Фільтрувати

Мої недавні пошуки
Фільтрувати по:
Бюджет
до
до
до
Тип
Навички
Мови
    Статус роботи
    2,808 cryptography робіт знайдено, ціни вказані в USD
    skype expert required Закінчився left

    Good morning, I am looking for a freelancer experienced with cryptography, reverse engineering, and perhaps familiarity with skype. I need assistance updating an existing tool (source available) so that works on XP but needs some modifications to work under Windows 8 and support the latest version of skype (metro). Experience of working with hashes, DPAPI, DPAPI-NG and Windows Protected Storage/Vault would be very useful. Do get in touch and let's discuss :-) All the best, Sam

    $250 (Avg Bid)
    $250 Сер. заявка
    1 заявки
    Cryptography a Software Закінчився left

    We want to protect intellectual property of some input files that are used in an open source software. We will provide all detail regarding this open source software. Source code is in ANSI C Project needs: 1. Cryptography of configuration files; 2. Input files (2); 3. Command line; 4. Obscure compiled code. We need complete instructions to compile software in Linux and Windows, all source code for both platforms and tools to cryptography input files.

    $697 (Avg Bid)
    $697 Сер. заявка
    14 заявки
    Paper in Computer Security Закінчився left

    Need to Write a Paper (7-8) Pages. Must be 100% Original and Plagiarism free. Specs and Samples Papers are Attached. You can Choose Any Topic in the Computer Security, Web Security or Cryptography. You must Specify Some Topics in The PM. Otherwise Your Bid Will be Deleted...

    $99 (Avg Bid)
    $99 Сер. заявка
    1 заявки
    Custom Project Mar 23 2013 20:31:26 Закінчився left

    ...the project report and source code are submitted on the due date, each student also needs to set up an appointment and demonstrate the program in a 10-minute demonstration session. Word Counting Project (JAVA) ________________________________________ Background and Introduction Word counting is used in all sorts of applications, including text analysis, creating indexes, and even cryptography. In this programming assignment, you will take a text file and compute what words appear in that file and how many times they appear. In this project, students implement a Map class AVLMap and a Set class AVLSet by using AVL tree class implemented by author Mark Allen Weiss. Your AVLMap and AVLSet do not have to have all methods as in TreeMap and TreeSet class in Java API. You...

    $30 (Avg Bid)
    $30 Сер. заявка
    1 заявки
    Custom Project Mar 23 2013 14:32:46 Закінчився left

    Project Name : ”Dynamic Routing With Security Considerations” Description: Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, an analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.

    $30 / hr (Avg Bid)
    $30 / hr Сер. заявка
    1 заявки
    Visual Cryptography Закінчився left

    In this project i have used HALFTONE concept to merge two fake image and get the real image . Halftone is the reprographic technique that simulates continuous tone imagery through the use of dots, varying either in size, in shape or in spacing."Halftone" can also be used to refer specifically to the ...HALFTONE concept to merge two fake image and get the real image . Halftone is the reprographic technique that simulates continuous tone imagery through the use of dots, varying either in size, in shape or in spacing."Halftone" can also be used to refer specifically to the image that is produced by this process. This was a project, i developed in 3rd year of my engg. to learn image cryptography , programs are really easy and easy understandable , java language has ...

    $889 (Avg Bid)
    $889 Сер. заявка
    4 заявки

    I want to port a simple C# code to Java. It would read a pair of certificates in .pem format to sign/encrypt and validate/decrypt xml string using xml ecryption and xml signature standard provided by W3C. Would be easy for some one who has experience in Java and Cryptography. External library is allowed to use. The attached file is the code in C#.

    $108 (Avg Bid)
    $108 Сер. заявка
    8 заявки
    EMV Pin reader,emv smartcard copy, Закінчився left

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the software mus...

