Cryptography jobs


My recent searches
Filter by:
    Job State
    2,827 cryptography jobs found, pricing in USD

    I'm seeking a knowledgeable individual in the field of cryptography and computer science ethics to provide tutoring and assistance. Key Requirements: - Proficient in encryption algorithms, hash functions, digital signatures, and able to explain them clearly - Familiar with Python, Java, and C++, and capable of guiding me through implementing algorithms in these languages - Competent in solving exercises related to these concepts - Experience in academic writing to help me with my queries and understanding Your Role: - Explain and simplify complex cryptography concepts, such as encryption algorithms, hash functions, and digital signatures - Assist in implementing these algorithms in Python, Java, and C++ - Guide me in solving exercises related to these topics - Help me ...

    $504 (Avg Bid)
    $504 Avg Bid
    39 bids

    ...experience in the fields of blockchain and industrial IoT. The task is to design and realise a supply chain system with the following components: - Sensing Devices: To gather real-time data, the architecture of this system needs to be compatible with hardware devices like Raspberry Pi, hubs, or routers, needed to add privacy to network devices such as AES or use key exchange like D-H post-quantum cryptography etc. - Blockchain Key Functions: The blockchain application should deliver robust features like real-time data tracking, smart contract automation, and enhanced supply chain transparency. - Scalable Structure: The proposed solution should be scalable to handle excessive data, possibly with the use of cloudDB. Key skills required include: - Expertise in blockc...

    $3769 (Avg Bid)
    $3769 Avg Bid
    23 bids
    FUD Cryptography for .Net Exe 2 days left

    I have a C++ executable file that I need to be thoroughly encrypted and protected from Windows Defender detection. The resulting crypted file should be FUD (Fully UnDetectable) by Windows Defender. The key requirements are to employ advanced strategies for security reinforcement. - The encryption should involve file compression techniques to make the crypted file smaller in size. - The code obfuscation process must ensure that the crypted file is difficult to reverse-engineer, with the original code being obscured. - The crypter should also implement anti-analysis techniques to prevent malware analysis tools from dissecting the file. The ideal candidate should be well-versed in crypting techniques, especially for .NET files, and have a good understanding of Windows Defender. Previous ex...

    $38 (Avg Bid)
    $38 Avg Bid
    31 bids

    I require a skilled cryptographer for the analysis of Bitcoin crypto wallet transactions. The project primarily necessitates tracking the origins and destinations of these transactions. Your responsibilities are not limited to tracing transaction trajectories, but also encompass ensuring the utmost level of data security throughout the process. Ideal skills: • Proficiency in cryptography • Familiarity with Bitcoin cryptocurrency • Competency in blockchain technology analysis • Strong knowledge in data security Experience in working with crypto wallet transactions is highly valued. Your input will contribute greatly to a robust and secure audit of the Bitcoin transactions.

    $7 - $18
    $7 - $18
    0 bids

    I'm in need of a skilled developer to create a robust cryptocurrency exchange platform. It should support the buying and selling...needs to be secure with two-factor authentication, ensuring user accounts are protected. - KYC verification is necessary to comply with legal requirements and prevent fraud. - Implementing cold storage for funds is essential to safeguard user assets against cyber threats. Ideal Skills: - Prior experience in developing cryptocurrency exchange platforms. - Proficiency in blockchain technology and cryptography. - Strong understanding of security features and best practices in the cryptocurrency industry. Please provide a portfolio of previous crypto exchange projects you've worked on, as well as a detailed plan on how you intend to implement th...

    $620 (Avg Bid)
    $620 Avg Bid
    13 bids

    I'm looking for a skilled professional who can solve advanced level CTF challenges, in various categories. I need someone who can tackle challenges in Web Exploitation, Binary Exploitation, Cryptography, as well as other categories like web, forensics, osint, and more. Key Responsibilities: - Solve advanced level CTF challenges in multiple categories Ideal Skills and Experience: - Extensive experience with CTF challenges - Proficiency in solving challenges in Web Exploitation, Binary Exploitation, Cryptography, web, forensics, osint, etc. - Proven track record of solving advanced level CTF challenges - An understanding of security concepts Please note that the specific programming languages or platforms to be used in solving the challenges are not specified, but yo...

