Kichujio

Utafutaji wangu
Chuja ukitumia:
Bajeti
hadi
hadi
hadi
Aina
Ujuzi
Lugha
    Jimbo la Kazi
    3,002 cryptography kazi zimepatikana
    EMV Power Side-Channel Analysis
    6 siku left
    Dhibitishwa

    We are looking for a Machine Learning expert with proven experience in Side-Channel Analysis (SCA) to help build a full ML pipeline capable of extracting sensi...preprocessing pipeline Trained ML models Python scripts for inference, training, and visualization ROI definitions & performance benchmarks Instructions for integrating the inference engine with Husky/PC capture scripts ML expert Ideal Freelancer Strong background in Machine Learning + Signal Processing Prior experience with Side-Channel Analysis (CPA, DPA, Template Attacks) Experience with cryptography (DES/3DES, RSA) is a major advantage Ability to convert raw oscilloscope/Husky traces into ML-ready datasets To Apply Please share: Relevant ML/SCA experience Examples of similar projects Proposed approac...

    $35 / hr Average bid
    $35 / hr Wastani wa Zabuni
    2 zabuni

    I am looking for a skilled cybersecurity or cryptography developer who can build an advanced AES encryption/decryption system on Kali Linux. The system should include: AES‑256 encryption and decryption Secure key handling Command‑line interface (CLI) or GUI Optionally: hashing, key‑derivation (PBKDF2/Argon2), or file‑level encryption Clean and documented code (Python or C preferred) Experience with Kali Linux, OpenSSL, Python cryptography libraries, or custom AES implementations is required.

    $13 / hr Average bid
    $13 / hr Wastani wa Zabuni
    13 zabuni

    ...Questions (Must be answered in the proposal) 1. Do you have prior experience in designing or analyzing block ciphers, not just implementing existing algorithms such as AES? 2. Have you ever performed differential or linear cryptanalysis on a cipher? 3. Are you theoretically familiar with SPN and Feistel structures? 4. Have you contributed to or co-authored any academic publication in security or cryptography? 5. Can you formally define IND-CPA security and explain how it can be tested experimentally?...

    $491 Average bid
    $491 Wastani wa Zabuni
    99 zabuni

    ...FastAPI endpoint. 2. Your service signs that XML with the .p12 certificate I supply, then inserts the required QR code. 3. It forwards the signed file to the target URL I will provide. 4. Whatever the remote server returns comes back as JSON; simply pass that JSON straight through to the original caller. Technical notes • Target stack: Python 3.x, FastAPI, async/await. Feel free to use cryptography, PyOpenSSL, or any reliable library for handling the .p12 signature, and qrcode or similar for QR generation. • Please handle the certificate in memory only and remove any temp artifacts after use. • No GUI is needed—just a clean REST endpoint and clear logging. Deliverables • FastAPI app exposing a POST /process (or comparable) route. •...

    $21 / hr Average bid
    $21 / hr Wastani wa Zabuni
    109 zabuni

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    $99 Average bid
    $99 Wastani wa Zabuni
    5 zabuni

    ...Implementation of these components in Python as part of a modular encryption framework Requirements: Strong experience in Python Familiarity with cryptography, block cipher structures, or mathematical algorithms Good understanding of neural networks (NN) and ideally XAI techniques Full confidentiality — all code, ideas, and files must remain my property and cannot be reused or shared Workflow: I provide a general overview to confirm your understanding. We agree on milestones and delivery steps. After signing an NDA, you will receive the complete technical design and detailed requirements. Please send me: Examples of related work (cryptography, AI, algorithmic projects, etc.) Your estimated timeline Your proposed cost Thank you, and I look forward to wor...

    $150 Average bid
    $150 Wastani wa Zabuni
    45 zabuni

    ...vulnerabilities in quantum computing systems, quantum networks, and associated infrastructure before they can be exploited by malicious actors. Key Responsibilities • Conduct comprehensive penetration testing on quantum computing nodes and quantum machine infrastructure • Assess security vulnerabilities in quantum key distribution (QKD) systems and quantum network communications • Evaluate post-quantum cryptography implementations and identify weaknesses • Test quantum-resistant algorithms and their implementations for vulnerabilities • Perform security assessments on quantum machine node. • Analyze quantum interfaces, control systems, and measurement planes for security flaws • Document findings with detailed technical reports including risk ra...

