Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,364 hashing jobs found, pricing in USD

    We need support to resolve some penetration points raised by information security for hybrid mobile applications using Expo & React-Native as front-end and back-end Web API is in C# the issues raised are for Android 1-Application uses hashing algorithms that are known to consist of possible collisions (such as SHA-1 and MD5). Security Recommendations: It is recommended to be using safer/stronger hashing alternatives, such as SHA-256, SHA-512, SHA-3, etc. We are able to find these references in the application references but these references are related to Expo packages and can’t be changed. 2-Application uses Cipher Block Chaining (CBC) as it’s encryption mode, along with Public Key Cryptography Standards (PKCS5/PKCS7) padding. This configuration is known t...

    $162 (Avg Bid)
    $162 Avg Bid
    18 bids

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $175 (Avg Bid)
    $175 Avg Bid
    11 bids

    I am looking for experienced developers to develop a ticket booking platform in Laravel. I have specific design preferences for the website and I need various functionalities and features included in the platform. The platform should have features including secure user authentication using password hashing and encryption; tracking of ticket sales; CRM integration; payment gateway integration; email/SMS notifications; third-party API integrations; and a custom CMS. Additionally, the platform should be easily scalable and customizable. I am looking for proficient developers and designers who can provide a modern and responsive website. As well as being able to provide the functionalities mentioned above, the successful developer must also be able to adhere to a timeline and strive t...

    $318 (Avg Bid)
    $318 Avg Bid
    38 bids

    Hello I would need a simple app. The app will consist of a calender : **1. User Registration:** - Admin creates a new user by providing a username and password. - Store the user's credentials securely in a database, with password hashing and salting for security. **2. User Login:** - User enters their username and password on the login page. - The system checks the provided credentials against the database records. - If the credentials are valid, the user is granted access to their account. **3. User Home Page:** - Upon successful login, the user have access to calender and chat **4. Availability Calendar:** - On the user's home page, display a calendar where users can set their availability. - Users can click on specific dates and indicate their availability (e.g.,...

    $156 (Avg Bid)
    $156 Avg Bid
    12 bids

    ...should hit “Next” (the MD5 Hash should be created - example: 6e022294bfc9bc54969e8e3f3e997727) and the MD5 Hash should be automatically entered into the first question response of this survey: The user should then be able to go on and complete the survey. Skills and Experience Needed: - Strong understanding of encryption algorithms, specifically MD5 hashing - Experience in developing secure data handling systems - Familiarity with survey systems and data storage protocols - Ability to ensure data integrity and privacy through encryption techniques...

    $166 (Avg Bid)
    $166 Avg Bid
    28 bids

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $119 (Avg Bid)
    $119 Avg Bid
    13 bids

    ...clustering techniques using the k-Means++ initialization and MacQueen method for updating. Parse and handle input from binary files containing the MNIST dataset. Generate output files detailing search and clustering results. Ensure modular and documented code with a comprehensive README. Provide a Makefile for easy compilation. Requirements: Proficiency in C/C++ programming. Strong understanding of hashing, hash tables, and the LSH algorithm. Experience with vector spaces, nearest neighbor search, and clustering algorithms. Ability to read and handle binary file formats. Knowledge of the MNIST dataset format is a plus. Familiarity with Git for version control. Project Timeline: We expect the project to be completed within 4 weeks of commencement. Budget: $65 USD Deadline: 18/1...

    $128 (Avg Bid)
    $128 Avg Bid
    14 bids

    Project Description: Title: Hashing SwiftUI URL Links for iOS Platform We are looking for a skilled developer to help us implement a hashing algorithm for our SwiftUI app on the iOS platform. The project requires the use of the SHA-256 hashing algorithm and will involve generating hashed URLs for our app's links. Requirements: - Use SHA-256 hashing algorithm to hash the URLs - Ensure compatibility with iOS platform - Implement specific requirements for the length and complexity of the hashed URLs Ideal Skills and Experience: - Proficiency in Swift and SwiftUI development - Experience with implementing hashing algorithms, particularly SHA-256 - Familiarity with iOS platform and app development best practices - Strong problem-solving skills and atte...

    $170 (Avg Bid)
    $170 Avg Bid
    28 bids

    -Client Tool Functionalities: System-Tray Integration: The program should be compiled as an .exe file and run in the Windows System Tray to minimize user disruption. Folder Monitoring: Monitor a specific folder in the filesystem for new or changed files. Validation: Before uploading, the program should validate the files to ensure they contain only the allowed char...usernames and passwords for authentication. User-Specific Tables: Individual tables for each user for importing the CSV data. Each table has five columns as per the CSV format. Programming Languages and Tools: Backend: Consider using Python with Flask or Django for REST API. Database: MySQL, PostgreSQL, or another relational database. Security Measures: Use HTTPS Password hashing in th...