    $645 (Avg Bid)
    $645 Avg Bid
    29 bids

    ...quantum cryptography project named "TANIA". This logo will be a central part of our branding and marketing efforts, symbolizing our commitment to cutting-edge security and technology. Design Requirements: 1. **Logo Name:** The logo must incorporate the name "TANIA". The name should be easily readable and stand out as the primary element of the logo. 2. **Symbol Integration:** Incorporate a stylized key into the letter 'T' of TANIA. This key should not only represent the traditional concept of encryption and security but also blend seamlessly with the modern and technological feel of quantum cryptography. (see picture attached) 3. **Style and Theme:** The overall style of the logo should be modern and sleek, reflecting the advanced and futu...

    $31 (Avg Bid)
    356 entries

    I'm seeking a skilled professional to create a solution designed specifically for encryption and decryption of cipher text. This cryptography project will focus strictly on the secure communication and data encryption of this particular type of text data. Ideal Skills and Experience: - Strong background in cryptography - Proven experience with cipher text - Familiarity with various encryption algorithms Please note, the specific algorithm to be used wasn't stated. However, your experience and advice will be crucial in determining the most suitable option. I would greatly value your expertise in suggesting the best route. Looking forward to your proposals.

    $10 - $30
    $10 - $30
    0 bids

    ...Kafka CI/CD integration Databases: RDBMS (MySQL, PostgreSQL) NoSQL (MongoDB) Query optimization, ORM/ODM (SQLAlchemy, Mongoose) Data warehousing, Distributed systems Machine Learning: Deployment Pipelines, Production management Data and Model Pipelines Neural Networks, Deep Learning, Algorithms Applied ML, Network Models Cybersecurity: IDS, SIEM tools, Network Security Linux, Cloud Computing, Cryptography Risk and Incident Management Database security Data Analytics: Tableau, Data Visualization Predictive Modeling, Kaggle EDA, Regression Analysis Project Management, Communication Additional Skills: Docker containerization Cloud platforms (AWS, Azure, GCP) Version control (Git, GitHub) CI/CD tools (GitHub Actions) The cover photo should be stylish and depict me . I am a gen...

    $12 (Avg Bid)
    27 entries

    ...It can maybe use a technology similar to Z Wave or Zigbee wireless technology, and maybe use a method like PairAsync for pairing or connecting. The app must have a high level of security using HTTP, SSL, TLS or similar, and must encrypt and decrypt all data during transit and at rest with advanced security features like LESC, and using systems such as, or similar to, FIPS 140-2 and AES-SHA256 cryptography. I would like to have copies of any written source code that is created by you or any details on the tech stack, SDK and APIs used. As the app could be using Bluetooth or BLE, I want users to be able to send and receive data without the requirement of having to prompt for, or give permission for, a “pairing” or “connecting” of devices each time they wish ...

    $891 (Avg Bid)
    $891 Avg Bid
    50 bids

    I'm seeking a developer with strengths in cryptography, blockchain, and who is proficient in Solana to help me develop a decentralized wallet application. This wallet application should have the ability to: - Create and manage multiple wallets. - Send and receive cryptocurrency. - Provide a clear and detailed transaction history. - Execute multichain swapping of digital assets. - Handle 2 custom coins designed for our ecosystem. In addition to these functionalities, the app must run on both iOS and Android operating systems. Moreover, I'd like to collaborate with someone who has a knack for developing user-friendly interfaces. Your expertise can assist us in providing a seamless and engaging user experience. Finally, if you have previous experience in ICO website deve...

    $708 (Avg Bid)
    $708 Avg Bid
    41 bids

    ...detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to embody the future project - H-index, CS Ranking(Computer Security and Cryptography) Given the long-term nature of this project, I'm looking for someone who is committed, reliable, and able to work independently. The selected professional will be expected to provide regular updates on their progress and deliver results in a timely manner. This opportunity is ideal for individuals who are passionate about cybersecurity and are looking for a challenging ...

