for decryption module. Development will require access to Verifone SDK and EMV module.

    €398 (Avg Bid)
    €398 Keskimäär. tarjous
    4 tarjoukset

    Hi Free Lancers! I need you to build me a website or a software with 128/256 bit security used in online transactions. Once I get a good Freelancer, I'll let you know all the details.

    €94 (Avg Bid)
    €94 Keskimäär. tarjous
    4 tarjoukset

    ...Шифрование не должно продолжаться, после включения компьютера должно показаться окно с пиветствием. Это можно использовать как остановку шифрования. 2) Алгаритм шифрования AES 256 CFB без аппаратной поддержки 3) Весь текст (текст который юзер увидит при шифровании, приветствии) должен указываться в самой программе 4) Всего получается 2 бутлоадера: -- 1)

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    Rate is:- 0.30$ per 100 words and hence 1.50$ for 500 words content writing. Looking for an article/blog/review writer on the given topics. It might be a long-term position. I am looking for full time content writers who can deliver 2000/2500 words articles on various topics. Also, there will be regular work and long term collaboration is expected. Very flexible with timing and every transaction...

    €4 / hr (Avg Bid)
    €4 / hr Keskimäär. tarjous
    27 tarjoukset

    we are into education software, to update or maintain we need experiance java developer. Project Deta...Netbeans Front End Design: Netbeans GUI Builder (Swing) External Libraries: -JXL (to read from Excel Files) -Apache Word POI (for writing doc files) Other Features: Keybased SHA-1 Encryption for Serial Keys Extra Fonts used for Marathi and Hindi

    €111 (Avg Bid)
    €111 Keskimäär. tarjous
    10 tarjoukset

    Rate is:- 0.30$ per 100 words and hence 1.50$ for 500 words content writing. Looking for an article/blog/review writer on the given topics. It might be a long-term position. I am looking for full time content writers who can deliver 2000/2500 words articles on various topics. Also, there will be regular work and long term collaboration is expected. Very flexible with timing and every transaction...

    €3 / hr (Avg Bid)
    €3 / hr Keskimäär. tarjous
    8 tarjoukset
    Servi Tienda Loppunut left

    ...Laravel o MERN • Exposición de servicios de API a través de JSON • Desacoplamiento de la base de datos. Certificados • Requiere certificado digital TLS 1.2. con criptografía SHA-2 o superior. Gestion de Fuentes • Repositorio en Git. Logs • Requiere opción de visualización de Logs a nivel de operaciones de usuario y transaccio...

    €1110 (Avg Bid)
    €1110 Keskimäär. tarjous
    21 tarjoukset

    Hi Fozia. Next project is to insert...In this case products like this one: [kirjaudu nähdäksesi URL:n] 256 products but as they have 6 combinations aprox. 256 / 6 around 50 products with combinations. Each product as you can see 3 to 5. This is an estimation. Thank you.

    €70 (Avg Bid)
    €70 Keskimäär. tarjous
    1 tarjoukset

    We have a very big number (1 to 2^256) it is (Integer not float) this number is hidden, we can't look at its value, but we can measure it to see if it is one or 0.5 or 0.25 or 1/3 or any other numbers we can use only operators (+ , - , / , *) , it means we can add-sub-div-multiply it with any number (integer or float) we want to know any information

    €129 (Avg Bid)
    €129 Keskimäär. tarjous
    19 tarjoukset

    I need the ...access in the server. The app must NOT store any encryption in the phone , we need new and very secure protocol to make the authentication and verification and encryption and decryption Websites you must see : [kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] You must have very deep knowledge in Lattice cryptography ( this is for the quantum comput...

    €6865 (Avg Bid)
    €6865 Keskimäär. tarjous
    33 tarjoukset

    ... Adrees. La aplicación debe permitir configurar un rango de números de 10 dígitos y empezar a hacer la recolección de la data. Importante acotar que se cuenta para ello con 256 IPs públicas por lo cual se requiere para evitar bloqueos que el algoritmo cambie la ip de la máquina donde se ejecute cada cierto número de consultas o aleatoriame...

    €108 (Avg Bid)
    €108 Keskimäär. tarjous
    18 tarjoukset
    Trophy icon Make an icon Loppunut left

    I need a icon for a program called Sleepy that is used to control servers/computers powerstate I would like something simple and with very few details. Size: 256 x 256 px Filetype: .ico, .png

    €17 (Avg Bid)
    €17
    27 työtä

    ...Arquitectura y framework requeridos para la fase I Wordpress + woocommerce +dokan Angular js Php Java mysql Importante .- Se ha generado un certificado de seguridad tipo token de (sha), el mismo que es generado para implementar pagos en línea. A futuro se requiere actualizar la versión móvil es decir crear app utilizando el framework de cordova para así reu...