    $9787 (Avg Bid)
    $9787 Сер. заявка
    1 заявки

    i attached the question need it done before the weekend if u cannot do all of it, let me know.. bid now.. thanks

    $183 (Avg Bid)
    $183 Сер. заявка
    3 заявки

    ...using multiple simultaneous connections to the same game server in order to increase their odds to win. We will have to add userIDs, email address, IP addresses to a black list, and code the web site to block them from connecting to the server for a period of time. You'd have to be willing to become somewhat knowledgeable about how Bitcoins and cryptography work to do this project... but you will not need to be an expert on BitCoins or cryptography by any stretch of the imagination. You must speaks excellent English and you should be a citizen of the USA, or live in a country where you could be extradited if I catch you putting backdoors in this system... or if the Feds or my book keepers come knocking on my door, asking about shady transfers, embezzlement, etc. ...

    $27 / hr (Avg Bid)
    $27 / hr Сер. заявка
    2 заявки
    Secure file-sharing Закінчився left

    I am looking for some one to develop a site similar to Droplr or or CloudApp with PHP, HTACCESS and MySQL with jQuery at doing all other goodies. I am also looking for the web application to be secure and provide cryptography support. For file uploads and file downloads. Here are some features I would wish to have with the app. - Paid Plans - PayPal integration for Monthly/Yearly billing on a single plan or few plans - User Settings -> Avatar Upload & Gravatar -> Change Name, Password, E-Mail options -> Cancel Billing -> Delete account & wipe all files -> Plan Details - HTML5 or jQuery file uploader - Short URLs for files - Private and Public file links - Password protected files - Thumb View &...

    $740 (Avg Bid)
    $740 Сер. заявка
    9 заявки

    I want someone who has an in-depth knowledge of cryptography and Information security as whole who is willing to teach Crypto 2-4 hours a week over Skype and if possible few more hours on Operating system security and network security (The last two are NOT a must have knowledge but would help). I would prefer someone who has at least MSc in Information Security or similar level or higher knowledge.

    $25 / hr (Avg Bid)
    $25 / hr Сер. заявка
    8 заявки

    ...and on time. The person will be working me for next 10-12 weeks with one assignment each week. The assignment should be finish within 72 hrs. Also to see if you can solve the types of question I have I will send you 1 or 2 sample questions and you need to send me the solution for it. Here are the topics you should be familiar with - Big-O notation Modular arithmetic Primality testing Cryptography Universal hashing . Divide-and-conquer algorithms Recurrence relations Mergesort Matrix multiplication The fast Fourier transform Depth-first search in undirected graphs and many more. So if you agree to following terms then only bid and I will send you the sample question you need to solve and send me back- 1. This is a 10 - 12 week ling assignment with 1 assignme...

    $108 (Avg Bid)
    $108 Сер. заявка
    19 заявки

    I want to do a final year project based on encryption and cryptography using VB,VB.net or C++ or any comfortable programming language . I would need completely unique project not copied from internet or anywhere . also a report. if someone can do in the best way with best assistance please bid at least rate.

    $105 (Avg Bid)
    $105 Сер. заявка
    31 заявки
    cryptography using WSN Закінчився left

    for my MS thesis i have to simulate des, aes and aes+ecc(hybrid) encryption algorithms on wireless sensor networks using ns2, ns3, matlab or some other simulator like them and compare their results in graph. i have a due date of this project next week if you could in any way create a simulation nearly matching this or compare encryption algorithms seprately and provide their values in wsn and just make a graph it will be enough

    $100 (Avg Bid)
    $100 Сер. заявка
    1 заявки
    Cryptography on WSN using NS2 Закінчився left

    Need to simulate multiple cryptographic algorithms (DES, AES) in WSN using NS2 comparative analysis of DES and AES can be done in any other simulator but their result values must be used to simulate a wireless sensor network to show graphs of both algorithms.

    $100 (Avg Bid)
    $100 Сер. заявка
    1 заявки
    smart card EMV - repost 2 Закінчився left

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the...

