Aes decrypt jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 aes decrypt jobs found, pricing in USD

    The objective for this project is to develop a conversation code written in C#. As a developer, I need a proficient freelance coder who has significant experience in C#. Upon completion, the code should be sen...developer, I need a proficient freelance coder who has significant experience in C#. Upon completion, the code should be sent over as a file attachment. Key Skills Required: - C# coding expertise - Encryption Decryption expertise - Ability to develop interactive conversation codes - Accurate and efficient coding - Understanding of effective file attachment methods I just want console app that decrypt the provided payload in the ruby code, after you done, I will send some test data to make sure it I working correctly. Below code is written in Ruby I need same in C# see att...

    $120 (Avg Bid)
    $120 Avg Bid
    37 bids

    ...mechanism. • Use strong authentication mechanisms, such as username/password or biometric authentication or (MFA) 2. Key Exchange: • Implement a secure key exchange protocol, such as Diffie-Hellman key exchange, to establish a shared secret key between users. • Ensure that the key exchange process is secure against man-in-the-middle attacks. 3. Encryption: • Use a strong encryption algorithm, such as AES (Advanced Encryption Standard), to encrypt messages, file transfers, and voice calls. • Encrypt the messages, files, and voice data before transmission. 4. Message Integrity Verification: • Implement a message authentication code (MAC) mechanism to verify the integrity of messages. • Append the MAC to each message before transmission and verify...

    $361 (Avg Bid)
    $361 Avg Bid
    85 bids

    Here is a NodeJs package that is used to decrypt media files received on WhatsApp messages for our clients. This works well, however, it decrypts file into binary data which is saved on hard disk. This takes a lot of memory for large files. We need to modify this script so as to return stream instead of data. We should be able to use the stream in a pipeline/pipe. I have a small NodeJS script with above code, that you should take a look at and let me know if you can do it. To accomplish this, you should definitely have: - Experience with advanced NodeJS development and general decryption algorithm - Try not using other external packages, if possible - Ask me for the nodejs project in private message - Should be easy task for someone experienced

    $47 (Avg Bid)
    $47 Avg Bid
    7 bids

    ...pace of development. Key requirements include: - Proficient in the use of NTAG 424 DNA for mutual authentication -' SUN, AES,CMAC, dynamic authentication, mutual authentication' How they work. - Proficient in making native app on NFCs. - Familiar with programming and product authentication methods - Comprehensive knowledge in front-end, backend and database so, in short, i want to make a cross-platform anti-counterfeiting app using NFC (ntag424 dna) . which the user is going to scan the tag with the app it's going to verify it with the database. then show them the UI as per you familiar with these kinds of platforms and the ntag 424 DNA (SUN, AES,CMAC)? i will welcome any suggestion or recommendation from your side too. Better ideas are also welcome...

    $451 (Avg Bid)
    $451 Avg Bid
    5 bids

    ...need an expert to implement advanced AES-256 bit security encryption for an SQLite database in a Windows application using VB.Net. This task requires specific expertise in working with encryption to secure private data. Key Requirements: - Proficiency in VB.Net - Deep understanding of AES-256 bit encryption - Familiarity with SQLite databases - Prior experience in data encryption The encrypted SQLite database will become a storage unit for personal identifiable information. This sensitive data demands high security measures, thus professional handling is crucial for the success of this project. The completed task should ensure maximum protection against unauthorized access and reliably shield the stored personal data. Main Task: - Implement advanced AES-256 bi...

    $60 (Avg Bid)
    $60 Avg Bid
    2 bids

    I am in need of a compelling sales pitch for our IT services, specifically targeting large corporations. The sales pitch should prominently feature two of my main services: Active Directory Migrations, Consolidations, and On-prem migration to Azure AD. Key Benefits to Highlight: - Significant cost savings - Over 14 years of experience in providing top-tier IT services to some ...- Over 14 years of experience in providing top-tier IT services to some of America's largest companies Ideal Skills and Experience: - Significant knowledge in IT sector - Proven experience in sales pitch creation - Understanding of large business requirements - Familiarity with Azure AD and Active Directory. Previous Projects: Ascension Health domain Community Health Hospital Rockwest Bedrock AES P...