    $1255 (Avg Bid)
    $1255 Avg Bid
    9 bids

    We're looking for a programmer skilled in scraping and converting APIs into PHP or Python code (reverse engineering)! If you have the following skills, join us: 1. Proficiency in JavaScript: Ability to work with this popular programming language and fully interpret and modify codes. 2. Knowledge of Cryptography: Ability to understand and use cryptographic algorithms and methods to comprehend how data is encoded and to transform unencrypted data. 3. Familiarity with Progressive Web Apps (PWA): Deep understanding of PWA structure and methods to bypass installation on iOS. 4. Experience with network monitoring and traffic analysis software such as Fiddler: Ability to use these tools for analyzing network traffic and related information, including identifying and addressing PWA...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    52 bids

    As the owner of a web-based platform, I've encountered a troublesome problem concerning Google Pay integration. Specifically, the issue lies within cryptography - however, the exact aspect of cryptography posing the problem remains unclear due to lack of further information. Therefore, I need an expert who possesses a deep understanding of payment processing systems, particularly Google Pay, and who is proficient with cryptographic systems on the web platform. Your tasks will include the following, depending on the discovered problem: - Debugging and resolving encryption problems - Sorting out decryption issues - Overcoming challenges related to key generation and management Despite the puzzle-like nature of the job, a meticulous and patient troubleshooter with stro...

    $75 (Avg Bid)
    $75 Avg Bid
    11 bids

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use t...

    $99 (Avg Bid)
    $99 Avg Bid
    8 bids

    ...a web-based application for iot edge device that focuses on securing sensitive data and minimizing packet loss using forward error correction techniques. This project will be a great opportunity for you to apply your knowledge of cryptography and networking concepts. Key Requirements: - The main aim of the project is to secure sensitive data using ECC based elgamal. - need to integrate this with forward error correction algorithms like reed solomon, ldpc. -integrate this with web based chat application Ideal Skills and Experience: - Proficiency in cryptography and packet loss concepts of networking - Experience with web application development - Understanding of ECC and elgamal -strong in forward error correction algorithms - Strong programming skills in languages th...

    $128 (Avg Bid)
    $128 Avg Bid
    2 bids

    I require a competent programmer to create a RSA (South African) drivers license decryption class library in C#. The library needs to take encoded strings (Barcode scan) as input and generate a decoded file as output. Key requirements: - Extensive experience with C# - Capability to handle encoded strings - Generate a decoded file ...required data. - The library need to work within a .NET Core 3.1 API. - A detailed explanation of how to use use this library needs to be provided. PLEASE NOTE: The focus is on creating a reliable and efficient library, hence a solid understanding of performance optimization is necessary. A strong grasp of cryptography, as well as drivers license formats would be beneficial.

    $143 (Avg Bid)
    $143 Avg Bid
    25 bids

    To win this contest you will need to have 5 selected design related to "Zero-Knowledge Proof" or "ZK Proof" concept which is a Blockchain and Cryptography and Math related topic. So feel free to be creative and not just stick to simple typography. I am willing to purchase as many as 60 designs at the same rate, so we might get multiple winners or I will deal with you after the contest ends. Capitalisation: either "Zero-Knowledge Proof" or "ZERO-KNOWLEDGE PROOF" Here are the quotes you can choose from: Zero-Knowledge Proof: Because my secrets are too good to share. I'm like a Zero-Knowledge Proof — complex, mysterious, and verifiable Trust me, I'm a Zero-Knowledge Proof expert. No further questions, please. Zero-Knowledge ...

    $9 (Avg Bid)
    272 entries

    I require an experienced cryptographer skilled in C programming for a unique assignment. This role involves developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The...

    $17 (Avg Bid)
    $17 Avg Bid
    3 bids

    I'm seeking a researcher well-versed in cryptography for an advanced project targeting two specific areas: Symmetric and Asymmetric cryptography. Key responsibilities: - Detailed research into Symmetric and Asymmetric cryptography - Clearly convey advanced, complex cryptography concepts Ideal applicant: - Extensive experience with cryptography research - Ability to explain complex cryptography ideas to an advanced audience Please include your relevant experience in your application. Looking forward to potentially working together on this fascinating project.