    $472 (Avg Bid)
    $472 Avg Bid
    56 bids

    Check if it is possible to realize this task: I am writing a Python script that performs automatic authentication in a web form. The web form itself operates in conjunction with JS and the backend, and before sending authorization data to the backend, a specific JS file uses the Digest authentication algorithm. This involves hashing various parameters using hash functions. From my research, I understand that it takes the login + password + request method + URL and some other data, but in my ready-made Python script variation, the hash generated is shorter than what the original JS file on the form generates. Task: Understand the authentication logic from the JS script's side and implement this logic in Python so that authentication can be automated without the JS file. The JS...

    $161 (Avg Bid)
    $161 Avg Bid
    12 bids

    Please Sign Up or Login to see details.

    Featured Urgent Sealed

    Attached is a less than 50 lines long shell script that performs HKDF with SHA384 hashing - such as might be used for TLS_AES_256_GCM_SHA384. I want you to rewrite it in C script.

    $19 (Avg Bid)
    $19 Avg Bid
    7 bids

    ...knowledge of data structures, algorithms, and problem-solving techniques - Familiarity with common data structure implementations and algorithms Project Details: I am seeking a data structure tutor who can help me prepare for technical interviews. Specifically, I need assistance in the following areas: - Practice leetcode questions. - Arrays and Linked Lists - Stacks, Queues, and Trees - Graphs and Hashing Responsibilities: - Help take online classes with me and tutor me based on my knowledge level. - Provide guidance and support in understanding and implementing various data structures - Help me improve problem-solving skills through coding exercises and practice problems - Offer tips and strategies for tackling data structure-related interview questions Ideal Candidate: - ...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    11 bids

    User Info Grabber with Discord Integration Project Overview: Create a Python-based tool that generates an enticing image and, upon a user's click, collects essential information such as IP address, Roblox cookie, Discord token, and user details. This information will then be seamlessly communicated to Discord webhooks for real-time monitoring and alertin...structured and organized format. Alerting and Monitoring: Configure the Discord webhook to notify designated channels or users whenever new data is received. The alerts should include the captured information along with relevant metadata. Security and Privacy: Implement security measures to ensure that the collected data is transmitted and stored securely. Consider implementing encryption and hashing techniques to protect ...

    $13 (Avg Bid)
    $13 Avg Bid
    1 bids

    User Info Grabber with Discord Integration Project Overview: Create a Python-based tool that generates an enticing image and, upon a user's click, collects essential information such as IP address, Roblox cookie, Discord token, and user details. This information will then be seamlessly communicated to Discord webhooks for real-time monitoring and alertin...structured and organized format. Alerting and Monitoring: Configure the Discord webhook to notify designated channels or users whenever new data is received. The alerts should include the captured information along with relevant metadata. Security and Privacy: Implement security measures to ensure that the collected data is transmitted and stored securely. Consider implementing encryption and hashing techniques to protect ...

    $167 (Avg Bid)
    $167 Avg Bid
    3 bids

    Hashing 1) RS Hash 2) AP Hash 3) DJB Hash 4) DEK Hash Image: 1) SVG to PNG/JPEG 2) Youtube Thumbnail Grabber 3) Image to ASCII Art 4) ASCII Art to image Code: 1) JSON to XML 2) INI to XML 3) CSV to XML 4) TSV to XML 5) TSV to CSV 6) TSV to JSON

    $85 (Avg Bid)
    $85 Avg Bid
    1 bids

    ...security assessments, audits, and reviews of the AI algorithms, machine learning models, and cryptographic protocols utilized within our products and services. Key Responsibilities: 1. Security Auditing: Perform in-depth security assessments of AI codebases, including machine learning models, neural networks, and algorithmic implementations. Evaluate cryptographic protocols, encryption schemes, and hashing functions used in our systems. 2. Vulnerability Identification: Identify potential security weaknesses, vulnerabilities, and flaws in AI and cryptographic code, including potential attack vectors and potential misuse of sensitive data. 3. Penetration Testing: Conduct penetration tests to simulate real-world cyber-attacks and assess the resilience of AI and crypto systems to...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    11 bids

    I am looking for a developer to work on a security utility project in Kotlin. Specific security features to be implemented in the project include: - encryption - decryption - hashing I do not have any existing security-related code that needs modifying, so we will start fresh. Ideal skills and experience for this job include: - Proficiency in Kotlin programming language - Strong understanding of security concepts and encryption/decryption/hashing techniques - Experience in developing secure software applications - Knowledge of different access control mechanisms