    $166 (Avg Bid)
    $166 Avg Bid
    9 bids

    I am on the lookout for a CryptoJS expert who is proficient in using IV and keys to decrypt text data. Your task will be: - Decrypting text data with the keys and IV that I will supply. Skills and Experience Needed: To complete this project successfully, you should possess: - Profound understanding of CryptoJS - Experience in decrypting data, specifically text - Skill in using provided IV and keys to decode encrypted data - Incredible problem-solving and communication skills This is a forward-thinking task that requires a professional who is attentive to detail, delivers promptly and comprehends the prime role of data safety and confidentiality. I await your bids.

    $41 (Avg Bid)
    $41 Avg Bid
    6 bids

    I need an expert who's able to decrypt an old .accdb MS Access database for which the encryption key was lost. The database contains precious client information and business transaction data that I want to incorporate into our current database. Here are more specifics of the task: • Database Conversion: The old database structure and relationships are somewhat important, so would ideally be maintained during the conversion process. However, some changes can be considered if necessary for integration. • Data Integration: Both client information and business transaction data from the old database should be incorporated into the current one. As a preference, if the data can comfortably fit, have it provided in an Excel spreadsheet. • Data Cleaning: There's ...

    $157 (Avg Bid)
    $157 Avg Bid
    28 bids

    I want to decrypt a single Java File (.jar)

    $22 (Avg Bid)
    $22 Avg Bid
    10 bids

    Need a cyber security specialist to decrypt an AES-CTR encryption for a CTF flag. provided information : pcapng file for wireshark and the encryption method written in python

    $23 (Avg Bid)
    $23 Avg Bid
    8 bids

    ...The design of the client should be user-friendly, making it easy to traverse and understand. - High performance and stability: Despite its ease of use and setup, the client should not compromise on performance or stability. - The client interface needs the following features: "Connect", "Disconnect", and "Import Config" buttons. Clicking "Import Config" imports a configuration file encrypted with AES-256. The configuration file contains the server IP address, port number, virtual HUB name, username, and password. After importing the configuration file, VPN connections can be made by clicking connect and disconnect. Use direct TCP/IP connections, with an automatic reconnection interval of 15 seconds, always keeping the VPN online. The offici...

    $142 (Avg Bid)
    $142 Avg Bid
    4 bids

    im looking for Android Java class that does the following 1. generate public and private encryption keys 2. get a base-64 versi...generate public and private keys } public String getPublicKey() { // return base-64 version of the public key } public void setPublicKey(String base64PublicKey) { // set the public key from the server } public String encrypt(String plainText) { // use my private key to encryopt the data } public String decrypt(String encryptedText) { // use the servers public key to decrypt the data } } Need the corresponding class in C# .NET 4.5.2 that works with this java class. The android java code should use java 8, gradle plugin version 4.2.2 and gradle version 6.7.1 in android studio pr...

    $33 (Avg Bid)
    $33 Avg Bid
    13 bids

    I require a skilled professional to decrypt files that have been encrypted and received a new extension (.cdtt). The original files were in .pdf format. Key Job Details: - No knowledge of the initial encryption method used is available. - There's no time frame imposed, so a meticulous, detail-orientated approach can be taken. - The objective is to restore the files to their original, unencrypted state. Ideal Candidate: - Experience in dealing with unknown encryption methods. - Previous work with PDF files and their encryption/decryption. - Strong problem-solving skills. Please place your bid if you meet the criteria and think you can help.

    $89 (Avg Bid)
    $89 Avg Bid
    2 bids

    I'm currently seeking a skilled Python developer, specifically with expertise in Cyber security, to address a critical data encryption issue in our corporate network. The ideal candidate should be proficient in: - Cybersecurity measures and protocols - Data encryption - Python Programming The task at hand: - Implement AES-128 encryption using Galois-Field multiplication without any external libraries Experience in using Python for data encryption in a corporate setting is strongly preferred. The goal is to ensure the enhancement of the network's security and the integrity of our corporate data. Strong communication skills are a must, as the selected candidate might need to explain complex cybersecurity concepts to the in-house team.

