|Encryption Algorithm for RealBasic
||Design a simple encryption algorithm written in RealBasic 2008 which uses Blowfish to encrypt the following...serial number
Design encryption algorithm written in RealBasic 2008 which uses Blowfish...method.
****All values will be numeric so bit compression should be used to keep the resulting encrypted
||PHP, Windows Desktop, Project Management, Engineering, Software Architecture, Mac OS, Software Testing, Microsoft, MySQL
||Mar 23, 2009
||Mar 23, 2009Ended
|Save and load a TStringList to file with encryption and compression
||...exists), using encryption IF and ONLY IF password <> '' and compresses the data before encryption if Compress...Data only contains strings, no Objects.
The encryption must be implemented using DEC version 5.2 (You...com/p/delphidec/downloads/list>)
The compression algorithm can be anything, as long as it is 100% native
||Oct 9, 2012
||Oct 9, 2012Ended
||...a.NET compression library written in 100% managed (C#) code that implements multiple compression and decompression...heavily commented using C# XML comments.
Each algorithm should contain Inflate/Decompress and Deflate/Compress...library should provide chunked stream based compression/decompression (e.g. to MemoryStream or FileStream)
||PHP, ASP, .NET, Windows Desktop, Engineering, C# Programming, Software Architecture, Software Testing, Microsoft, MySQL
||Nov 26, 2003
||Nov 26, 2003Ended
||...protocol for sockets connection, i want to use data compression, for small data(10- 100 bytes) and some another...
i need the bests compression algorithms in c++, if possible i want 4-8 algorithm for small data and...and 4-8 algorithm for great small data, i need all ready to use, and explain this,
i wont use some key
||C Programming, C++ Programming
||Jul 3, 2014
||Jul 3, 2014Ended
||I'm looking for a simple java compression algorithm made.
||Dec 12, 2013
||Dec 12, 2013Ended
||I need to create a encryption algorithm for a project I am working on, below are the requirements:
...commercially avaliable standard encryption algorithm. This algorithm doesn't need to be anymore secure...options:
-e Encrypt File
-d Decrypt File
The encryption itself must a product cipher using substitution
||C Programming, Java, Python, C# Programming, C++ Programming
||Dec 3, 2014
||Dec 3, 2014Ended
||...implement an encryption algorithm that has the following features:
* Private encryption key
* Public...Public decryption key
If you know of an encryption method which fits what I am looking got please let me...winning coder to create 2 examples of the encryption algorithm:
* 1 using Visual C++ (no .net)
||PHP, ASP, C Programming, Windows Desktop, Web Security, Engineering, Computer Security, Software Architecture, Software Testing, Microsoft, MySQL
||Mar 8, 2007
||Mar 8, 2007Ended
|Add compression and encryption to this script
||I need to be able to change this script so I can compress the data being retrieved in this web service and also encrypt it.
I want to also encrypt the URL that I'm using for the query.
For example right now the url might be www.domain.com/query.php?q=select * from table1
I want it to be encrypted so it looks like www.domain.com/query.php?q=8vjfj2o990f20hf23hh939h0
and then the script...
||Feb 3, 2014
||Feb 3, 2014Ended
||...encrypt password2 file.txt.x e
This will force encryption in spite of the .x ending on the file and generate...decrypt (based on extension) all files.
1) Compute a 32 bit hash of the input...the input file and write ot out
1) Read in the 32 bit hash
2) Compute a 96
||Windows Desktop, Web Security, Computer Security
||Aug 23, 2012
||Aug 23, 2012Ended
||Programmer to produce the following:
Encryption for Cell Phones
It should work on the operating system...grade 256-bit AES encryption for voice communications
2. key lengths of the AES algorithm (i.e., 128, 192...RSA encryption is utilized for the session key exchange
5. peer-to-peer (end-to-end) encryption solution
||PHP, Software Architecture
||Jul 13, 2011
||Jul 13, 2011Ended
|Synchronisation of image encryption and compression
||Divide an image into blocks. The blocks are to be compressed and encrypted in a pipeline fashion: first compress a block; while the next block is being compressed, the previous block should be encrypted, and so on until the last block.
