Cryptography 
Hello, could you consider the project's details, which I wills end by messages. 
1 
C Programming, 
Apr 9, 2014 
Apr 9, 2014Ended 
$30 
Cryptography 
Q1. The following key information and right hand side R11 are input into the DES round function F in the twelfth round of the algorithm.
C11 = 11001100 00001111 11000000 1111, D11 = 11100000 00001111 11000000 0011
R11 = 01000111 00110011 00110011 00011100. Use this to calculate K12 and the result of the function F(R11, K12).
Q2. 2. In AES, suppose the keys W(4), W(5), W(6) and W(7) are as fol... 
2 
Computer Security, Cryptography 
Sep 23, 2013 
Sep 23, 2013Ended 
$43 
Cryptography 
...interested to create a very sophisticate program of cryptography similar to the ENIGMA CODE but in IT Crypto 
9 
Cryptography 
Dec 28, 2014 
Dec 28, 2014Ended 
$722 
cryptography 
Develop a Client Server program using sockets in C / C++ for an encryption and decryption service. 
21 
C Programming, C++ Programming 
Feb 14, 2015 
Feb 14, 2015Ended 
$115 
Cryptography 
...on hardware implementation of Elliptic Curve Cryptography on FPGA. So I need help related to it. Do you...you have any idea related to cryptography,Galois Field,Finite State machines? Please let me know as soon 
1 
Verilog / VHDL, 
Jul 29, 2013 
Jul 29, 2013Ended 
$240 
Cryptography 
I need a project on computer cryptography/Security .A working security program,source code,or a new security 
6 
PHP, C Programming, Java, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, MySQL 
May 1, 2003 
May 1, 2003Ended 
$30 
Cryptography 
Hi,
There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework."
I'll mak... 
0 
System Admin, Engineering, Electronics, Software Architecture, Oracle, Cisco, PeopleSoft, CRM, Software Testing, SAP, ERP, Database Administration 
Nov 7, 2011 
Nov 7, 2011Ended 
 
Cryptography 
CurrencyCurrencyCurrencyCurrency 
1 
Computer Security, Algorithm, Software Architecture, Cryptography 
Dec 5, 2013 
Dec 5, 2013Ended 
$501 
Cryptography 
Break the encrypted file you have been given. with a a clearly argued explanation of how you go about breaking the code as well as for correct identification of the key and recovery of the plaintext.
The task will require bitlevel programming, a basic appreciation of encryption concepts..The key is 8 bits long.I will upload a java and C program for it.
I need a report containing a clear explan... 
9 
Computer Security, Report Writing, Cryptography 
Nov 16, 2013 
Nov 16, 2013Ended 
$88 
cryptography 
**This is an undergraduate desirtation.
Web Cryptography Demo: AES
****Description**The student will 
2 
PHP, Engineering, Software Architecture, Software Testing, Website Testing, MySQL, Website Management, Web Hosting 
Jan 4, 2007 
Jan 4, 2007Ended 
$573 
Cryptography 
I need code, in VB6, which will cenerate a DESCBCChecksum for use with the following function:
<http://www.freesoft.org/CIE/RFC/1510/76.htm>
Once the bid is accepted, I will provide sample input and output data.
Thanks
Chris
## Deliverables
Rent A Coder requirements notice: As originally posted, this bid request does not have complete details. Should a dispute arise an... 
3 
PHP, Visual Basic, Engineering, Software Architecture, Software Testing, Website Testing, MySQL, Anything Goes, Website Management, Web Hosting 
Jul 28, 2005 
Jul 28, 2005Ended 
$18 
cryptography 
...text will be first encrypted with any simple cryptography method (if possible dont use key). The video 
1 
Java, 
Sep 17, 2013 
Sep 17, 2013Ended 
$70 
Cryptography 
The name L011 stores the first terms of an LFSR output. (a) Using Maple,
determine the recurrence formula used to generate it.
(b) Use the recurrence formula
to find the next term in the sequence. 
2 
Cryptography 
Aug 22, 2013 
Aug 22, 2013Ended 
$322 
cryptography 
i just saw that you bid on a project similar to mine.so i thought to invite you. ........................................................... 
1 
C++ Programming, 
Mar 2, 2015 
Mar 2, 2015Ended 
$224 
cryptography 
This would be a very basic HTML website
 We already have domain name and hosting paid up for the year
 less than 10 pages needed: home page, About Us, Our Values, Ask Us, 45 product pages/call to action landing pages
 Budget is $250350 total
 please reply with portfolio, deliverable and estimated timeline for completion
Thanks!! 
7 
Articles 
Dec 13, 2013 
Dec 13, 2013Ended 
$378 
Cryptography 
It is based on Cryptography. I have done most of the parts. Just some guidance and verification is required 
1 
Verilog / VHDL, 
Aug 10, 2013 
Aug 10, 2013Ended 
$150 
Cryptography 
Here is an cryptographic assignment which i want any expert to do this and the last programming part can be done using any programming language of your wish. i am looking for a person who can do the programming part and including 2 extra credit problems too. and i won't be paying more than 60$ so if interested approach me. 
13 
C Programming, Java, C# Programming, Cryptography, C++ Programming 
May 29, 2014 
May 29, 2014Ended 
$53 
Cryptography 
Subject(s): Computer Science—Cryptography
ASAP
TASK 1 needed , if the work quality and results after 
0 
Cryptography 
Nov 20, 2014 
Nov 20, 2014Ended 
 