    €1093 (Avg Bid)
    €1093 Keskimäär. tarjous
    12 tarjoukset

    ...An better Design then the most got. 2. Solomining possible. 3. Automatik switch to an more profitable Coin and payout in the Currency the User want. 4. avaibel for X11, Sha-256, Scrypt, ethash, equihash If possibel also to do for me, that i can add Coins and delete Coins when they aren´t profitable. 5. Automatik payouts 6. The User can invest in

    €120 (Avg Bid)
    €120 Keskimäär. tarjous
    3 tarjoukset

    ...com/video-1?cf_uvid=86158359ef3b34f4d6805d83505540d0 2) Link text color for single post: [kirjaudu nähdäksesi URL:n] 3) Fix WP MEMORY LIMIT to 256 and update all WPML plugin 4) Add domain Slovenia: [kirjaudu nähdäksesi URL:n] in cloudflare then add in WPML 5) Add domain Croazia: [kirjaudu nähdäksesi URL:n] in cloudflare

    €5 / hr (Avg Bid)
    €5 / hr Keskimäär. tarjous
    5 tarjoukset

    ...mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB mode) would produce the best performance results (encryption/decryption time, memory power, power usage)? Expected Contribution Performance comparison of four encryption algorithms AES256(ECB mode), ChaCha 256 (20 rounds), Speck 256 (ECB mode) and Speck small 256 (ECB...

    €9 (Avg Bid)
    €9 Keskimäär. tarjous
    1 tarjoukset
    create the video Loppunut left

    we have health brand heart can feel, which provide the gua sha tools for the customer who need gua sha as daily healthcare. we are looking forward people who can create video for our brand. The video will show the products, the features, the advantage and how to use the products.

    €424 (Avg Bid)
    €424 Keskimäär. tarjous
    51 tarjoukset

    moved from one server to another a error is coming up on bank transaction.

    PHP
    €93 (Avg Bid)
    €93 Keskimäär. tarjous
    6 tarjoukset
    Wsn encryp Loppunut left

    ...Requirements: Create simulation with Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using RC4 encryption with different key size range starting from : 64,128 and 256 bit. Matlab for Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design Using Rabbit Encryption Deliverables: Matlab code Flowchart Data reports : Bit error rates, Cipher size

    €148 (Avg Bid)
    €148 Keskimäär. tarjous
    6 tarjoukset
    Trophy icon TLS 1.2 implementation debugging Loppunut left

    I develped a C++ web development framework. Currently working on TLS functionality.(DHE RSA AES128 SHA) It is almost done. But one thing is a problem. I cannot let it communicate with real world browsers or programs in case of TLS. It can communicate with my own client. So I am implementing something wrong. First picture shows that the middle

    €44 (Avg Bid)
    Taattu
    €44
    0 työtä

    ...sequence of unsigned characters that represent a ** big-endian integer. Return the equivalent native integer */ #define ONE_BYTE_INT(x) ((i8)(x)[0]) #define TWO_BYTE_INT(x) (256*(i8)((x)[0])|(x)[1]) #define THREE_BYTE_INT(x) (65536*(i8)((x)[0])|((x)[1]<<8)|(x)[2]) #define FOUR_BYTE_UINT(x) (((u32)(x)[0]<<24)|((x)[1]<<16)|((x)[2]<<8)|(x)[3]) #define

    €1131 (Avg Bid)
    €1131 Keskimäär. tarjous
    20 tarjoukset

    You must understand hashes and encryption for this is a long-term project. So, i require advanced freelancers

    €2069 (Avg Bid)
    €2069 Keskimäär. tarjous
    25 tarjoukset
    Simplified-DES Loppunut left

    Implement an encryption function that pe...generation schemes. Use binary plaintext (i.e. 100010110101 and key = 111000111) and print out the bit strings of L1R1, L2R2, L3R3, L4R4. Implement a decryption function that performs one round of decryption using the S1 and S2 boxes, and decrypts the L4R4 while printing out the bit strings of L3R3,L2R2,L1R1.