||Apr 29, 2015
||Apr 29, 2015Ended
|Compression API and/or Encryption API
||...an already developed **compression API** and an already developed **encryption API**. I'm interested in
||PHP, Java, Windows Desktop, Linux, Web Security, Data Entry, Computer Security, Software Architecture, Mac OS, Software Testing, Microsoft, Anything Goes
||Jan 11, 2008
||Jan 11, 2008Ended
|Save and load a TStringList to file with encryption and compression (Delphi 2010)
||... the data is also encrypted after compression using DEC encryption library.
Please see below for...detailed specs. Included is the DEC encryption library and SynZIP compression library which you may use, you...you can also use an alternative compression library assuming it's free to use and comes with source code
||Oct 9, 2012
||Oct 9, 2012Ended
|EZBC algorithm for Image Compression
||Image Compression using EZBC(Embedded Zeroblock Coding and Context Modeling) algorithm which is a combination
||PHP, Engineering, Training, Software Architecture, Software Testing, Website Testing, MySQL, Website Management, Web Hosting
||Apr 18, 2007
||Apr 18, 2007Ended
||...able to compress-decompress data with the same algorithm.
I can provide as many examples of compressed-decompressed...discover the logic of the algorithm and then
develop a corresponding equal algorithm on the PC side
The...dll receiving a byte stream and producing the compression/decompression
I include an example of compressed
||PHP, C Programming, Visual Basic, Delphi, Engineering, Software Architecture, Software Testing, MySQL
||Sep 17, 2003
||Sep 17, 2003Ended
|chaotic encryption algorithm
||...implemented in Matlab.
I attach the detailed algorithm.
The program should include a graphic interface...text
- illustration of the functions in the algorithm
Any other suggestions are welcomed!
||PHP, C Programming, Windows Desktop, Web Security, Delphi, Engineering, Computer Security, C# Programming, Software Architecture, Software Testing, Microsoft, MySQL
||Jan 6, 2007
||Jan 6, 2007Ended
|Implementing Compression algorithm
||...a developer who can understand decompression algorithm written in C++ and can code this in Flex 3 (Action...have already implemented Hextile and Zlib compression algorithm in Flex 3 as documentation for these C++
||PHP, C Programming, Windows Desktop, Project Management, Engineering, Software Architecture, Software Testing, Microsoft, MySQL
||Sep 11, 2008
||Sep 11, 2008Ended
|digital signature components(signer system, verifier system, and compression algorithm)
||...are two main components of the system,
1. the encryption/signing component(system) which signs and encrypts...for a third component to the system, the compression algorithm; this is for the audio and video files that...may be too heavy, this is why we need a compression algorithm that compresses the files before signing
||Dec 6, 2012
||Dec 6, 2012Ended
**Create or find a compression algorithm which has a good compression ratio for small packets....(10-5000 bytes).
When using standard compression the compression header (which is stored together with...other words, when dealing with small packets the compression header is often too taxing in relation to the
||PHP, Project Management, Engineering, SQL, Software Architecture, Software Testing, MySQL
||Jul 12, 2008
||Jul 12, 2008Ended
|Remote (Internet) Backup with Compression and Encryption
||Need an FTP, TCP/IP Remote Backup/Restore program GUI based. It could be done in any code Visual Basic, C++, etc but it has to be stable and work with all versions of Windows (95, 98, 2000, NT and XP). The program needs to have a Client and a Server version. The Server must run on Windows NT4, Windows 2000 and Windows .NET Server) or just on an FTP Server and Client can perform a backup using FTP ...
||PHP, ASP, C Programming, XML, Visual Basic, .NET, Windows Desktop, Web Security, Engineering, Computer Security, C# Programming, Software Architecture, Software Testing, Website Testing, Microsoft, MySQL, XSLT, Website Management, Web Hosting
||Jan 1, 2003
||Jan 1, 2003Ended