    $26 (Avg Bid)
    $26 Avg Bid
    6 bids

    ...PHP pages to develop not to mention two CSS HTML pages to parse for output. The chosen platform for this project is WYSIWYG Web Builder v19, and may utilize it's own controls and CSS imports with exception of a login page necessary to authenticate users and establish a timed session, resulting in cookie session management, utilizing AES for obfuscation. **Key Requirements:** - **E-commerce Functionality:** The site will utilize user authentication via PHP & AES, through; File IO. - **Payment Gateway Integration:** Implement Clover as the primary payment solution, ensuring secure and efficient transaction processing. - **User Experience:** Maximal visibility & archived changes, as well as seamless work flow, are preferable. - **Responsive Design:** The websit...

    $1616 (Avg Bid)
    $1616 Avg Bid
    259 bids

    I'm facing issues with RSA decryption in a Laravel project. The error code I'm receiving is: {"response_code":"33","response_description":"Decryption of SessionKey failed","error_details":"error:04099079:rsa routines:RSA_padding_check_PKCS1_OAEP_mgf1:oaep decoding error"}. I realized I need a...techniques, particularly RSA - Locating and fixing the issue preventing successful decryption - Due to preferences, I skipped a question about the storage of RSA keys. Experience working in an environment with unclear RSA key storage would be beneficial Lastly, effective troubleshooting and problem-solving capabilities are necessary for this task. the flows 1. we will decrypt X-SessionKey using private key 2. we'll...

    $183 (Avg Bid)
    $183 Avg Bid
    8 bids

    ...robust/secure QR to login the system. - Ensuring data security via robust encryption process to protect the integrity of information and guard against any unauthorized access. - decrypt_password and encrypt_password functions already implemented in model. It should read a qr with a qr scanner with keyboard emulation, where it is user and encrypted_pass stored and separate by a comma. Then decrypt the password using the method decrypt_password of model, and then log in with that loging an decrypted pass. Requirements: - Proficiency in Odoo development with a good understanding of its operating modules. - Familiarity with QR code integrations and data encryption techniques. - Demonstrated ability in building secure login systems. - Strong knowledge of user-focused design.

    $540 (Avg Bid)
    Urgent
    $540 Avg Bid
    40 bids

    I'm on the lookout for a skilled freelancer who can implement AES encryption and decryption for text inputs efficiently. My project involves securing sensitive information through encryption and ensuring it can be decrypted back into its original format. Here's what I'm looking for: - **Strong Understanding of AES**: Proficiency in the Advanced Encryption Standard (AES) is a must. You should have a robust grasp of its workings, strengths, and how to implement it securely. - **Encryption/Decryption of Text**: The core task involves encrypting plain text and decrypting it back to its original state. Hence, experience with handling and manipulating text data is crucial. - **Security Best Practices**: Knowledge of security measures and best practices in e...

    $21 (Avg Bid)
    $21 Avg Bid
    8 bids

    I need a cryptologist -programmer Library (algorithm): Argon2id, AES, RSA Programming language: Java, and your own choice for implementing the Rest API Sweeps work: The goal of this work is to create a software component that will store and securely exchange secret data, such as symmetric encryption keys, with other components. When developing this solution, the zero trust principle should be adopted, and the need to create secure copies of stored information should be taken into account. The correct functioning of the component must be demonstrated by testing Work plan: 1. principles of secure software development 2. authentication, authorization, cryptographic mechanisms 3. principles of implementing secure software 4. Security Testing The methodology will reset in the corresponde...

    $173 (Avg Bid)
    $173 Avg Bid
    10 bids

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways to ...