Cryptography 
Hello, i'm currently developping a social network based on Elgg CMS.
I would like to integrate a whole cryptographic solution crypting everything on the network on the same base as Mega ( http://en.wikipedia.org/wiki/Mega_%28website%29#Data_encryption ) with the users holding the keys not the server.

1 
Cryptography, 
Oct 10, 2013 
Oct 10, 2013Ended 
$150 
cryptography 
i need own article about just one topic in? cryptography. i do not say topic. it is your choose, but...include mathametics.
for example for topics,? cryptography? and digital signature. just i need deep topic...i need own article about just one topic in? cryptography. i do not say topic. it is your choose, but 
4 
Translation, Academic Writing, Article Rewriting 
Apr 8, 2010 
Apr 8, 2010Ended 
$21 
Cryptography 
Number Theory, Cryptography... 
1 
Cryptography 
Mar 9, 2014 
Mar 9, 2014Ended 
$53 
cryptography related 
what I want exactly is to hide a steganography text into video and audio file with using (AES,RSA) cryptographic algorithm and the reverse functionality for the operation.
the all idea I'm first need to encrypt the data with ( AES or RSA) the user chose the encryption algorithm that he want. then hide in audio file or video file using LSB ( the user chose the number of bit he will used to ... 
8 
Computer Security, Algorithm, Cisco, VoIP, Cryptography 
Jan 4, 2015 
Jan 4, 2015Ended 
$46 
Cryptography Project 
Hi,
Please go through the attached files.
Please let me know in case of any queries. 
2 
Computer Security, Cisco, Cryptography 
Jun 14, 2014 
Jun 14, 2014Ended 
$63 
Cryptography Assignments 
AES and Prime Integers Implementation 
12 
C Programming 
Apr 7, 2015 
Apr 7, 2015Ended 
$200 
Cryptography Task 
I need my task to be completed by Thursday.
See the attached file

0 
Java, Visual Basic, .NET, Software Architecture, Cryptography 
Apr 6, 2015 
Apr 6, 2015Ended 
 
cryptography methods 
implement aes and des algorithms in c or python
implement four modes of encryption and plot no of collisions with respect to no of blocks for these modes
Note:bids:3060 
8 
C Programming, Python 
Sep 3, 2014 
Sep 3, 2014Ended 
$148 
applied cryptography 
i need a project report in cryptography algorithm DES or GPG .A page report with one of the algorithms 
11 
PHP, C Programming, Java, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, MySQL 
Mar 19, 2003 
Mar 19, 2003Ended 
$80 
Java  Cryptography 
Please see the attached files and go through it also let us know in case you have any query. 
5 
Java, Cryptography 
Dec 2, 2014 
Dec 2, 2014Ended 
$83 
computer cryptography 
Cryptography of computer systems for interaction with humans and discrete analysis. 
1 
Algorithm, Cryptography 
Mar 22, 2010 
Mar 22, 2010Ended 
$200 
Cryptography  Repost 
Q1. The following key information and right hand side R11 are input into the DES round function F in the twelfth round of the algorithm.
C11 = 11001100 00001111 11000000 1111, D11 = 11100000 00001111 11000000 0011
R11 = 01000111 00110011 00110011 00011100. Use this to calculate K12 and the result of the function F(R11, K12).
Q2. 2. In AES, suppose the keys W(4), W(5), W(6) and W(7) are as follows... 
1 
Cryptography, 
Sep 24, 2013 
Sep 24, 2013Ended 
$20 
Cryptography Work 
Please Look at the attached file, to see if you can do the following question. If you can please send me a message. 
0 
Cryptography, 
Dec 8, 2014 
Dec 8, 2014Ended 
 
Cryptography Task 
I need my task to be completed by Thursday.
See the attached file