    $3547 (Avg Bid)
    $3547 Сер. заявка
    6 заявки
    smart card EMV - repost Закінчився left

    Project name: Smart Card EMV / EMV ISO-7816 & Smart Card Java Card Software Engineer & Programming & Ecectronic Engineers & Microcontroller & Cryptography Look what I need : 1. PIN Project I need a Software with wich I can just read the PIN from a Smart Card ( a Bank Card ) wich can be a SDA or DDA card. Like everybody know, on the Chip & Pin cards or so called EMV Bank Cards the PIN it is on the Chip , the way to extract the PIN , I really don’t know it ! - I do have 2 Smart Card Readers/Writers and I do have a Software ( Java EMV Reader ) so I do know and understand some data from there… Notice: if somebody can provide a Software with which I can find out the PIN from a Bank SDA or DDA card ,the...

    $15309 (Avg Bid)
    $15309 Сер. заявка
    7 заявки

    The report is well organized but the content is taken from different places without paraphrasing (copy and paste). I want a professional writer to paraphrase it without spelling and logical mistakes. Preferably someone who has background in technical fields. 2 Days max to finish the job.

    $30 (Avg Bid)
    $30 Сер. заявка
    1 заявки

    Moreover, the intruders can even manipulate it as per their requirement or reveal it in front of others. Further in certain in cases it can also be used for launching an attack. Stenography is the only solution to it. This is a most common technique of hiding information in the form of digital images. In comparison to the cryptography technique this method not only make it known to others that information is retained in the hidden form but also restrict other from even making out that any such information exists. As more and more people are going the cyberspace revolution this technique of steganography is also gaining a lot of importance. This is the way of hiding information in such a manner that it does not enable the intruder to detect the secret message. An array of communic...

    $42 (Avg Bid)
    $42 Сер. заявка
    1 заявки
    Image Steganography Project Report Закінчився left

    Moreover, the intruders can even manipulate it as per their requirement or reveal it in front of others. Further in certain in cases it can also be used for launching an attack. Stenography is the only solution to it. This is a most common technique of hiding information in the form of digital images. In comparison to the cryptography technique this method not only make it known to others that information is retained in the hidden form but also restrict other from even making out that any such information exists. As more and more people are going the cyberspace revolution this technique of steganography is also gaining a lot of importance. This is the way of hiding information in such a manner that it does not enable the intruder to detect the secret message. An array of communic...

    $18 - $152
    $18 - $152
    0 заявки

    I need a person who can do the implementation of an algorithm in Matlab. Desired Skills: Know-how of image processing, cryptography, Matlab

    $55 / hr (Avg Bid)
    $55 / hr Сер. заявка
    21 заявки

    Hi, I need help to make an application of cryptography. I had trouble in some parts. nearly 70 percent of this application is almost done, so if you are interested I hope you can do something like the following. 1. Secret-key cryptography divided into block and stream ciphers. As opposed to block ci-phers, stream ciphers encrypt each data symbol (as small as a bit) into a ciphertext symbol under a time-varying transformation. 2. LFSR controlled by another LFSR (which may be the same one). 3. Cellular Automata (CA) will be used for solutions of linear diference equations with constant coecients. If you understand and experts, we can talk about things that I need on a private message. Thank you Sincerely. Flynn

    $186 (Avg Bid)
    $186 Сер. заявка
    6 заявки

    In an olden research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other.

    $25 / hr (Avg Bid)
    $25 / hr Сер. заявка
    1 заявки

    In an olden research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other.

    $25 / hr (Avg Bid)
    $25 / hr Сер. заявка
    1 заявки
    Encryption of a Video Streaming Закінчився left

    Encryption of a Video streaming application 1. Goals This assignment is to apply security to an application; in particular cryptography to secure the data that this application uses. You are provided with a simple but working C# streaming video server and video player client. The client and server in this system are communicating using the Real-Time Streaming Protocol (RTSP) and send data using the Real-time Transfer Protocol (RTP). This system as provided is totally insecure; all the streaming data are transmitted in the clear. You will be required to provide confidentiality, message authentication, and replay protection to the RTP traffic, using both the cryptography and security features found in the .NET platform and Mono library. The required security features are: 1...

