implementation of the AES and the Key Expansion algorithm
more details will be given in the chat please
Project focuses on principles of hiding virus samples with the help of encryption. The goal is to encrypt a virus sample, which is written in C language, so the antivirus system is unable to detect it. Output file (virus) is suposed to be an executable .exe file, tested on the web page virustotal.com. Project is successful if [url removed, login to view] evaluates
Implement KNN algorithm on Castalia/Omnetpp. The implementation should be with comments. The RSSI values from RFID tags are used with triangulation to get the coordinates. The RSSI values can be obtained from path loss model using C++ code, then inserted to Omnetpp/Castalia. The learning data can also be obtained outside the simulation software.
...demo-application, which is then fed to the opensll implementation (source code). DLL usage is not accepted. This means to call functions for generating SHA256 digest and RSA encryption. Keys can be hard coded in the application. The output from the demo application shall be the same as when running [url removed, login to view] with the command line above. GCC, Visual
I need implementation of Randomized Weighted Majority Algorithm to predict the result of IPL Season 11 which will be staring from next [url removed, login to view] will be a Machine learning and data mining project to train the algorithm using the results of last 10 seasons of IPL for the [url removed, login to view] can be C/C#/C++/Java . I have the data set for the 10 seasons
Hi there, I h...a tcl script I need compiled to run with tbc 8.5 in a external program. I have used Active State TCL DEV Kit 21 day trial which works perfect. Problem being i need the encryption to last. Any Thoughts ? I need to compile two codes. I do not want to pay for active states full license as i only use this one simple function. Cheers
Want to create a VPN PTP router with Server and Client to bridge 2 locations over AES 256. Need to make a plug and play box which can be put at both ends and ...create a VPN PTP router with Server and Client to bridge 2 locations over AES 256. Need to make a plug and play box which can be put at both ends and a bridge of AES 256 encryption is created.
The project work is implement a dynamic round robin scheduling algorithm presented in a paper attached below.
We need someone with experience of optimising amazon product pages, titles and backend etc. Only people who know how A9 algorithm works bid please. we have about 40 products listings on amazon.
...one to decide a way to disable the encryption of DRM-X and thus deactivate the encryption it applies to mp4 files , we should be able to play mp4 files without encryption based on licence generated by a username and password for that particular file, we also need to untie the safety mechanism of binding the encryption to the computer's Mac address, And