Cryptography Jobs

37 were found based on your criteria

  • Hourly – More than 6 months – 10-30 hrs/week – Posted
    We are looking for an engineer to be a part of a team to work on a business to business web application. This would be an on-going long term full time project if you are the right person. Some things we are looking for in the right person: * Understands and uses version control (doesn't matter which, but git is preferred) * Understands issue tracking * Has working software out in the Real World (tm) * Demonstrates some ability with each of PHP ...
  • Hourly – More than 6 months – 10-30 hrs/week – Posted
    We are looking for an engineer to be a part of a team to work on a business to business web application. This would be an on-going long term full time project if you are the right person. Some things we are looking for in the right person: * Understands and uses version control (doesn't matter which, but git is preferred) * Understands issue tracking * Has working software out in the Real World (tm) * Demonstrates some ability with each of PHP ...
  • Fixed-Price – Est. Budget: $1,350.00 Posted
    Need to 1. lock (hide) 2. encrypt folders 2. wipe (overwrite the deleted files on disk) The above functionality is similar to some the main features "Folder Lock", TrueCrypt and similar software. <--> On the fly (sector at the time) decryption. Must work on Windows XP and up. Driver for Mac OSX would be a great addition. The product must have Python binding to be used in a larger project written in Python and Qt. In your reply, please indicate how ...</-->
  • Hourly – Less than 1 month – Less than 10 hrs/week – Posted
    I am looking for a C programmer with experience in cryptography. You will be required to review version 1.3 of the Skein cryptographic hash function as described in https://www.schneier.com/code/skein.zip That zip file contains the both the specification and a reference implementation of Skein in C. You will be required to write a command line program that uses the Skein reference implementation so that the user can compute and check Skein 256 bit, 512 ...
  • Hourly – Less than 1 week – Less than 10 hrs/week – Posted
    We have a short piece of JAVA code that needs to be converted into PHP. The Java code decrypts data using single shared key that is encrypted using the RC4MD5 algorithm. The successful applicant will need to do the following . 1) Understand the Java code logic 2) Run the Java code and observe the results 3) Find similar PHP functions which can perform the same functions as the Java code 4) Create PHP function named as "DecryptInformation", which takes two ...
  • Hourly – Less than 1 month – Less than 10 hrs/week – Posted
    Hi, We will aim to be the best option for Australian customers to buy and sell Litecoin at close to market price also with the ability to store and send Litecoins directly from there managed wallet on the site. Please review the following documents for specific details on the design/concept/functionality. Site Specifications: http://goo.gl/OSpKKV Technical Specifications: http://goo.gl/fCSw59 Example Design/Layout: http://goo.gl/0lt7G8 This project is for experienced bidders only. If you ...
  • Fixed-Price – Est. Budget: $350.00 Posted
    I am seeking an expert (electrical engineer, computer engineer, computer software engineer) who is knowledgeable about encryption/cryptography in communication systems (e.g. WiFi, 802.11). This project will focus on the AES cipher algorithm. You will have an opportunity to invent improvements related to the AES cipher algorithm and present it to me via Skype in the form of a descriptive PowerPoint presentation. Compensation: Fixed payment: $250 upon completion Bonus payment: Up to $100 discretionary bonus based on quality
  • Fixed-Price – Est. Budget: $10.00 Posted
    The work simply is writing about (MAC) that describes the following questions: 1- What is MAC ? 2- How it works? 3- What it can be used for {provide an example} ? This short essay is no less than 150 words and no more than 300 words The important thing is that this essay will be checked for plagiarism so if there are any citation then should be referenced as APA style .
  • Fixed-Price – Est. Budget: $300.00 Posted
    The encrypted and signed file is generated via .net code on remote devices. The file contains one xml file and three images. We require a utility for decrypting and verifying the signature on our Solaris 10 desktop environment. The application must run on Java 6. The C# code used to encrypt, sign and write the file will be supplied for your reference. We will also provide example files which will be used for testing the application. The application will be ...
loading