    $253 (Avg Bid)
    $253 Avg Bid
    8 bids

    ...In parallel, our Content Management and Brand Managers teams are considering working with CRM Products and Content Groups in Promomats in the digital materials like AE and CLMs. This information is key from Commercial and Compliance point of view and must be integrated with Veeva CRM. This has to be tested in Sandbox before we move it to Business considers this information of the CLMs and AEs used and shown by the MSL and Sales Reps in the field very important. They want to capture this in the PowerBI report that is being built. Exercises: i Please, provide a technical proposal solution to solve this gap between systems. ii How can we setup this functionality? How can we ensure this information is integrated in the CRM and how we shown this in the CRM? iii Provide two ways t...

    $201 (Avg Bid)
    $201 Avg Bid
    9 bids

    ...requirements: - **Core Focus:** Integrate steganography into text, images, and video files using Java. - **Steganography Techniques:** - Implement Discrete Cosine Transform (DCT) - Integrate Discrete Wavelet Transform (DWT) - **Encryption:** - Use AES encryption algorithms - Ensure a low level of security for keys (sufficient for basic protection) The ideal freelancer will have: - Proficiency in Java programming (primary language) - Experience with cryptographic techniques - Understanding of DCT and DWT steganography methods - Knowledge of AES algorithms and key management The project is quite demanding; thus, it's pivotal that the freelancer demonstrates a strong portfolio which encompasses similar security-focused tasks. Above all else, creativity an...

    $27 (Avg Bid)
    $27 Avg Bid
    3 bids

    I need a skilled developer to create a steganography application tailored to my specifications. My key requirements include: - Development for a Windows environment. - Capability to embed text within images. - Use of AES for intermediate encryption level. Ideal skills for this project: - Proficient in cryptography and encryption algorithms. - Experienced with image processing. - Strong background in Windows application development. - Familiar with steganography techniques. Experience with the following is a plus: - Knowledge of AES encryption standards. - Past projects involving steganographic practices. I'm looking for someone who can deliver a secure, user-friendly application with a focus on confidentiality. Your expertise will help ensure that the text remains hi...

    $113 (Avg Bid)
    $113 Avg Bid
    4 bids

    ...protection, secure transactions, and protection of sensitive information. Core project deliverables entail: • Ensuring SSL (Secure Sockets Layer) and AES (Advanced Encryption Standard) encryption methods are applied across the platform. • Implementing robust safeguards to protect customer data, secure online transactions, and preserve sensitive information, including banking details, ownership data, and server information. • Integrating various payment gateways into the platform, including PayPal, Stripe, and a direct bank API gateway. Prior experience in designing encrypted ecommerce websites is crucial, alongside proficiency in SSL, AES, and various payment gateway integrations. The ideal candidate should demonstrate a clear understanding of advanced enc...

    $765 (Avg Bid)
    $765 Avg Bid
    151 bids

    I'm seeking a skilled Java Swing develope...connection must contain the following details: DataBaseName, Host, Port, User, and Password. - Database Compatibility: You should ensure compatibility with MySQL, Oracle, and PostgreSQL databases as the specific database type may vary. - Encryption: All passwords must be encrypted using AES encryption for security purposes. - Display: Upon launch, these connections should be displayed in a Swing JList. - Skills and Experience: The ideal candidate definitely needs substantial experience with Java Swing, AES encryption, and managing database connections. Your demonstration of past work will be an added advantage. Please remember to highlight in your application, your experience in the key areas detailed above. I look forward ...

    $173 (Avg Bid)
    $173 Avg Bid
    6 bids

    I am looking for a professional who can assist me in downgrading the firmware on my STM32F103C8T6 Microcontroller Unit (MCU). The main objective is to return to an older version that allowed for easier control functionality. The features we are interested in controlling include the ability to 'switch on' the micro-controller. Key Tasks: - Decrypt current version of firmware - Extract older version of firmware via ST-Link - Implement the older version in the MCU The successful freelancer should be proficient in UART and MCU firmware updates, and should have experience with ST-Link and STM32F103C8T6 specifically. Skills and Experience: - ST-Link firmware extraction - Familiarity with STM32F Series - UART sniffing and decryption - Firmware downgrading and updating The ...