    $114 (Avg Bid)
    $114 Avg Bid
    35 bids

    ...and Application Middleware, PhoneGap/iOS/Android SDKs, CI/CD, etc. • Strong understanding of mobile and web application security concepts, session management, performance optimization, automated testing techniques, high availability engineering, and database technologies for mobile and web applications. • Familiarity with cryptography, key management, and security solutions on both mobile and server sides, including an understanding of security protocols and cryptography like PKI, SSL, RSA, authentication, encryption, and digital signatures. • Experience working with payment solutions, including mainframe environments, is advantageous. Additional Skills:- • Profound knowledge of emerging technologies and a strong grasp of how technology aligns ...

    $161 (Avg Bid)
    $161 Avg Bid
    2 bids

    ...cybersecurity professional for mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience in cybersecurity, preferably with recognized companies. Pro...

    $11 - $18 / hr
    Featured Sealed
    $11 - $18 / hr
    9 bids

    I need a professional progra...program. The problem lies in the document authentication process, specifically with reading the chip data of ID cards. The ideal candidate should have: - Proficiency in Java and experience with the jmrtd program - Prior experience dealing with document authentication, especially with ID cards - Strong problem-solving skills and ability to troubleshoot complex issues - Good understanding of cryptography and secure communication The main tasks in this project include: - Diagnosing the root cause of the issue when reading the chip data - Implementing a solution that ensures successful document authentication for ID cards - Testing the updated program to ensure it works as expected Your expertise and efficiency in resolving this issue will be highly ap...

    $125 (Avg Bid)
    $125 Avg Bid
    10 bids

    I am seeking knowledgeable developers to construct a centralized cryptocurrency exchange with a comprehensive inclusion of Bitcoin, Ethereum, and Ripple. Key requirements for the task are: - Efficient Development: You should have a strong backgr...cyber threats, you'll need to harness your end-to-end cryptographic knowledge to ensure top-notch security measures. - Engaging User Interface: The ability to build an intuitive, easily navigable and engaging user interface is crucial. Proven experience designing user-friendly platforms is advantageous. The ideal candidate will have a blend of technical versatility in blockchain technology, cryptography, and platform interface design. A comprehensive understanding of commonly traded cryptocurrencies Bitcoin, Ethereum, and Ripple is...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    15 bids

    ...functionality. - Provide comprehensive documentation and support resources for users, including tutorials, FAQs, and troubleshooting guides. **Key Requirements:** - Proven experience in developing cryptocurrency platforms or similar financial systems, with a focus on Bitcoin (BTC) transactions. - Expertise in relevant programming languages, frameworks, and technologies, such as blockchain development, cryptography, and secure web development. - Strong understanding of Bitcoin (BTC) protocol specifications, wallet management principles, and security best practices. - Effective communication skills and a collaborative approach to project management, including regular updates, feedback sessions, and milestone reviews. - Demonstrated ability to deliver high-quality projects on time ...

    $681 (Avg Bid)
    $681 Avg Bid
    33 bids

    ...Processes - Handling Unix signals, processes, and threads management (fork, exec). Virtual Memory - Concepts, page tables, and memory management techniques. Caches - Understanding caching, memory hierarchy, and cache-related strategies. Synchronization and Deadlocks - Locks, mutexes, barriers, and deadlock prevention. Networking - IP, TCP, DNS, and secure channel foundations. Secure Channels and Cryptography - Fundamentals of secure communications, public key infrastructure. Pipelining and Processors - CPU pipelining, hazards, out-of-order execution. Out-of-Order Execution and Side Channels - Advanced CPU architecture features and security implications. Meltdown/Spectre - Discussing speculative execution vulnerabilities. Past final exam has been attached with this proposal. Plea...

    $128 (Avg Bid)
    $128 Avg Bid
    8 bids

    I'm looking for a skilled researcher in the field of cryptography, specifically focused on Oblivious Transfer (OT). Find all OT extension implementations and compare them for efficiency and security (sometimes the security assumptions are different hence the security levels are also different. Efficiency can be compared in terms of average memory usage and average time required to complete one OT/OTe of same size in different libraries). Key Requirements: - Strong background in cryptography - Proven experience in conducting research within this field - Ability to evaluate security and efficiency of cryptographic libraries - Familiarity with the implementation of OT in different environments, particularly within OT libraries. The primary goal of this project is to prov...

    $87 (Avg Bid)
    $87 Avg Bid
    8 bids

    ...problem-solving process. What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate ...