    $575 (Avg Bid)
    Обраний
    $575 Сер. заявка
    5 заявки
    Logo Design Закінчився left

    I need an outstanding logo designed for my game website. . I will be using this logo on all my webpages. I will also be delivering to animator to build a video intro. Theme is cryptography / code-breaking. My business creates video playlists that use coded messages to guide players to the hidden video at the end of the game. Prize money is awarded. I'm not the creative type, and thought someone who went to the site and actually played the game would be inspired to create a knockout logo for it.

    $55 (Avg Bid)
    $55 Сер. заявка
    29 заявки
    ASP.NET MVC Web Application Developer Закінчився left

    ...autonomy and technical input into the architectural, implementation and testing phases of the project. Technical Requirements: Solid experience developing ASP.NET Applications. (MVC with AJAX preferred.) Solid experience with WCF Knowledge of Entity Framework or other ORM / ODM. Demonstrable experience utilising Modern Design Patterns for Scalability and Code re-use. .NET Security and Cryptography. Familiarity with Razor View Engine, Javascript, CSS and HTML Familiarity with Transport Layer, Streaming Data and Media protocols. Firm knowledge of SQL and RDBMS. Exposure or experience developing GIS and Mapping applications would be beneficial. Data Analysis techniques relating to data visualisation, reporting, Data Mining and Business Intelligence would be benefic...

    $28 / hr (Avg Bid)
    $28 / hr Сер. заявка
    31 заявки

    13 - 14 page article on Cryptography. Can be on anything concerning Cryptography. -Paper MUST be 100% original and MUST pass copyscape (no exceptions). -The article must be written in APA format. -The paper must contain a title page with running header, abstract page, main body and reference page. -Main body must be between 11 and 12 pages in length. -Font must be 12 point Times New Roman -I need you to reference at minimum 10 published sources written by industry experts (books, articles, in industry periodicals, or expert websites such as manufacturer's technical reference manuals). -I can't stress enough that the 10 references must be genuine and correct. Also cite the references! -Again, MUST PASS copyscape. -Must be able to meet the d...

    $71 (Avg Bid)
    $71 Сер. заявка
    8 заявки

    13 - 14 page article on Cryptography. Can be on anything concerning Cryptography. -Paper MUST be 100% original and MUST pass copyscape (no exceptions). -The article must be written in APA format. -The paper must contain a title page with running header, abstract page, main body and reference page. -Main body must be between 11 and 12 pages in length. -Font must be 12 point Times New Roman -I need you to reference at minimum 10 published sources written by industry experts (books, articles, in industry periodicals, or expert websites such as manufacturer's technical reference manuals). -I can't stress enough that the 10 references must be genuine and correct. Also cite the references! -Again, MUST PASS copyscape. -Must be able to meet the d...

    $92 (Avg Bid)
    $92 Сер. заявка
    2 заявки
    eCommerce Website Закінчився left

    We have a senior role available for a complex eCommerce web site. Experience in architecting and developing large complex solutions is essential. Understanding of Application Interoperability and security is a must and you may be required to develop and document an API. - be familiar with SOAP, XML, AJAX, and Public Key Cryptography - be confident with SVN usage - have good English language skills - have strong php, javascript, SQL - have completed at least 1 other large D7 project - have a good understanding of the SDLC, would prefer someone with 5+ years experience coding at least - work within a UNIX (OSX/Linux/*Nix) environment and have a good IDE and PHP Debugger - be able to write detailed reports of your work - be a self starter and motivated to solve challengin...

    $13 / hr (Avg Bid)
    $13 / hr Сер. заявка
    20 заявки
    Kerberos and Public Key Cryptography Закінчився left

    GUI Based application with Kerberos implementation along with RSA in it. check attached paper Check this: and

    $192 (Avg Bid)
    $192 Сер. заявка
    8 заявки
    python task in network field Закінчився left

    its a python based programming - cryptography.....i have attched the folder containing its assignment brief...please read that first and it also contains its required contents....hope you can do this .