    $115 (Avg Bid)
    $115 Avg Bid
    19 bids

    I'm seeking a highly skilled Verilog engineer to design and implement an AES encryption and decryption system. This project has been initiated with the purpose of ensuring data security and as such, the successful applicant must be experienced in the field of cryptography. Proficiency in Verilog and a clear knowledge of encryption methods, particularly AES, are crucial for the success of this project. In your application, kindly provide: - Details of your past experiences related to Verilog - Any relevant project proposals you've worked on, showcasing your proficiency in developing AES systems. The deadline for completion of the project will be within one month. Please keep this timeframe in mind as you consider your application and potential schedule. I...

    $391 (Avg Bid)
    $391 Avg Bid
    8 bids

    I need a skilled writer to help me narrate my life's journey. The biography needs to be engrossing, with a combination of humor, poignancy, and fervour. Here's what I'm looking for: - Flair for narrative storytelling. - Previous experience in biographies would be advantageous. - Should be able to dramatise certain events effectively. - Should have exc...combination of humor, poignancy, and fervour. Here's what I'm looking for: - Flair for narrative storytelling. - Previous experience in biographies would be advantageous. - Should be able to dramatise certain events effectively. - Should have excellent communication to understand and portray my life story. More specific details and anecdotes would be shared upon the start of the project. Let's ...

    $1520 (Avg Bid)
    $1520 Avg Bid
    19 bids

    I'm looking for an experienced JavaScript developer well-versed in the SHA256 algorithm and CryptoJS library. This entails crafting effective code to decrypt using an Initialization Vector (IV) and Key. While predominantly JavaScript, this project is client-side. Key Requirements: * Proficiency in JavaScript * Experience with CryptoJS or equivalent libraries * Strong understanding of decryption processes With no particular preference for the version of CryptoJS, your experience and expertise can guide the most suitable selection. Through providing your input, we can ensure the optimal operation of our decryption code.

    $99 (Avg Bid)
    $99 Avg Bid
    47 bids

    I need an app to decrypt tiktok's mssdk file to obtain the "seed" and "sditoken" parameters, and copy the obtained parameter content to the mobile phone clipboard

    $146 (Avg Bid)
    Urgent
    $146 Avg Bid
    18 bids

    The aim is to develop an app, where there are 3 main users customer,shop keeper and delivery person. The customer uploads a document and provides a password to lock the document. Then a list of available shops are displayed and the customer selects shop and proceeds to payment. The password to the document is encrypted and sent to the shopkeeper and the key required to decrypt the password is sent to the delivery person. The delivery person can see list of all available deliveries and reaches the shop. In shop keeper interface we will provide a tab for decryption where the shop keeper enters the encrypted password he received and also the key which is present with the delivery person and gets the original password. Once the password is retrieved to unlock the document he will take o...

    $384 (Avg Bid)
    $384 Avg Bid
    27 bids

    Project Description: I am seeking assistance in recovering my files that have been encrypted by ransomware. Skills and Experience Required: - Experience in ransomwar...encrypted by ransomware. Skills and Experience Required: - Experience in ransomware decryption - Knowledge of various types of ransomware and their decryption methods - Familiarity with the encryption algorithms used by ransomware - Proficiency in data recovery and file restoration - Strong understanding of computer systems and file structures - Ability to work efficiently and effectively to decrypt all types of files affected by the ransomware - Excellent problem-solving skills and attention to detail Please provide your expertise and previous experience in dealing with ransomware decryption in your...

    $320 (Avg Bid)
    $320 Avg Bid
    14 bids

    I...system and a Windows client application, both developed using C#. The communication between these two platforms should be enabled through binary messages in CBOR format. Key considerations include: - Operating Systems: The candidate should be familiar with both Linux and Windows as the kestrel server is needed on Linux, and the client will be on Windows. - Encryption: We will be using keyed HMAC, AES-256, ECDSA, and ECDH for data security. An understanding of these encryption methodologies is necessary. - Programming: The project heavily relies on C#/.NET, so high proficiency is required. Expected candidates need to deliver secure and efficient solutions, demonstrating their competence in the above mentioned skills, particularly with binary communication and encryption meth...