    $100 Average bid
    $100 Wastani wa Zabuni
    1 zabuni

    ...modern blockchain technologies. Candidates from Dhanbad and Jharkhand will be given the highest preference. But the opportunity is open for all candidates from Jharkhand only. Mandatory Technical Skills (Core Blockchain Skills)Blockchain Fundamentals Strong understanding of Blockchain architecture Understanding of decentralized systems (P2P networks, consensus algorithms) Knowledge of hashing, cryptography, wallets, nodes, miners/validators Smart Contract Development: Solidity (Mandatory) Experience with Ethereum, BNB Chain, Polygon, Solana, etc. Understanding of ERC-20, ERC-721, ERC-1155 standards Smart contract testing frameworks (Hardhat, Truffle) Gas optimization techniques Backend & Web3 Development: , Node.js (Express/) for backend services REST & GraphQL AP...

    $282 Average bid
    $282 Wastani wa Zabuni
    12 zabuni

    I’m working on a university coursework module centred on Data Encryption, with an explicit emphasis on Asymmetric Encryption. The assignment is theory-heavy but still expects algorithmic clarity, so I need concise, well-structured written answers that: • Explain core asymmetric concepts (key generation, encryption/decryption flow, mathematical underpinnings) in plain language suitable for an academic submission. • Compare at least two algorithms—RSA is mandatory, and you may contrast it with ElGamal, ECC, or another relevant scheme—to highlight strengths, weaknesses, and typical use-cases. • Provide clean, language-agnostic pseudocode for each algorithm section (key generation, encryption, decryption, signature where applicable). Comment each step so t...

    $128 Average bid
    Dharura
    $128 Wastani wa Zabuni
    8 zabuni

    I’m looking for someone who can take me from concept to store-ready builds of a fully private messenger that r...two devices on each platform, verified in TestFlight / internal track. – Independent inspection confirms that messages stored on the server are indecipherable. – No crashes during a 48-hour soak test with at least 100 concurrent conversations. – Complete source code, build scripts, and minimal setup guide delivered before sign-off. If you’ve shipped secure chat apps before—or have deep cryptography experience—let’s talk specifics and map out the milestones together. Please also list the requirements for such a business, and your estimates on monthly expenses. Keep it short and be direct in proposals, I don't wa...

    $1288 Average bid
    $1288 Wastani wa Zabuni
    138 zabuni

    I need an expert to protect personal data using cryptography. The primary technique to be used is hashing. Key requirements include: - Expertise in cryptographic techniques, especially hashing - Experience with data protection regulations - Ability to implement secure hashing algorithms Ideal Skills: - Strong background in cybersecurity - Familiarity with various hashing algorithms - Knowledge of compliance standards for personal data protection

    $23 Average bid
    $23 Wastani wa Zabuni
    9 zabuni

    ...Firebase. The key is the hash itself, or the hash is indexed against a unique registration ID. DB stored: [ID, H, Creator ID, Timestamp]. 4. Return Flask returns a Flask ID Registration ID (or a combination of the hash ->Frontend The unique ID (the "signature" you mentioned). and creator ID) to the user. The key returned to the user is not a traditional digital signature (which involves Public Key Cryptography), but rather a Proof of Prior Registration. The "Signature" is the Verifiable Information needed to check the Ledger: Signature/Proof = Registration ID + Timestamp The real "signature" is the stored hash $H$ itself, because only the original content can re-generate that exact hash. 3. Verification Phase (The Check) If a third-party finds the...

    $65 Average bid
    $65 Wastani wa Zabuni
    13 zabuni

    I need a seasoned cryptography specialist to review our existing encryption protocols, key-management setup and digital-signature workflows with one clear objective: prove that everything we run can stand up to recognised standards and regulations. Here’s what the engagement will look like: • You receive full technical documentation and limited test-environment access to the three areas in scope. • You analyse algorithm choices, key sizes, entropy sources, storage and rotation practices, signature generation and verification paths, plus any supporting libraries or HSM integrations. • You map each finding to the most relevant benchmark—Saudi NCS, NIST guidance, FIPS 140-3, ISO 27001 Annex A controls, ETSI, or comparable frameworks—highlighting a...