    $96 (Avg Bid)
    $96 Сер. заявка
    3 заявки
    Cryptography Project Закінчився left

    Hi I have a urgent project which consists of writing a code to encrypt and decrypt a string using identity based key aggrement protocol in has to be completed in 1day

    $100 (Avg Bid)
    $100 Сер. заявка
    11 заявки

    Please read this link for the requirement. Don't bid if you not confident. It must be done in 24 - 36hours. If you do it with suitable price, there can be part 2 for you.

    $200 / hr (Avg Bid)
    $200 / hr Сер. заявка
    1 заявки

    This program, to be written in VB6 (no .NET), has fairly basic requirements (the leaner the better, and no fancy GUI requir...use for encryption or decryption depending on the key - Can encrypt small strings (variable size but typically 128-1024bit) using the RSA public key - Can decrypt the resulting ciphertext with the RSA private key Only RSA is to be used (no followup RC4 etc), and only the Microsoft CryptoAPI is to be used (no 3rd party stuff thanks!) Due to the "must be perfect" nature of cryptography please don't bid if you THINK you MIGHT be able to do this, please only reply if you KNOW you CAN. :) .exe demo's as always are very much appreciated and almost guaranteed to secure your bid if it works as specified above :) I loo...

    $309 (Avg Bid)
    $309 Сер. заявка
    5 заявки

    ...blobs will then be used in the IPSW-stitching process (you don't have to worry about this), and finally restored on a device. The keys required to generate this blob can be user-input via input boxes provided by your application, or otherwise they can be extracted automatically by having the device plugged into the USB port (similar to how TinyUmbrella does it). We understand this is mostly a cryptography problem - therefore we are looking for people with experience in this area. Upon being award this project, the selected candidate should be prepared to present a proof-of-concept (video or design logic diagram) before the first installment of 50% will be awarded. Upon receiving a working-beta application, we will award an additional 40% and the remaining 10% will be ...

    $7727 (Avg Bid)
    $7727 Сер. заявка
    11 заявки

    I am looking for someone to answer only 2-7 questions. Please respond via PM. Work includes Cryptography based questions. Please scammers, do not email me...I am looking for only well educated people who like doing work and clean transactions. Thank you. PM for details!

    $52 (Avg Bid)
    $52 Сер. заявка
    4 заявки
    Questions in Cryptography (Theory) Закінчився left

    Theory questions (less than 10 questions in total). No programming required. Looking for well educated and responsible people who are willing to work on questions related to Algorithms, and Cryptography, Cryptoanalysis, Math, etc. Payment will always be provided and I have my resources and references available. I've had many bad experiences with programmers in the past who are unstable and scam, so please don't waste time like that here.

    $79 / hr (Avg Bid)
    $79 / hr Сер. заявка
    5 заявки
    crypting my files Закінчився left

    Cryptography. I want someone that can crypt my files or build me a crypted that would be FUD. fully undetected and private crypter

    $175 (Avg Bid)
    $175 Сер. заявка
    4 заявки

    I need a music player with only the basic functions ( Play / Pause / Skip / Volume ) and that are enabled and disabled by admin password. The music is downloaded from a FTP Server and stored in a cache folder. The cache folder must have cryptography or hidden so that the user can't "steal" the music ( similar to spotify / deezer / grooveshark) . When the user clicks play for the first time, the player opens a "downloading screen" and only starts playing after 1gb of music downloaded in the cache (The purpose of the local storage is that the music never stops playing, even if there is no internet available). The cache folder have a maximum size of 5GB and keeps downloading music in the background while playing the local music. * we also need an website ad...

    $425 (Avg Bid)
    Терміновий
    $425 Сер. заявка
    2 заявки

    I need a music player with only the basic functions ( Play / Pause / Skip / Volume ) and that are enabled and disabled by admin password. The music is downloaded from a webserver and stored in a cache folder. The cache folder must have cryptography or hidden so that the user can't "steal" the music ( similar to spotify / deezer / grooveshark) . When the user clicks play for the first time, the player opens a "downloading screen" and only starts playing after 1gb of music downloaded in the cache (The purpose of the local storage is that the music never stops playing, even if there is no internet available). The cache folder have a maximum size of 5GB and keeps downloading music in the background while playing the local music. * The music is going to be do...

