Project Name | Description | Bids | Skills | Started | Ends | Price (USD) | |
---|---|---|---|---|---|---|---|

Encryption algorithms | Encryption algorithm using C++
## Deliverables
1) Complete and fully-functional working program(s) |
2 | PHP, C Programming, Engineering, Software Architecture, Software Testing, MySQL | May 17, 2003 | May 17, 2003Ended | $17 | |

implementing various encryption algorithms | Hello, I need to implement RSA, des, playfair cipher, reverse ceaser cipher Algorithm in eclipse & deploy it in google app engine. | 4 | Java, Google App Engine | Jan 16, 2015 | Jan 16, 2015Ended | $22 | |

Encryption/Decryption Algorithms | ...to write a small program that uses encryption/decryption algorithms.
What i need is someone that can...module that have implemented 4 Enc/Dec Algorithms.
The Algorithms are :
- RSA
- DES
- TripleDes |
10 | PHP, Visual Basic, .NET, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, MySQL | Jun 8, 2006 | Jun 8, 2006Ended | $147 | |

CRYPTOGRAPHY ALGORITHMS PROCESS OF ENCRYPTION (FLASH) | ...twofish algorithms including information about them, the mathematics on them both, their encryption process |
3 | Adobe Flash, Animation, Academic Writing | Aug 29, 2011 | Aug 29, 2011Ended | $583 | |

C Program. Measure efficiency of encryption algorithms | ...to measure the efficiency of different encryption algorithms such as blowfish, EAS, RC4. Please see the |
6 | C Programming | Mar 24, 2012 | Mar 24, 2012Ended | $216 | |

A program for comparing various clssification algorithms with and without encryption | ...accuracy of various data mining algorithms with and without encryption. I need the program to take the...available newsgroups dataset, run it through encryption and classification and generate an excel which...a) First dropdown will have the list of the 4 encryption algos + an all option + none option
b) |
4 | .NET, C# Programming, Data Mining | Jun 27, 2013 | Jun 27, 2013Ended | $391 | |

Video Encryption | ...video encryption and decryption using an efficient algorithm and not the conventional algorithms like |
2 | Java, Mobile Phone, Android, Anything Goes | Aug 24, 2012 | Aug 24, 2012Ended | $50 | |

Encryption Application | ...need an implementation of DES, 3DES, and RSA algorithms.
## Deliverables
1) Complete and fully-functional |
9 | PHP, C Programming, Windows Desktop, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, Microsoft, MySQL | Apr 30, 2003 | Apr 30, 2003Ended | $148 | |

Algorithms and Complexity | ...to be encrypted. They agree in using the RSA
Encryption Scheme. Therefore, A sends to B its public key...today's state of algorithmic
knowledge, RSA encryption is considered to be safe. Why is this the case |
1 | Algorithm | Apr 24, 2013 | Apr 24, 2013Ended | $164 | |

Encryption Tools | Embed encryption in the Windows Shell (The ability to right click on a file anywhere in windows to encrypt/decrypt...(overwrite 7 times with 0's and 1's) Multiple encryption algorithms (AES, DES, Triple DES, and Blowfish) Self |
24 | PHP, C Programming, Windows Desktop, Web Security, Delphi, Engineering, Computer Security, Software Architecture, Software Testing, Microsoft, MySQL | May 13, 2003 | May 13, 2003Ended | $321 | |

File encryption | ...would prefer the use of tested algorithms with a minimuim of 128bit encryption (two fish etc) The number of...that may be open by skipping them during the encryption of decryption process.
I will add the error |
16 | PHP, Windows Desktop, Web Security, Delphi, Engineering, Computer Security, Software Architecture, Software Testing, Microsoft, MySQL | Nov 15, 2003 | Nov 15, 2003Ended | $55 | |

Encryption Tool | ...project with information about the software, algorithms, methodology, conclusion and future expansion |
5 | Java | Mar 11, 2015 | Mar 11, 2015Ended | $72 | |

File Encryption | ...encrypt password2 file.txt.x e
This will force encryption in spite of the .x ending on the file and generate...decrypt (based on extension) all files.
Encryption Algorithm:
1) Compute a 32 bit hash of the...compression step prior to encryption. Modular to allow different compression algorithms to easily be used. |
5 | Windows Desktop, Web Security, Computer Security | Aug 23, 2012 | Aug 23, 2012Ended | $78 | |

Encryption techniques and implementation 00 | ...are required to develop and implement your own encryption and decryption algorithm to meet the specification...commercial encryption algorithm (e.g. DES, AES, RSA, etc). This is because the standard encryption algorithms...standard software libraries have these encryption algorithms built into them. Thus it is not a challenge |
1 | Java, | Dec 1, 2014 | Dec 1, 2014Ended | $78 | |

Encryption Password Algorithm Consultant | An encryption consultant is currently needed in the New York City metro area. More specifically, someone...understanding of algorithms. The types of algorithms I am looking for are RSA, H-MAC or OATH algorithms (or anything |
4 | Algorithm, Mathematics | Mar 3, 2014 | Mar 3, 2014Ended | $92 | |

Security Algorithms project AES encryption and decryption using HMAC and CBC | ...exchange keys, e.g., Diffie-Hellman, or public key encryption (by assuming that the public/private key pair |
1 | PHP, Software Architecture | May 4, 2014 | May 4, 2014Ended | $168 | |

A program for comparing various clssification algorithms with and without encryption - repost | ...accuracy of various data mining algorithms with and without encryption. I need the program to take the...available newsgroups dataset, run it through encryption and classification and generate an excel which...a) First dropdown will have the list of the 4 encryption algos + an all option + none option
b) |
5 | .NET, C# Programming, Data Mining | Jun 29, 2013 | Jun 29, 2013Ended | $177 | |

A program for comparing various clssification algorithms with and without encryption - repost 2 | ...accuracy of various data mining algorithms with and without encryption. I need the program to take the...available newsgroups dataset, run it through encryption and classification and generate an excel which...a) First dropdown will have the list of the 4 encryption algos + an all option + none option
b) |
7 | .NET, C# Programming, Data Mining | Jul 4, 2013 | Jul 4, 2013Ended | $681 | |

Encryption Contest | ...hard drive.
I need to know that my encryption algorithms are relatively secure. Therefore, I am holding...you will find the source code, in C# for the encryption, and a zip file inside called enc.zip which holds...fashion. Each image uses a different algorithm for encryption.
Here are the rules:
1) You have until |
4 | PHP, Visual Basic, .NET, Web Security, Engineering, Testing / QA, Computer Security, C# Programming, Software Architecture, Software Testing, Website Testing, MySQL, Usability Testing | Nov 23, 2003 | Nov 23, 2003Ended | $136 | |

encryption in wireless sensor networks | ...to simulate des, aes and aes+ecc(hybrid) encryption algorithms on wireless sensor networks using ns2, ns3...simulation nearly matching this or compare encryption algorithms seprately and provide their values in wsn |
7 | Engineering, Matlab & Mathematica, Algorithm, C++ Programming | Jan 31, 2013 | Jan 31, 2013Ended | $569 |

Showing 1 to 20 of 12726 entries

248

55

48

105

245