I am looking for a person who will make FPGA NIST5 Cryptocurrency miner. I need full unrolled NIST5 core. NIST5: ...need full unrolled NIST5 core. NIST5: blake512 -> groest512 -> jh512 -> keccak512 -> skein512 Perfect performance: 1x (Example: FPGA at 400MHz clock generates 400Mega Hash / secound) Language: VHDL FPGA: Xilinx 7 series
...platform. We need to provide a REST API for several actions e.g. a) Click To Call - e.g. /[url removed, login to view] authid = preset hash value to authenticate the user against. Return in JSON - Asterisk "uniqueid" if successful and "0" if call failure (to reach extension). I know normally using a call file/AGI
I need to develop a webservice that has 3 functions: 1-receive a set of information (ie. filename,date,number,hash,etc.) via POST and write it in the block chain the received data 2-given a filename,date,number,hash,etc. via POST return the other information 3-log all the activities
JB I am looking for a Java tutor for my son who is a freshman in college. He notes...We have covered Asymptotic complexity, Simple Data Stru...Simple Data Structures, Priority Queues, Recurrences, and Shortest Paths. Even though we covered these topics, I don't really understand any of it. We have sorting and hash codes and hash tables coming up next
Create a small PHP-Program for creating a URL-Link based on some parameters and MD5 calculation. You will find a detailed specification with example data in the attached PDF-File. If you are a well-experienced PHP-coder it will only take max. 30 minutes to perform this little job.
I work on a team of developers and we are currently developing a project which requires VERY strong knowledge on python, HMAC, and cryptography. We currently have most of the program complete and planned out but what we need is for someone to successfully generate or scrape for the required HMAC token. The token will be attached to the said session of the multi-threaded program which will be used ...
I need an expert that can provide me an firefox addon that do - skip totaly any certifacte error or invalid or expired to any website or auto add exception - skip totaly the error message " your connction is not secure" and at last in need to make an update to an abondoned addon to update it user agent list
I have a simple algorithm which you guys have to implement. It has to search for collisions in a toy example of cryptographic hash function with n-bit output, where “n” are the first “n” bits of the SHA-1 message digest. If anyone is interested I'll get into the details.
...additional verification which they refer to as "waiting room" or "splash page" which requires the user to obtain a unique cookie prior to having access to select the item and add it to cart that must be verified with the server of the site when checking out. The issue for us is that using our backdoor method, we are not given this unique cookie. Therefore
Hello, i need a vector logo for a mental health clinic. I like the style of Yoga Perdana a lot ( google images search him ) and the firefox / thunderbird logo. I am happy to provide the colour pallette i wish to use and you can work with it. It needs to incorporate the word Humanique into the design. If you got what it takes to create something like
...system. The blockchain should store a unique hash and key metadata that represents the members and custom items. A search interface will allow searching of the metadata through the API, and the results will confirm that the members or custom items described in the WebApp are the same based on the hash. Deliverables: 1. Architecture Diagrams for
Program a new cryptocurrency using a distributed ledger and hash codes. Please only bid if you can program this within the budget. No Skype or off line requests. Operate through free lancer only! No time wasters. Thank you. Budget: $300 CAD
We are a small company that we are trying to promote IT Security. I'm looking at a logo that morph, or works with our existing company log but int incor...other items to spread the word about IT Security at the company and make it cool and yet aesthetic. I've attached the company logo plus a sample of what I'm looking at with a hash tag. #SecureCCI
...ElasticSearch/DynamoDB records with PHP Lambda function in json format (with full wildcard text searching support) Records will amount to over 1billion, each record is identified by long hash and has relations Views table may amount to over 10billion but no search index required About 10million records will be updated each day, potentiall up to 1-10,000 times
...[url removed, login to view]:g:siAAAOSwn35aoSm3 [url removed, login to view]:g:Gf0AAOSwsGlapreq [url removed, login to view]
...it will use user apis and tokens. Then software will get the user balance. When i select a mining alghoritma software will get all bids. Then i need input datas about bid and hash. If bid goes to high software will change my bid to first available bid 's over twenty percent or else any other percent. And it will change my hashrate to my inputs. I will