    $450 (Avg Bid)
    Терміновий
    $450 Сер. заявка
    5 заявки

    Hi, I want some professional C# programmer write or find some C# software in source code in below fields: Cryptography Anti Spam Anti Malware Anti virus Password manager PC optimizer If you have ready C# code in other fields please send list of them too. We need all code and software writing in C# and you can find that in internet or write by yourself. Please attach a name and description for each code. We like do this business for long time and not only one projects. For reference: Regards,

    $195 (Avg Bid)
    $195 Сер. заявка
    2 заявки

    I need an expert in SSL who is comfortable with openssl and the C# cryptography standard libraries. The objective is to create a private CA that issues certificates that are tied to a specific computer. There are several methods to uniquely identify a Windows computer based on hardware IDs (MAC addresses are not secure enough). Next, a C# program will connect to the server using TCP and use an SslStream to establish a secure connection. The RemoteCertificateValidationCallback callback from SslStream will then validate that the certificate of the server is signed by the private CA. I would also like a demonstration of mutual authentication. The C# program must detect if the machine certificate has been moved to another computer and reject it. The deliverables will be shell scrip...

    $30 - $5000
    $30 - $5000
    0 заявки

    I want a chat application, preferably cross-platform but starting with iOS (jailbreak if needed) with the simplicity of whatsapp but with very high encryption standards. Preferably OTR protocol P2P. Open for PGP or other standards. Settings must include local saving of chats, never server-saved. Need a cryptography expert.

    $3000 - $5000
    $3000 - $5000
    0 заявки

    I want a chat application, preferably cross-platform but starting with iOS (jailbreak if needed) with the simplicity of whatsapp but with very high encryption standards. Preferably OTR protocol P2P. Open for PGP or other standards. Settings must include local saving of chats, never server-saved. Need a cryptography expert.

    $15 - $25 / hr
    Обраний Терміновий Прихований
    $15 - $25 / hr
    0 заявки
    Wireless Security Book and Articles Закінчився left

    1. I want a well-researched, well written book about “Mobile Security” that is fit for publications. Need to be standard American English. Approximately 300 pages. The desired chapters are listed below and the Outline below shows topics I would like covered in the book. CHAPTERS •Understand the concepts and terminology behind mobile application security •Understand the basics of Cryptography, Encryption, Integrity and where they fit in the overall mobile application security picture •Understand mobile application software vulnerabilities based on realistic threats •Learn the entire spectrum of threats, attacks that take place against mobile applications and mobile platforms in today’s world •Understand the vulnerabilities of mobil...

    $2125 (Avg Bid)
    $2125 Сер. заявка
    4 заявки

    I want a chat application, preferably cross-platform but starting with iOS (jailbreak if needed) with the simplicity of whatsapp but with very high encryption standards. Preferably OTR protocol P2P. Open for PGP or other standards. Settings must include local saving of chats, never server-saved. Need a cryptography expert.

    $3000 - $5000
    Обраний Терміновий Прихований
    $3000 - $5000
    6 заявки
    cryptography MAC algorithm Закінчився left

    IEEE paper implementation using java. based on cryptography using error correcting codes and MAC based algorithms

    $378 (Avg Bid)
    $378 Сер. заявка
    8 заявки
    clone of countermail.com Закінчився left

    Hello! I am looking for someone to help me create a webservice to send and receive encrypted emails. A good benchmark is www.countermail.com. The service needs to be of great encryption for sending and receiving emails. The company needs good php knowledge. cryptography or how to implement it in webmails graphic design skills It need to encrypt with OpenPGP, with 2048 bits encryption keys downloadable with javascript. The service needs to be easy to handle. I will provide the server etc. Please make a bid and add your skype name there and we can talk further on this since it is a pretty big project. Great communication throughout the project is necessary. I will let you know details if I find you bid interesting. Please dont add me on skype! BR Tobias

    $5143 (Avg Bid)
    $5143 Сер. заявка
    18 заявки

    Топ-статті спільноти cryptography