    $9720 Average bid
    $9720 Wastani wa Zabuni
    4 zabuni

    I’m putting together the written component of a university-level course project on cryptography and data protection, and I want the documentation to revolve squarely around modern encryption techniques. The content must walk students step-by-step through symmetric encryption, asymmetric encryption, and the most common cryptographic hash functions, explaining how each works, why it matters, and where it is typically applied. What I need from you is a clear, well-structured document (approximately 25–30 pages, though quality comes first) that blends theory with concise, real-world examples. Include diagrams or simple code snippets where they genuinely help comprehension, but keep the narrative accessible to students encountering these ideas for the first time. Deliverab...

    $127 Average bid
    $127 Wastani wa Zabuni
    29 zabuni

    ...recovery, 2FA enrolment and email relay configuration Acceptance The app must compile and run on Windows 10/11, lock on inactivity, and refuse to open the vault without the correct master password plus second factor when enabled. All secrets should remain encrypted when at rest and must not be retrievable in plain text by simple file inspection. If you have relevant experience with desktop cryptography, WinUI/WPF, and 2FA integration, I’d love to see a quick outline of your proposed tech stack and timeline....

    $96 Average bid
    $96 Wastani wa Zabuni
    12 zabuni

    ...in the full Signal protocol—X3DH for the first handshake, ECDH+Double Ratchet for forward secrecy, AES-GCM-256 with HKDF-HMAC-SHA-256 for payload protection. On paper everything looks correct, yet in practice messages still slip out in plaintext or throw a “failed to send” error whenever the recipient hasn’t generated keys or an old session is corrupted. What I need now is an experienced cryptography engineer who has actually debugged Signal-based stacks to step in right away, review my current implementation and make the encryption rock-solid. The most pressing pain point is the message-encryption phase itself; sessions sometimes never initialise or silently fall back to no cipher at all. Deliverables I expect: • Diagnose why sessions aren&rs...

    $22 / hr Average bid
    $22 / hr Wastani wa Zabuni
    39 zabuni

    ...memadai untuk keperluan forensik. • Lakukan penetration testing pascapenerapan dan serahkan laporan uji lengkap beserta rekomendasi lanjutan. • Dokumentasi teknis singkat agar tim internal dapat memelihara peningkatan ini di masa depan. Keahlian yang saya cari • Pengalaman mendalam dalam secure coding untuk aplikasi desktop (mis. C#, Java, atau C++). • Familiar dengan praktik OWASP, cryptography, dan penetration testing tools seperti Burp Suite atau OWASP ZAP. • Mampu menyusun dokumentasi yang ringkas namun komprehensif. Batas waktu sudah saya tetapkan secara ketat; jelaskan estimasi durasi Anda ketika mengajukan proposal. Proposal akan saya nilai berdasarkan: 1. Kedalaman solusi keamanan yang ditawarkan. 2. Relevansi portofolio dan sertif...

    $18 / hr Average bid
    $18 / hr Wastani wa Zabuni
    11 zabuni
    Trophy icon ThinkBox Secure Logo Design
    Imeisha left

    Logo Design Contest: ThinkBox - Secure Desktop Environment About ThinkBox: ThinkBox is a cutting-edge secure desktop environment built for Jetson Nano hardware. It combines advanced hardware security (secure element cryptography), HID forwarding, low-latency video streaming, and a modern desktop interface with a sleek, glass-morphism design aesthetic. ThinkBox bridges the gap between secure embedded computing and professional desktop environments. What We're Looking For: We need a professional, modern logo that represents innovation, security, and intelligent computing. The logo should: - Convey security, trust, and technology - Incorporate or be inspired by the "box" concept (but don't feel constrained by it) - Work well in both light and d...

    $10 Average bid
    $10
    217 wasilisho

    I need an experienced developer who has **proven experience** with the Wise (formerly TransferWise) API, specifically with Strong Customer Authentication (SCA) for accessing balance statements. ### Current Situation - We have a Node.js/Express backend appli...Verified key pair matches (modulus comparison) - Deployed to production with all fixes - Still getting `x-2fa-approval-result: REJECTED` from Wise **If you've solved Wise SCA authentication issues before, this is the job for you.** --- ## Skills Required - Wise API - TransferWise API - SCA Authentication - RSA Signatures - Node.js - - Webhook Implementation - API Integration - Cryptography **Payment**: Milestone-based - 50% when you successfully sync transactions from Wise API - 50% when webhooks are working and ver...