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    31 bids

    Text: 1) Binary to decimal, eg. 10110 => 22 2) Hex to decimal, eg. ca35fe => 13252094 3) Octal to decimal Files: 1) Gzip- compress a file to .GZ archive 2) UnGzip- decompress a .GZ archive 3) Corrupt file - corrupts a file so it won't be possible to read it 4) Random file- creates a random file, file full of random bytes Images: 1) Duotone 2) Vibrance 3) Round corners Hashing: 1) CRC24 (OpenPGP, Interlaken, OS9) 2) PJW Hash And: 1) Password generator

    $95 (Avg Bid)
    $95 Avg Bid
    1 bids

    ...hijacking, where an attacker steals a user's session identifier to impersonate them. 4. Input Validation: Review and enhance input validation mechanisms to ensure that user input is properly validated and sanitized, minimizing the risk of code injection or unexpected behavior. 5. Secure Authentication: Evaluate the authentication process to ensure it follows best practices, including strong password hashing, secure storage of user credentials, and protection against brute force attacks. 6. Cross-Site Request Forgery (CSRF) Protection: Implement measures to prevent cross-site request forgery attacks by adding appropriate tokens and verification mechanisms. I would appreciate if you could provide a detailed report highlighting any vulnerabilities discovered and recommendat...

    $297 (Avg Bid)
    $297 Avg Bid
    12 bids

    Hashing 1) ripemd128.. 2) whirlpool 3) tiger128.. 4) snefru 5) gost 6) adler32.. 7) haval128.. 8) fletcher16.. 9) xor8.. 10) crc16.. Money: 1) currency converter Code 1) Convert INI files to JSON 2) Convert CSV files to JSON Data or Download or List 1) list of countries 2) list of languages 3) list of English first names Image 1) Convert RGB to BGR, GRB, BRG etc. 2) Automatic crop 3) Add border 4) Add text to image

    $120 (Avg Bid)
    $120 Avg Bid
    1 bids

    ...the system. Create tables for users, accounts, transactions, and other necessary entities. Define the relationships between these tables and set up appropriate constraints. 2) User Registration and Authentication: Implement a user registration and authentication system. Users should be able to create an account by providing their personal details such as name, email, and password. Use a secure hashing algorithm to store passwords in the database. Implement a login system to authenticate users and provide access to their accounts. 3) Account Management: Create a user account management section where users can edit their account details. This section should allow users to update their address, email, phone number, and mailing address. Implement validation to ensure the correctnes...

    $2938 (Avg Bid)
    $2938 Avg Bid
    188 bids

    I am looking for a DSA expert to help me prepare for an interview. I need someone who is proficient in all data structures, including arrays and linked lists, trees and graphs, and hashing and sorting. Requirements: - Advanced knowledge of data structures and algorithms - Strong understanding of arrays, linked lists, trees, graphs, hashing, and sorting - Ability to explain complex concepts and problem-solving techniques - Experience in preparing for technical interviews Ideal Skills and Experience: - A deep understanding of various data structures and algorithms - Proven experience in solving complex problems using DSA - Familiarity with common interview questions and problem-solving techniques - Strong communication skills to effectively explain concepts and solutions If...

    $924 (Avg Bid)
    $924 Avg Bid
    11 bids

    ...This project aims to develop a robust authentication solution that includes login, signup, and logout functionality. Key Project Requirements: 1. User Registration (Signup): - Allow users to register by providing necessary details like username, email, and password. - Implement server-side validation to ensure data integrity. - Encrypt and securely store user passwords using appropriate hashing techniques. 2. User Authentication (Login): - Enable users to securely log in using their registered credentials. - Validate user inputs, authenticate the credentials against the stored data, and generate a JWT upon successful authentication. - Implement appropriate error handling and response messages for different scenarios. 3. JSON Web Tokens (JWT): - Generate JW...

    $34 (Avg Bid)
    $34 Avg Bid
    24 bids

    I am looking for a developer who can assist me with image hashing in javascript. The purpose of the image hashing is to identify duplicates in a collection of photographs. I want someone to assist in providing me a javascript class that can perform the following: Average hashing Perceptual hashing Difference hashing Wavelet hashing I will be testing the final javascript libraries using the python imagehash library so please do the same to make sure the programs work () In the proposals I'd like you to tell me why you think you can deliver on this and whether or not you have experience working with image hashing. All proposals that do not address this question will be ignored. I do not appreciate anyone who bid on work only to eithe...