    $11 (Avg Bid)
    $11 Avg Bid
    3 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids

    I am looking for an expert in blockchain technology to create a Metamask wallet that supports the Ethereum network. This project will involve: - The core feature of sending and receiving ETH. This is a feat... - An integration with hardware wallets functionality. User security is paramount to this project. As such, the aim is to have our Metamask wallet integrate with hardware wallets, which is an advanced security measure. Successful implementation should ensure a higher level of safeguarding for Ethereum transactions. Ideal freelancer for this project should be well-versed in blockchain and cryptography, and have prior experience in creating and working with blockchain wallets, particularly Metamask. Knowledge of how to integrate wallets with hardware devices will be especial...

    $163 (Avg Bid)
    $163 Avg Bid
    8 bids

    ...cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized for this prediction. - Successful prediction has potential for great gambling strategies. ## What YOU Can Do: - With your knowledge and experience in RNGs and cryptography, I am hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strat...

    $70 / hr (Avg Bid)
    $70 / hr Avg Bid
    5 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that i...hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the succes...

    $124 (Avg Bid)
    $124 Avg Bid
    51 bids

    I'm looking for a skilled developer who can integrate Metamask and Phantom Wallet into my existing PHP script. The main objective is the implementation of sign-in functionalities using these crypto wallets. Key Responsibilities: - Integrate Metamask wallet into the PHP script - Integrate Phantom Wallet into the PHP script - Enable signing in via bo...freelancer for this task should possess: - Expertise in Blockchain technology - Proficiency in integrating wallet systems, specifically Metamask and Phantom wallet - Proficient knowledge of PHP scripting - Experience in implementing sign-in functionalities with Blockchain wallets will be a plus. Your role will be critical for the security and functionality of the project, thus understanding of cryptography and blockchain princ...

    $53 (Avg Bid)
    $53 Avg Bid
    28 bids

    I'm seeking an adept Rust programmer who can assist me in creating a new application. This application's central function is to handle real-time data processing, specifically focusing on cryptocurrency data. Key responsibilities: - Develop a robust and efficient application in Rust - Integrate real-time data processing capabilities - Enable swift and accurate processing, specifically focusing on cryptocurrency data. Key responsibilities: - Develop a robust and efficient application in Rust - Integrate real-time data processing capabilities - Enable swift and accurate handling of crypto data The successful candidate should have: - Profound understanding of Rust programming language - Proven experience in real-time data processing - Strong cryptography and blo...

    $554 (Avg Bid)
    $554 Avg Bid
    65 bids

    ...from first principles. Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the ...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    6 bids

    ...without too much adaptation from what you’d need in other sectors. On the backend, Node.js, Go, Python, Scala and other languages will be valuable. Data analysis. The blockchain records a wealth of information, and if you have a background in data science you may be eligible for some of the top careers in cryptocurrency. Security and Cryptography. These skills will always be useful for any technical blockchain role. Experience in blockchain development, cryptography, and smart contract programming are essential. An understanding of staking mechanisms would also be beneficial. Please include any relevant examples of your past work within this field in your bid....

    $752 (Avg Bid)
    $752 Avg Bid
    77 bids

    I'm urgently in need of a cyber security expert to guide me through my high-level educational assessments. Key Areas for Assistance: • Authentication • Access Control • Operating System Security • Vulnerabilities • Cryptography • Public Key Infrastructure • Threat Modelling Ideal Candidate Qualifications: • Demonstrated experience in network, information, and application security • Proven track record in dealing with the specified key areas • Ability to provide comprehensive, understandable guidance Please note that the timeline is critical and I need someone who can start immediately. Provide your experience and expertise in these areas. Looking forward to your bids.

    $91 (Avg Bid)
    $91 Avg Bid
    28 bids

    I need an experienced Rust developer who can assist in designing, implementing, and testing smart contracts for an Automated Market Maker (AMM) on Solana. Key functionalities include: - Token Swapping: The primary feature we seek is a token swapping functionality. - Comprehensive Token Support: It's vital that our platform can support any Solana token withou...maker (AMM) concepts and protocols (e.g., Uniswap, SushiSwap). Ability to work independently and collaboratively in a fast-paced environment. Good communication skills and a proactive attitude towards problem-solving. Nice to Have: Previous experience working on decentralized finance (DeFi) projects. Knowledge of other programming languages such as Solidity, C++, or Python. Understanding of cryptography and cybersecur...