    $31 / hr Average bid
    $31 / hr Wastani wa Zabuni
    193 zabuni

    I’m expanding my development team with a dedicated encryption authority who can take ownership of all cryptographic decisions and implementation details. We’re already integrating AES, RSA and Elliptic Curve Cryptography (ECC) into our stack; what we need now is someone who can guide the work, spot weaknesses early, and translate cryptographic theory into production-ready code that the whole team can understand and maintain. Beyond writing rock-solid routines, you’ll review the existing encryption layer, explain best practices in plain language to the other engineers, and stay available for quick consults as features evolve. A passion for secure key management, side-channel resistance and performance optimisation will make you a perfect fit. Deliverables I’...

    $23 / hr Average bid
    $23 / hr Wastani wa Zabuni
    11 zabuni

    I need a concise yet academically...so a final-year undergraduate can follow it. • Include a fully worked numerical example showing all relevant modular-exponentiation calculations. • Analyse advantages and limitations, clearly stating why the scheme is secure (discrete-log problem) and where it is vulnerable (small prime groups, man-in-the-middle, quantum threats). • Compare Diffie-Hellman with RSA, AES, and lightweight cryptography (LWC), noting when each is preferred. Target length is about 1,200–1,500 words. Please deliver the text in an editable format (Word or LaTeX) along with a compiled reference list. I’ll consider the task complete once the introduction slots cleanly into my template, citations resolve correctly, and all five content point...

    $137 Average bid
    $137 Wastani wa Zabuni
    22 zabuni

    I have a challenge-style cryptography question that ends with a hidden flag. I need someone to fully decrypt the message, capture the flag, and write a clear, reproducible report. Scope • Analyse the ciphertext, identify the probable encryption scheme, and perform the full decryption process. • Document every step you take—commands, tool settings, scripts, or manual reasoning—and include a screenshot after each major action. • Add a concise note under each screenshot explaining what was done and why it worked. • Conclude with the recovered flag and a short summary of lessons learned. The report must be self-contained, easy to follow, and delivered in PDF (screenshots embedded) plus any scripts you create. Feel free to use tools such as Cyber...

    $86 Average bid
    $86 Wastani wa Zabuni
    17 zabuni

    I’m building a new blog that spotlights tomorrow’s technologies, and I’d like to kick things off with a series of ...reshaping everyday life. • Original content only, optimized for on-page SEO (compelling headlines, sub-headings, meta description, and a handful of relevant keywords). • A short takeaway section at the end of every article to encourage shares and discussion. Optional room to grow: once the AI series is live, I may branch into Quantum Computing (with pieces on Quantum Algorithms, Hardware, and Cryptography), so a writer comfortable with both fields is a plus. I’ll provide target keywords and a simple style guide; you deliver the polished drafts in Google Docs, ready for publication. If you enjoy translating complex tech into ...

    $15 / hr Average bid
    $15 / hr Wastani wa Zabuni
    126 zabuni

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $21301 Average bid
    Makubaliano ya Kutotoa Taarifa
    $21301 Wastani wa Zabuni
    19 zabuni

    I’m putting together a Jeopardy-style Capture-the-Flag event and need a collection of fresh, advanced-level puzzles. The board will cover three core categories—Cryptography, Forensics, and Web Exploitation—so every challenge you craft should push seasoned players while staying fair and solvable. Here’s what I expect to receive: • 10–12 original challenges evenly split across the three categories • A short story-style prompt for each task, the exact flag format, and the intended solve path • An accompanying write-up that explains the solution in detail (commands, tools, or scripts used) • Any necessary artifacts: PCAPs, vulnerable web apps, encrypted files, or compiled binaries • A quick validation script or manual step...

    $93 Average bid
    $93 Wastani wa Zabuni
    7 zabuni

    I’m putting together a new Jeopardy-style Capture-the-Flag event aimed squarely at seasoned competitors. I need a full suite of original, high-difficulty tasks across three pillars—Cryptography, Reverse Engineering, and Web Exploitation. Each challenge must include a clear flag format, an authoritative write-up explaining the intended solve path, and any auxiliary files, binaries, or dockerised services needed for local testing. What I’ll count as a complete delivery: • 3-5 Cryptography puzzles featuring modern primitives or clever protocol flaws, each solvable without brute-forcing. • 3-5 Reverse Engineering binaries (Linux or Windows PE) that showcase obfuscation, unusual calling conventions, or anti-debug tricks. • 3-5 Web Exploitati...