    $904 (Avg Bid)
    NDA
    $904 Avg Bid
    26 bids

    About the Project: We're on the hunt for an enthusiastic and skilled d...An intuitive interface for managing scanned images, including options to delete and organize them. Efficient Folder Management: Users should be able to easily create and manage folders for their documents. Robust AES Encryption: Security is paramount. We're counting on you to implement top-notch AES 256 encryption for image storage. Smart Storage Management: Help our users keep their devices clutter-free with automatic local storage clearance after uploads. Your Technical Toolkit Should Include: A solid background in React Native and TypeScript. Hands-on experience with AES encryption in mobile apps. Proven skills in API integration and data management. A good grasp of SSO login me...

    $456 (Avg Bid)
    $456 Avg Bid
    19 bids

    ...This functionality is essential for data protection. The website must incorporate an audit trail of all uploaded and completed files, sorted by date/time/customer. It should include controls to ensure that files can only be returned (or collected by) the uploading customer and not by any other user. The site should be able to accept DS2 voice files for processing or include functionality to decrypt DS2 audio files by using NCH software (DS2 files are encrypted). Completed files should be auto-deleted after 30 days. On initial login, users should be asked to change their password. Other functionality can be determined in discussion with the developer. For an example of the format of site we are looking at, look at and File flow: Mobile

    $4242 (Avg Bid)
    $4242 Avg Bid
    75 bids

    Our team needs a seasoned Python and C++ developer to lead Widevine DRM implementation for our project. Check out this github - Our primary goal is to construct a WVD file from scratch or if you can use an existing thats fine. Main responsibilities include: Its for this github repo project: | to decrypt and enable downloads from the app. - Writing clean, maintainable, and efficient code in Python and C++. - Development and optimisation of our Widevine DRM, ensuring it functions seamlessly across multiple devices. - Building a WVD file from scratch and integrating it into our system. Desired skills and experience: - Deep knowledge of Python and C++. - Previous experience with Widevine DRM implementation is

    $58 (Avg Bid)
    $58 Avg Bid
    5 bids

    I'm searching for a talented software developer who can create a program that runs on Windows and will convert voter lists from PDF to Excel. Essential features the software must have include: - The ability to convert multiple PDF files simultaneously - The capability to automatically decrypt password-protected PDF files Critical skills and experience for this project: - Proficient in software development, particularly for Windows OS - Experience with encryption and decryption algorithms - Understanding of PDF and Excel file formats - Excellent problem-solving abilities Please only bid if you have the necessary skills and are confident in delivering a usable, efficient software solution. Uploaded Sample Voter List

    $283 (Avg Bid)
    $283 Avg Bid
    5 bids

    I am looking for a freelancer who can help me decrypt WhatsApp voice messages. I use an API that receives and send whatsapp messages. The voice messages are sent through the API with a link to access an .enc file anda a mediaKey to decrypt the file. I need an API that will receive these informations (link to file and mediaKey) and will return the voice message decrypted, as a base64 Requirements: - Knowledge of encryption algorithms and techniques Ideal freelancer: - Has successfully decrypted WhatsApp voice messages in the past - Can provide examples or references of previous decryption projects

    $119 (Avg Bid)
    $119 Avg Bid
    53 bids

    Hi Romeo. You started solving a Crypto CTF. I think I have the last piece we need to solve it: the name of the file. It have the lenght of a 128 aes key or iv (and hexadecimal characters). I hire you in order to finish the project.

    $221 (Avg Bid)
    $221 Avg Bid
    1 bids

    I have 2 aes encryption functions for a mobile app done with pointycastle which are running slow. I need someone to convert them to as its faster.