    $928 (Avg Bid)
    $928 Avg Bid
    2 bids

    We are currently seeking a seasoned coder proficient in C, C++, and Assembler (x64) languages to assist wit...Demonstrable capabilities in new feature development. - Familiarity with system integration and modification. - Solid background in managing medium complexity tasks. - An in-depth understanding of operating system internals, especially Windows. - Knowledge of how different network protocols. - Experience in reverse engineering and familiarity with tools like IDA Pro, Ghidra, or OllyDbg. - Knowledge of cryptography and secure data handling. - Proven track record in exploit development and vulnerability research is a huge benefit. - A bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, OS...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    15 bids provide a secure and user-friendly solution that enhances privacy, eliminates the need for third-party intermediaries, and gives users full control over their personal data. Requirements: Proficiency in Blockchain Development: We're seeking a developer with expertise in blockchain technologies, including Ethereum, smart contracts, and decentralized applications (dApps). Familiarity with Cryptography: Knowledge of cryptographic principles and techniques is essential for this role, as our project involves implementing advanced security features to safeguard user data. Experience with Identity Management Systems: Previous experience working on identity management systems or related projects is highly desirable. Strong Problem-Solving Skills: The ability to tackle complex t...

    $2292 (Avg Bid)
    $2292 Avg Bid
    86 bids

    I’m seeking a knowledgeable writer with considerable experience in cryptography, specifically in the area of symmetric key cryptography. Key Responsibilities: - Crafting a comprehensive paper on symmetric key cryptography - Ensuring content is engaging and accurate - Meeting strict deadlines ( 17/03/2024, 10 am) Ideal Candidate: - Has notable experience in symmetric key cryptography - Excellent writing skills, ability to distill complex concepts into digestible content - Previous work in this field will be advantageous. Kindly include these experiences in the application. Please, only come on board if you are confident in your ability to deliver compelling and informative content on Symmetric Key Cryptography. I'm looking forward to worki...

    $21 (Avg Bid)
    $21 Avg Bid
    5 bids

    I'm looking for a talented developer who can bring my vision for a next-level messaging app to life. This isn't your basic communication application, and I want the additional features to reflect that. Key Deliverables: - A fully-functional messaging app for iOS and Android. - Full suit...calling. - Elevated security measures, such as end-to-end encryption to ensure privacy and protect user data. - Fun engagement features like a wide range of stickers and emojis. Your Experience: I'm ideally looking for someone who has experience in mobile app development, especially communication or social networking apps. Given the sensitive nature of messaging, hands-on experience with applied cryptography or related fields would really set you apart. Let's take messagi...

    $4677 (Avg Bid)
    $4677 Avg Bid
    100 bids

    I'm in need of an expert in cryptography, specifically proficient in SHA256, to assist with a custom implementation of a decryption algorithm for data retrieval. The primary responsibilities for this role will include: - Decrypting the SHA256 algorithm with a specific iv and key. - Developing a capability for retrieving transactional data post decryption. - Ensuring the preservation of data integrity during the entire process. Ideal candidates should have experience in data decryption, knowledge of SHA256, and a proven history of successful implementation. The ability to handle confidential transactional data safely and comply with all data security standards is also necessary. This project demands attention to detail, precision, and robust understanding of cryptographic ...

    $47 (Avg Bid)
    $47 Avg Bid
    4 bids

    ...- Testing and validating RNG algorithms to ensure their security and reliability - Collaborating with the development team to integrate RNG solutions into our blockchain platform - Monitoring and maintaining the performance of on-chain RNG systems - Keeping abreast of the latest developments in blockchain technology and RNG algorithms The ideal candidate will have: - A strong background in cryptography, blockchain technology, and RNG algorithms - Proficiency in programming languages such as Solidity, C++, or Python - Experience working with on-chain RNG solutions in a production environment - Excellent problem-solving skills and attention to detail - Strong communication and collaboration skills In return, we offer competitive compensation, a supportive work environment, and op...