    $85 Average bid
    $85 Wastani wa Zabuni
    13 zabuni

    ...• Encrypted audit trail generation (PDF + AWS S3) • Basic dashboard for API usage logs • API key management and rate limiting • Optional: Stripe or Paddle integration for subscription billing Preferred Tech Stack • Backend: Python (FastAPI) or Node.js • Cryptography: liboqs (Open Quantum Safe), TLS 1.3 hybrid • ZK Proofs: Circom or Noir • Storage: AWS S3 • Deployment: Docker + Hostinger KVM 4 or AWS EC2 • Monitoring: Prometheus or Datadog Before We Proceed, Could You Confirm: 1. Have you worked with post-quantum cryptography (Kyber, Dilithium) or liboqs before? 2. Are you comfortable building modular APIs with secure endpoints and encrypted audit trails? 3. Would you be open to integrating zero-knowledge proof sys...

    $1573 Average bid
    $1573 Wastani wa Zabuni
    83 zabuni

    ...Module 14: Access Control Lists (ACLs) Introduction and Configuration Mitigation Techniques Module 15: Firewall Technologies Securing Networks with Firewalls Firewall Design and Best Practices Module 16: Zone-Based Policy Firewalls (ZPF) ZPF Overview, Operation, and Configuration Module 17: Cloud Security Virtualization and Cloud Computing (Parts 1 & 2) Module 18: Cryptography Applications and Impacts of Cryptography Module 19: Technologies and Protocols Monitoring Common Network Protocols Module 20: Network Security Data Types and Handling of Security Data Module 21: Evaluating Alerts Overview and Methodologies for Alert Evaluation Module 22: Governance and Compliance Cybersecurity Ethics, Regulations, and Standards Module 23: Network Security Test...

    $18 / hr Average bid
    $18 / hr Wastani wa Zabuni
    5 zabuni

    ...blockchain languages * Familiarity with frameworks such as , , Truffle, or Hardhat * Understanding of consensus mechanisms, DeFi, NFTs, or token standards (ERC-20, ERC-721, ERC-1155) * Ability to write clean, secure, and maintainable code * Strong problem-solving and communication skills **Nice to Have:** * Experience with Layer 2 solutions and cross-chain bridges * Knowledge of cryptography and security protocols * Previous work with DAO, staking, or yield farming projects **Project Type:** Freelance / Remote **Budget:** [Insert your budget range here] **Duration:** [Specify fixed-term / ongoing / milestone-based] **How to Apply:** Please share: 1. Your past blockchain projects (GitHub/Portfolio/Links). 2. Relevant experience in smart contracts or DApps. 3. Your availabilit...

    $7 / hr Average bid
    $7 / hr Wastani wa Zabuni
    10 zabuni

    I have a standing stream of classwork that drops every week in my cybersecurity program and I need someone who can reliably handle it from start to finish. The workload usually rotates among concise research papers (properly referenced), hands-on problem-solving tasks, and small programming exercises or mini-projects. Topics so far have included network security fundamentals, core cryptography concepts, and scripting with JavaScript, VBScript, Windows shell, Python, and SQL, so comfort moving between theory and code is essential. What you will actually deliver each week: • A polished research paper or essay when theory is being examined (APA/IEEE citations as required by the prompt). • Fully worked solutions for the problem sets, showing all steps or reasoning. &bul...

    $135 Average bid
    $135 Wastani wa Zabuni
    48 zabuni

    Seeking an experienced blockchain engineer to design and build a permissioned cryptocurrency using authority-based consensus. Long-term opportunity possible (lead, co-founder,...validators/services (Kubernetes, Terraform, CI/CD). Produce technical docs and publish it on GitHub. Must-Have Skills Proven experience with permissioned/authority blockchains (Hyperledger, Quorum, Tendermint/Cosmos, Substrate, etc.). Strong knowledge of consensus algorithms and distributed systems. Proficiency in Go, Rust, C++, or Java; familiarity with Solidity/Vyper or Rust smart contracts. Cryptography and key-management expertise; security-first approach. Cloud, containerization, CI/CD and observability experience. Excellent English communication. If you can speak also spanish or german great but not...