    $821 (Avg Bid)
    $821 Avg Bid
    67 bids

    I'm seeking a knowledgeable freelancer who can help decrypt files on a flash extractor with a CBM2099EA chips bank that only shows "NO NAME" on my Mac. Even though I can access these files, they're encrypted and I need them decrypted for daily usage. Specifically, I need help with: - Determining why the flash extractor doesn't display a name - Decrypting the encrypted files for personal use The ideal freelancer for this task should have experience with macOS and data decryption. Understanding of encryption technologies, and previous experience dealing with similar hardware/software issues, will be greatly appreciated. Please bid if you can deliver the results in a timely manner.

    $141 (Avg Bid)
    $141 Avg Bid
    5 bids

    I am in need of a specialist who can generate an RSA key with OAEP SHA1 padding. generate RSA key with a OAEP sha1 padding and fix error {"response_code":"36","response_description":"AES Decryption failed","error_details":"error:0607A082:digital envelope routines:EVP_CIPHER_CTX_set_key_length:invalid key length"}

    $153 (Avg Bid)
    $153 Avg Bid
    23 bids

    I have 2 aes encryption functions for a mobile app done with pointycastle which are running slow. I need someone to convert them to as its faster.

    $852 (Avg Bid)
    $852 Avg Bid
    92 bids

    I have a react native app created for Android and we are facing some problem while trying to build and deploy on Google Pay Store using AES. App is tested using Expo Go on mobile it works fine. First Task: = Deploy it on Google Play Store. Next Tasks which may come for future are. - Testing and Fixing if needed for iOS and deploy there. - We may need to add new features to it. We don't want developers from India and Pakistan. We wan some one who has deployed the expo react native app using AES Google Play Store and iPhone Store.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    23 bids

    ...view their dashboard where it has several basic functions like user profile, change password, change picture and their history. -Then in main dashboard there should be two button which is encrypt and decrypt. Encrypt page should have: -a auto processed id -File such as picture, audio and document that the message has to be hide -the secret key -the message -the designated user id which is shown in a dropdown menu. once everything is filled then the upon clicking the encrypt and send button then the data should be saved in the database and sent to the designated user. Decrypt - the decrypt page should show a text box for the user to enter the process id which is automatically generated for the user who encrypt the message. Then should have a function button as Sub...

    $148 (Avg Bid)
    $148 Avg Bid
    29 bids

    Hi, I have a new company and looking for a very basic logo, Company name is "All Equipment Solutions" Looking for a logo that says "AES" In black bordered letters with a thinner line of green inside the boarder, Maybe fully underlined by "All Equipment Solutions" if its readable. COLOURS green, black and white only NO gears or spanners or cars etc, just writing.

    $16 (Avg Bid)
    Guaranteed
    $16
    357 entries

    Simple Firmware for the following Receive data in uart, encrypt and Transmit in RF Receive data in RF, decrypt and transmit in uart Use interrupt and DMA mode

    $97 (Avg Bid)
    $97 Avg Bid
    7 bids

    ...do this in java android. What I'm looking? My goal is to create a VPN app that track the network packets ok let me clear. Let's suppose I'm searching something on a browser like chrome or Firefox. I visit any of the website where there are a lots of pictures and now i want to block some pictures through vpn app running at background. Here when my app will receive packets of network app should decrypt packet and find url of images then app will run api request to verify url if this url is correct then app allow it on website else we will change the url from the app and the effect will be shown in the browser. Thats what i want in one module In second module i want a library of the code that we created and i know this is easy i can help you in that . In third s...

    $335 (Avg Bid)
    $335 Avg Bid
    7 bids

    I am looking for a freelancer who can analyze and filter TS streams on the Linux platform. The ideal candidate should have experience in the following: - Advanced filtering options for TS stream analysis: - i want analzye TS live streams from DVBS2 then fillter ECM income from broadcast and i...broadcast and include more services then allow only clear ECM and remove any extra services attached with it, after that get clear video and audio - live stream will be UDP or TCP both option possible i can delivery The project requires the following features: - need to be on linux ubuntu18 note/ important is analyze ECM and remove all extra services then allow only ECM which responsible for decrypt stream If you have the necessary skills and experience, please submit your proposal. ...

    $591 (Avg Bid)
    $591 Avg Bid
    21 bids