    $36 / hr (Avg Bid)
    $36 / hr Avg Bid
    28 bids

    I am a beginner in Capture The Flag (CTF) problem-solving, seeking expert assistance. Here are the specifics: - Challenge Categories: I'm mainly interested in understanding and solving problems related to Cryptography, Web Exploitation, and Binary Exploitation. - Programming Languages: The languages I am currently proficient in are Python and C++. Hence, any guidance needs to be provided considering these languages. It is essential for the freelancer to have substantial experience in CTF problem-solving across the specified categories along with proficiency in both Python and C++. Please make use of simple and easy-to-grasp terminologies, given my beginner status. Looking forward to broadening my knowledge base in this fascinating realm. i will give you the problem and you...

    $12 (Avg Bid)
    $12 Avg Bid
    3 bids

    The purpose of this project is to evaluate the cryptographic algorithms of a set of generated numbers from a specific MATLAB software using the NIST SP 800-22 Diehard test. The key objective is to scrutinize the randomness of data produced by the software, in o...Processing a given set of numbers generated from MATLAB software. - Conducting Diehard tests to evaluate the cryptographic algorithms implemented. - Reporting findings in a clear, comprehensive manner. - Providing any insights or recommendations to improve cryptographic standards if needed. This project is aimed at statisticians, mathematicians, and data researchers with a keen interest in cryptography. Your analysis can play an instrumental role in enhancing the robustness of the cryptographic functions of this specific...

    $31 (Avg Bid)
    $31 Avg Bid
    3 bids

    I...if necessary. Ideal candidate should possess the following skills: - Proven experience in both web and mobile app development. - Strong proficiency in HTML5, CSS3, JavaScript for front-end development. - Solid skills in PHP, Python, Ruby or Java for back-end development. - Knowledge of website and app layout/user interface by using standard HTML/CSS practices. - Experience with public key cryptography. - Familiarity with database systems including MySQL, Oracle, and MongoDB. - Proficient understanding of code versioning tools such as Git. Please note, despite the listed e-commerce platforms, we prefer to have our own content managed system (CMS). Please provide examples of any previous work and include estimates on cost and time in your proposal. Looking forward to your best ...

    $190 (Avg Bid)
    $190 Avg Bid
    13 bids

    ...The main tasks for this project will be: - Assess and understand the current structure of our finance-related system - Develop approaches to embed blockchain technology into the existing system in ERC20 - Code and help in setting up the integrated system Skills and Experience: - Proficiency in different aspects of cryptocurrency including Blockchain technology, Cryptocurrency trading, and Cryptography - Specialized in coding and ERC20 standard mastery - Proven cases of successful integration of blockchain into financial transaction based system is a huge plus The main goal of this entire engagement is a seamless implementation of blockchain technology into our existing financial transactions system to maximize security and efficiency. So, if you're an expert in blockcha...

    $311 (Avg Bid)
    $311 Avg Bid
    2 bids

    Hello prospective bidders, I am in need of a crypto expert that can assist me in implementing encryption, decryption, and hashing principles to my project. About the Project: - Specific cryptographic services required include Encryption, Decryption, and Hashing. - I believe understanding the balance between security and performance is vital, as we wouldn't want to sacrifice one for the other. - The main platforms for applying these services need to run on HackerRank. Requirements: - Demonstrable knowledge on encryption, decryption and hashing principles. - Prior experience in implementing cryptographic services on web-based platforms and HackerRank. - Medium to high understanding of cyber security principles. - Good communication and problem-solving skills. - Ability to complete...

    $14 (Avg Bid)
    $14 Avg Bid
    3 bids be reliable and capable of handling high usage. Key Specifications: - The generator should be able to create QR codes satisfactorily. - The generator should also have the ability to produce cryptographic numbers as well as random numbers efficiently. - Even though the generator will primarily be used for business, it does not need to be integrated with other systems. - Should use strong cryptography algorithms such as fortuna to ensure the random Strings cannot be guessed. Ideal Candidate: - The ideal candidate for this project will have proficient skills in developing QR code generators and similar systems. - Knowledge of cryptographic numbers and random number generation is also a necessity. - Experience in creating standalone systems will be beneficial. - A solid backg...

    $126 (Avg Bid)
    $126 Avg Bid
    9 bids

    Top cryptography Community Articles