    $3479 Average bid
    $3479 Wastani wa Zabuni
    22 zabuni

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $22413 Average bid
    $22413 Wastani wa Zabuni
    15 zabuni

    I’m running an R-and-D exploration into privacy-preserving spiking neural networks and need a compact proof-of-concept written in Python. The core idea is to take a small SNN model, encrypt its inputs (and ideally weights or activations) with a well-known fully homomorphic encryption (FHE) scheme, run inference while data remains encrypted, ...Acceptance criteria • Decrypted outputs match plaintext inference within an acceptable error tolerance you specify up front. • All code executes end-to-end on a standard CPU environment (no GPUs required). • No hard-coded paths or proprietary data. This is experimental work, so clarity and reproducibility matter more than raw speed. If you enjoy pushing the edge of neural computation and cryptography, I’d lo...

    $249 Average bid
    $249 Wastani wa Zabuni
    22 zabuni

    ...functionality. Scope of work – Retarget every project in the solution to .NET 4.8, adjust and any MSBuild settings, then compile cleanly in the latest supported Visual Studio. – Upgrade all NuGet dependencies to versions proven compatible with 4.8, replacing or shim-wrapping any packages that are no longer maintained. – Address deprecated APIs, security-related changes (e.g., cryptography defaults, TLS settings) and any breaking changes that surface between 4.0 and 4.8. – Run the existing unit tests and fix failures caused by the migration; the final build must pass the complete test suite. – Provide a concise change log and updated build steps so another developer can pull the branch and run the application locally or on IIS without su...

    $13 Average bid
    $13 Wastani wa Zabuni
    30 zabuni

    ...Detection: When external applications attempt to access monitored ALs, MERCURY will trigger a real-time voice warning using Text-to-Speech (TTS) APIs. 7. Smartcard-to-Server Self-Authentication: Prior to any deployment or configuration, a mutual cryptographic authentication must be performed between the Smartcard and the secure deployment server. This handshake shall use Elliptic Curve Cryptography (ECC) or RSA 4096-bit keys, facilitated through challenge-response protocols to ensure the identity of both parties and prevent impersonation or replay attacks. Project will be considered complete once the app, server and Smartcards are ready to be produced onsite and deployed....

    $33180 Average bid
    Makubaliano ya Kutotoa Taarifa
    $33180 Wastani wa Zabuni
    17 zabuni

    I'm working on an algorithm that currently fails the NIST Statistical Test Suite. I need a cryptography and mathematics expert to: - Identify the issues in my existing algorithm. - Optimize the code to pass all NIST tests. - Provide supporting documentation, including results from NIST analysis and any modifications made. I’m looking for clean, efficient code (preferably in Mathematica or a similar tool) and clear documentation of results.

    $20 Average bid
    $20 Wastani wa Zabuni
    15 zabuni

    I need seasoned support ensuring the cryptographic side of my security stack is solid. The priority is hands-on expertise with cryptographic algorithms—selecting the...protocol flow • Clear written guidance (and, where helpful, code snippets) outlining risks, improvements, and best-practice configurations • Ongoing Q&A support for fine-tuning implementation decisions as the project evolves Please share examples of previous cryptography-centric work—white-papers, audited code, or open-source contributions—plus a brief note on the tools, languages, or libraries you are most comfortable with (OpenSSL, Bouncy Castle, libsodium, etc.). I will shortlist candidates whose portfolio shows both depth in cryptography and an ability to communicate com...

    $142 Average bid
    $142 Wastani wa Zabuni
    9 zabuni

    I'm looking for a WordPress developer to create a custom plugin. The plugin will allow users to create simple ciphers, like substitution or transposition ciphers, for fun or educational purposes. Key requirements: - User-friendly interface - Basic cipher creation (substitution/transpositi...will allow users to create simple ciphers, like substitution or transposition ciphers, for fun or educational purposes. Key requirements: - User-friendly interface - Basic cipher creation (substitution/transposition) - Integration with WordPress site - Customizable with background colors and display options Ideal skills: - Proficiency in WordPress plugin development - Strong understanding of cryptography (basic level) - Experience with user interface design Please provide examples of sim...