12 
Java, Visual Basic, .NET, Software Architecture, Cryptography 
Apr 6, 2015 
Apr 6, 2015Ended 
$427 
Visual Cryptography 
...developed in 3rd year of my engg. to learn image cryptography , programs are really easy and easy understandable 
4 
Adobe Flash, Website Design, Shopping Carts, eCommerce, HTML 
Mar 16, 2013 
Mar 16, 2013Ended 
$889 
Cryptography algorithms 
Two cryptography algorithms DES(Not 3DES) and AES algorithms should be implemented in four modes Electronic... is also randomly generated by program.
3) Cryptography related libraries can't used as the user need 
12 
Java, Python 
Sep 27, 2014 
Sep 27, 2014Ended 
$86 
Cryptography Task ! 
crpytogragraphy assignment questions (a b f g) total 4 questions
You need to do 4 questions mentioned above
All information in file attached.
I need this in 24 hours
Price : $ 30 
4 
Software Architecture, Cryptography 
Feb 16, 2015 
Feb 16, 2015Ended 
 
Cryptography Project 
I have a cryptography project.
I need it in 48 hours. 
3 
Academic Writing, Cryptography 
Apr 10, 2015 
Apr 10, 2015Ended 
$25 
Cryptography a Software 
...Source code is in ANSI C
Project needs:
1. Cryptography of configuration files;
2. Input files (2);
...source code for both platforms
and tools to cryptography input files. 
16 
C Programming, Cryptography, C++ Programming 
Mar 30, 2013 
Mar 30, 2013Ended 
$683 



Algorithm, Cryptography, Mathematics 
Dec 2, 2010 
Dec 2, 2010Ended 

Security Cryptography 
How does cryptography present a challenge to IT administration and management?
Write a technical report 
4 
Technical Writing 
Nov 18, 2013 
Nov 18, 2013Ended 
$165 
cryptography assignment 
...everyone,
I am a student and here is a simple cryptography assignment need to be completed by coming thursday 
7 
Java 
Sep 2, 2013 
Sep 2, 2013Ended 
$27 
Cryptography  2 
Here is an cryptographic assignment which i want any expert to do this and the last programming part can be done using any programming language of your wish. i am looking for a person who can do the programming part and including 2 extra credit problems too. and i won't be paying more than 60$ so if interested approach me. 
6 
C Programming, Java, C# Programming, Cryptography, C++ Programming 
May 31, 2014 
May 31, 2014Ended 
$5 
Cryptography(repost) 
Hi,
There is a sentence at the beginning of the document. It says "Find the solutions of following questions(or solve them, it is up to you). Then prepare a report thatcompares this solutions with the solutions of your real homework."
I'll mak... 
0 
System Admin, Engineering, Electronics, Software Architecture, Oracle, Cisco, PeopleSoft, CRM, Software Testing, SAP, ERP, Database Administration 
Nov 8, 2011 
Nov 8, 2011Ended 
 
Cryptography Problems 
Solutions Required for 1012 Cryptography Problems. 
2 
Academic Writing, Cryptography 
Apr 16, 2015 
Apr 16, 2015Ended 
$4 
Cryptography Tutor 
Looking for a experienced cryptography tutor who are good at solving problems and explaining theories 
4 
Cryptography 
Apr 3, 2014 
Apr 3, 2014Ended 
$924 
cryptography matlab 
what I want exactly is to hide a steganography text into video and audio file with using (AES,RSA) cryptographic algorithm and the reverse functionality for the operation.
I can pay 60$
the all idea I'm first need to encrypt the data with ( AES or RSA) the user chose the encryption algorithm that he want. then hide in audio file or video file using LSB ( the user chose the number of bit... 
5 
Matlab & Mathematica, Computer Security, Cisco, Cryptography 
Jan 19, 2015 
Jan 19, 2015Ended 
$132 
Cryptography Programming 
...command
line write "./tempdes"
The notion of cryptography consists of hiding secret information from untrusted...encrypt information: secret key cryptography (DES), public key
cryptography (RSA) and message digests (SHA1)...as SSL but also includes a general purpose
cryptography library which you will use. Openssl is usually 
10 
C Programming, Cryptography 
Nov 15, 2014 
Nov 15, 2014Ended 
$202 
Cryptography Program 
I only have some knowledge in JAVA when it comes to programming, so I would like to have it written in JAVA language.
Additional requirements not listed in the PDF file are as follows:
1. I only need to be able to use these characters: "AZ", "az", "09". (Upper case letters, lower case letters, and numbers zero through nine.
2. In addition to those characte... 
28 
Java, Cryptography 
Feb 22, 2012 
Feb 22, 2012Ended 
$286 
186278 cryptography 
...for problems in this book :
"introduction to cryptography
By : Johannes A. Buchmann"
Do you have 
0 
PHP, Web Security, Data Entry, Link Building, Article Rewriting, Anything Goes 
Dec 15, 2007 
Dec 15, 2007Ended 
 



Cryptography, Mathematics 
Dec 6, 2010 
Dec 6, 2010Ended 

Cryptography Algorithm 
... we have one project for that we need cryptography algorithm. please bid with all the license fee...freelancer share there experience with us regarding cryptography
Regards,
Rockers Infotech Team.

20 
PHP, .NET, Web Security, AJAX 
Jul 12, 2008 
Jul 12, 2008Ended 
$449 