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    6 tarjoukset

    replicate in java or python a request with digital signature sha-256, from a android app

    €22 (Avg Bid)
    €22 Keskimäär. tarjous
    5 tarjoukset

    replicate in java or python a request with digital signature sha-256, from a android app

    €26 (Avg Bid)
    €26 Keskimäär. tarjous
    2 tarjoukset

    replicate in java or python a request with digital signature sha-256, from a android app

    €106 (Avg Bid)
    €106 Keskimäär. tarjous
    9 tarjoukset

    We want to create a ...Page will have the following items. One or more download files, Each file will have the following information Download File Version Info Repository Version Date File Size SHA 256 Each file will then also have List of Issues Fixed List of Known Issues Then one more section with installation information for OSX, Windows, Linux

    €97 (Avg Bid)
    Taattu
    €97
    20 työtä

    ...with a PIN Code possible that has at least 6 digits (lengs can be determined by the user). All Communication must be stored in a encrypted container on the phone / with AES-256. The encrypted container muss be linked with the PIN Code. If you enter 3, 5, 10 etc. times (determined by the user) the wrong PIN Code, the encrypted container need to be

    €2946 (Avg Bid)
    €2946 Keskimäär. tarjous
    51 tarjoukset

    ...eJabberd server (depends on the client wishes) -> XMPP database server. The UMS (User Management System) must be realtime connected with the XMPP database server using a secure SHA hash on the same cloud-server using a specific port connection. The OpenFire + eJabberd host must be also IP blocking and Port blocking instead of certain ports that are needed

    €177 (Avg Bid)
    €177 Keskimäär. tarjous
    7 tarjoukset

    Cloud service on Java We encrypt data. We want to add encryption rounds to the AES algorithm. At the moment, we use the key length of 256 bytes. We want to do everything is not noticeable. For example, modify system libraries and extension libraries. What we already did: We have already started to solve this problem. Modify two libraries $JAVA_HOME/jre/lib

    €480 (Avg Bid)
    €480 Keskimäär. tarjous
    13 tarjoukset

    I want make an app to hide,stored PDF files in android device by using AES-256 algorithm. Android App should allow encryption and decryption of Pdf File using AES-256 algorithm. Encrypted file should not be accessed in android [kirjaudu nähdäksesi URL:n] can be accessed only by app.

    €14 (Avg Bid)
    €14 Keskimäär. tarjous
    4 tarjoukset

    ...through any Arculus system or platform. Not only can Arculus not decrypt the email messages, Arculus never comes into contact with the email messages as all encryption and decryption occurs client-side on each user’s mobile device. PHASE ONE (this project) – BASIC APPLICATION FUNCTIONALITY Phase One of the application project is designed to simply get

    €1230 (Avg Bid)
    €1230 Keskimäär. tarjous
    67 tarjoukset

    ...the information with RSA decryption algorithm and stores it in the database c. Post encrypted information and display plain information - RSA and DES: i. A successful login user posts an encrypted DES key (chosen by the user) to the server with RSA encryption algorithm ii. The server retrieves the DES key with RSA decryption algorithm and keeps the

    €111 (Avg Bid)
    €111 Keskimäär. tarjous
    23 tarjoukset

    (1)Key generation. (2)Encryption. (3)Decryption. Hint: (i)For key generation, input the original key and generate round keys. (ii)For encryption, input a sentence, convert it to ASCII codes, divide it into blocks, encrypt each block with the round keys, and output the ciphertext of the sentence. (iii)For decryption, input the ciphertext (cut/paste)

    €86 (Avg Bid)
    €86 Keskimäär. tarjous
    5 tarjoukset
    JavacardFP Loppunut left

    I am looking for a software developer who is familiar with the following technologies: Javacard, Electron, Nodejs, Fingerprint scanner, Card reader I want someone to ...Scans a fingerprint, creates a template and sends to the javacard for storing or for verification. Besides, I want to send a 'string' to the card and let it to calculate SHA on it.

    €6300 (Avg Bid)
    €6300 Keskimäär. tarjous
    30 tarjoukset
    java programming Loppunut left

    ...While, Do-While) Count from 1-10 by 1s 3 loops total Create a static method called Task2 In the static method Task2 Using all three loops (For, While, Do-While) Count from 2-256 by powers of 2 2,4,8,16,32,64,128,256 3 loops total Create a static method called Task3 In the static method Task3 Using all three loops (For, While, Do-While) Count from 100-1

    €17 (Avg Bid)
    €17 Keskimäär. tarjous
    18 tarjoukset