    $150 Average bid
    $150 Wastani wa Zabuni
    202 zabuni

    I need a freelancer to hash an .exe file using the SHA-256 algorithm. The primary purpose of this is to verify file integrity. Requirements: - Use SHA-256 hashing algorithm - Provide hash results in a format other than text file, JSON, or console output Ideal Skills and Experience: - Proficiency in cryptography and hashing algorithms - Experience with .exe file manipulation - Ability to output results in custom formats

    $159 Average bid
    $159 Wastani wa Zabuni
    41 zabuni

    ...(SoA). – Acceptance: prioritized risks with treatment plan; SoA published. H3) Core Policies & Procedures (bundled by A.5/A.6/A.7/A.8) – Deliverables: policies/SOPs for incident management, change management (linked to CI/CD), IAM, information classification/handling, asset management, suppliers/third parties, logging/retention (CloudTrail/GuardDuty), backup/restore, vulnerability/patching, cryptography (KMS/HSM), secure development. – Acceptance: documents approved, coded, and in use. H4) Runbooks and Airtable Evidence Board – Deliverables: operational runbooks; master register in Airtable with UC-XXX → S3/Git URL + owner + date + commit SHA; auditor views. – Acceptance: live, traceable board; evidence uploaded. H5) Initial ISMS Operatio...

    $1040 Average bid
    $1040 Wastani wa Zabuni
    15 zabuni

    ...and verification tests. This is for research and prototyping purposes, with reference to recent IEEE/Eurocrypt papers. Quantum Circuit / AES Quantum Circuit Qiskit / ProjectQ AES-128 / AES-192 / AES-256 Low Depth / T-depth Optimization Grover Oracle / Quantum Oracle S-box Optimization / MixColumns Optimization Qubit Count Reduction / Ancilla Optimization Cryptography / Quantum Cryptography Quantum Computing Qiskit ProjectQ Cryptography Python Algorithm Development Quantum Circuit Optimization —————————————— Quantum Circuit Design & Optimization for AES-128/192/256 (Qiskit / ProjectQ, Low Depth, Grover Oracle) The detailed requirements are written in Chinese in the file. Please...

    $156 Average bid
    $156 Wastani wa Zabuni
    34 zabuni

    ...and verification tests. This is for research and prototyping purposes, with reference to recent IEEE/Eurocrypt papers. Quantum Circuit / AES Quantum Circuit Qiskit / ProjectQ AES-128 / AES-192 / AES-256 Low Depth / T-depth Optimization Grover Oracle / Quantum Oracle S-box Optimization / MixColumns Optimization Qubit Count Reduction / Ancilla Optimization Cryptography / Quantum Cryptography Quantum Computing Qiskit ProjectQ Cryptography Python Algorithm Development Quantum Circuit Optimization —————————————— The detailed requirements are written in Chinese in the file. Please check the file contents and then let me know whether you can do this task and how much you would charge. I....

    $143 Average bid
    $143 Wastani wa Zabuni
    37 zabuni

    ...Path Optimization based on detection results Deliverables: runnable code, dataset, trained models, results visualization, and full documentation. Keywords: Qiskit, QuNetSim, Quantum Communication, Quantum Network, QKD, Attack Simulation, Attack Detection, GNN, ML, SVM, Random Forest, Dynamic Routing, Secure Path Optimization, DV-QKD, CV-QKD, Quantum Replay Attack, MITM, Node Spoofing, Quantum Cryptography, Intrusion Detection. ———————————— Qiskit/QuNetSim Quantum Communication (QKD) Attack Simulation + GNN Detection & Secure Routing Overall Goal Build a quantum communication attack detection and defense experimental platform: Realistically simulate attacks in Qiskit/QuNetSim → Construct dataset...

    $175 Average bid
    $175 Wastani wa Zabuni
    32 zabuni

    ...(SoA). – Acceptance: prioritized risks with treatment plan; SoA published. H3) Core Policies & Procedures (bundled by A.5/A.6/A.7/A.8) – Deliverables: policies/SOPs for incident management, change management (linked to CI/CD), IAM, information classification/handling, asset management, suppliers/third parties, logging/retention (CloudTrail/GuardDuty), backup/restore, vulnerability/patching, cryptography (KMS/HSM), secure development. – Acceptance: documents approved, coded, and in use. H4) Runbooks and Airtable Evidence Board – Deliverables: operational runbooks; master register in Airtable with UC-XXX → S3/Git URL + owner + date + commit SHA; auditor views. – Acceptance: live, traceable board; evidence uploaded. H5) Initial ISMS Operatio...

    $750 - $1500
    Il'ohusishwa Dharura Imefichwa Makubaliano ya Kutotoa Taarifa
    $750 - $1500
    4 zabuni

    ...is implemented in Java. The focus lies on the correct representation of mathematical structures, modular arithmetic, and the efficient implementation of polynomial operations. The results are validated using selected elliptic curves over small finite fields and compared with the expected outcomes. Finally, the thesis highlights the role of Schoof’s algorithm in the context of elliptic curve cryptography. It discusses the limitations of the algorithm, its potential applications, and already established alternatives....

    $482 Average bid
    $482 Wastani wa Zabuni
    83 zabuni

    I'm looking for an expert in reverse engineering to help me understand TikTok's encryption algorithm, specifically focusing on the X-Argus and X-La...for an expert in reverse engineering to help me understand TikTok's encryption algorithm, specifically focusing on the X-Argus and X-Ladon headers. This work needs to be done on the Android platform. The primary goal is to comprehend the encryption algorithm used by TikTok. Additionally, I need access to decrypt API requests and responses. Ideal Skills and Experience: - Strong background in cryptography and encryption algorithms - Experience with reverse engineering, particularly on Android - Familiarity with analyzing API requests and responses - Proficient in networking and security protocols Please provide relevant...

    $1100 Average bid
    $1100 Wastani wa Zabuni
    79 zabuni

    Project: Build a privacy-first decentralized platform composed of: 1. a high-performance base ledger, 2. a secure identity/login layer, 3. an AI/automation network, plus messaging, payments, storage, and a developer app stack. What we’re building • A new decentralized runtime and networking stack (not a fork): cu...without written approval. Tooling expectations • Strong typed languages for systems, formal verification where warranted, Bazel/Nix-style reproducible builds, CI with hermetic tests, and rigorous code review. • Everyone writes docs and tests. How to apply • Share 2–3 links or repos that show relevant systems work and a short note on which workstream you fit and why. • Mention any experience with cryptography, networking inter...

    $31 / hr Average bid
    $31 / hr Wastani wa Zabuni
    71 zabuni

    I need a secure mobile chat application for both iOS and Android platforms. The app should support text messaging, voice calls, and video calls. Key Requirements: - Tor network integration ...both iOS and Android platforms. The app should support text messaging, voice calls, and video calls. Key Requirements: - Tor network integration for anonymity - Implementation of Signal Protocol for encryption - End-to-end encryption for all communications - Robust mobile app cryptography Ideal Skills and Experience: - Experience with Tor network development - Proficiency in Signal Protocol and encryption methods - Background in mobile app development, specifically for iOS and Android - Strong knowledge in cryptography and secure communications Please provide a portfolio demonstrat...

    $9398 Average bid
    $9398 Wastani wa Zabuni
    145 zabuni

    I'm seeking an experienced blockchain developer to fork the EVMOS blockchain based on Ethereum. Key requirements include: - Expertise in blockchain technology, especially EVMOS and Ethereum - Experience in forking blockchains and setting up private networks - Ability to customize features as per our needs Ideal Skills: - Strong background in cryptography and distributed systems - Proficiency in smart contract development - Familiarity with security protocols and consensus mechanisms Please provide examples of previous blockchain forking projects and your approach to customization.

    $691 Average bid
    $691 Wastani wa Zabuni
    9 zabuni

    ...Skills & Qualifications: Bachelor’s or Master’s degree in Computer Science, Engineering, or related field. 3+ years of experience in software development, preferably in fintech or security domains. Proficiency in programming languages such as Java, Kotlin, Swift, Python, or C++. Experience with biometric technologies (e.g., Face ID, Touch ID, Aadhaar, or third-party SDKs). Strong understanding of cryptography, secure authentication, and data privacy. Familiarity with mobile development (Android/iOS) and RESTful APIs. Knowledge of cloud platforms (AWS, Azure, GCP) is a plus. Preferred Qualifications: Experience with machine learning models for biometric recognition. Prior work on payment gateways, POS systems, or digital wallets. Understanding of regulatory complia...

    $19 / hr Average bid
    $19 / hr Wastani wa Zabuni
    15 zabuni

    Nakala Kuu za cryptography