    $36 (Avg Bid)
    $36 Avg Bid
    23 bids

    The objective is to extend the storage server architecture into an elastic, scalable storage service. Data records (i.e., key-value pairs) are distributed over a number of storage servers by exploiting the capabilities of consistent hashing. A single storage server is only responsible for a subset of the whole data space (i.e., a range of successive hash values.) The hash function is used to determine the location of particular tuples. i have the base code already

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    7 bids

    The objective is to extend the storage server architecture into an elastic, scalable storage service. Data records (i.e., key-value pairs) are distributed over a number of storage servers by exploiting the capabilities of consistent hashing. A single storage server is only responsible for a subset of the whole data space (i.e., a range of successive hash values.) The hash function is used to determine the location of particular tuples. i have the base code already

    $17 (Avg Bid)
    $17 Avg Bid
    6 bids

    The objective is to extend the storage server architecture into an elastic, scalable storage service. Data records (i.e., key-value pairs) are distributed over a number of storage servers by exploiting the capabilities of consistent hashing. A single storage server is only responsible for a subset of the whole data space (i.e., a range of successive hash values.) The hash function is used to determine the location of particular tuples. i have the base code already

    $14 (Avg Bid)
    $14 Avg Bid
    5 bids

    I am in need of a Basic Ticket System that is web-based and will be used primarily for customer support. The following skills and experience are ideal for this job: - Proficiency in web ...agents. View Departments: Users can view a list of departments and their associated tickets. Mail Server Configuration: Add Mail Settings: Administrators can configure mail server settings to enable email notifications and communication. View Mail Settings: Users can view and manage the configured mail server settings. Security: Password Encryption: User passwords are securely encrypted using hashing algorithms. User Authentication: User authentication is implemented to ensure that only authorized users can access the system. Templates to reply back if there is a new ticket based on the number...

    $267 (Avg Bid)
    $267 Avg Bid
    69 bids

    ...cyber security best practices and improve their knowledge. 2. **Administrators**: These users have elevated privileges and can manage the platform's content, user accounts, and access analytics. ### 2.2 User Features 1. User Registration and Authentication: - Ability for users to create accounts with a unique username and password. - Secure authentication mechanisms, including password hashing and encryption. - Support for social media account integration (optional). - "Forgot password" functionality to reset passwords securely. 2. User Dashboard: - Personalized dashboard displaying relevant information and progress. - Ability for users to track their completed courses, achievements, and performance. 3. Course Content: - A variety of intera...

    $7621 (Avg Bid)
    $7621 Avg Bid
    21 bids

    I am looking for a Java programming expert to assist me who know well to run the project with hashing with Hash Scheme. Requirement: Need to develop a application that can run hashing with hash Scheme 1. To implement the Square Hash and Water's has function 2. to evaluate the performance of Square Hash and Water's Hash Function 2. To Benchmark Square Hash against Water's Hash as a programmable hash Function. Deadline: 2 or 3 days max

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    21 bids

    We need to write a simple OBS plugin that will fork the audio stream and send it to a transcription function using windows SAPI api (local windows function not cloud stuff). we will then process the text from the audio by hashing it - the hash is a non cryptographic hash - xxHash. Our goal is to be able to have a hash stream of the spoken audio. I have a small poc codebase in c# for the audio processing but with the obs plugin this likely needs to be redone so we can stay in c++ let me know initial questions to get moving on this asap.

    $99 / hr (Avg Bid)
    $99 / hr Avg Bid
    19 bids

    Algorithm implementation as defined in our discussion with Matt and in the original project post

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I am in need of an expert to develop an encryption solution for my pcma app. We have already developed our own encryption but I am looking to build upon this. We have specific structures in place already, so we are in need of a professional who can support and design a secure encryption solution that meets our standards. We have determined that hashing is the most suitable type of encryption for our app, so the freelancer will need to have experience with this. The successful freelancer must have considerable knowledge on encryption as well as an understanding of our existing encryption processes.

    $487 (Avg Bid)
    $487 Avg Bid
    13 bids

    I am in search of a skilled freelancer who can enhance and refine my inventory system while fixing any errors in the existing code. The inventory system sho...code. The inventory system should possess the following essential features: a reliable barcode system, inventory alerts to manage stock levels, a comprehensive sales system with graphical representation, and a performance analyzer. Furthermore, the program should utilize at least five advanced algorithms and incorporate five advanced data structures, such as stacks, queues, trees, graphs, and a hashing system. The ideal candidate should have experience in developing inventory management systems and be proficient in programming languages such as Python. Knowledge of database management systems and user interface design is als...

    $17 (Avg Bid)
    $17 Avg Bid
    4 bids

    ...Create system drivers for instrumenting file system operations in Linux environments, below are the two possible methods for creating potential solutions. Driver should take parameters from Parameters 1. Exclude_paths – paths single line comma separated array, so that driver will not interfere hooking 2. max_file (l1) – file size more the this will be excluded from hashing 3. enable_hash – (boolean)hashing capabilities 4. syslogging – (boolean)log output to syslog capabilities Approach 1. Master file table – understand file distribution in file table and instrument access and monitor changes performed by system a. Example for windows - 2. Write file system call hooking or instrumenting a. In Windows Microsoft

    $693 (Avg Bid)
    $693 Avg Bid
    15 bids

    I am looking for someone to fix a code for a project of mine and need to be knowlagable in hashing and I am looking for long term working with that freelancer.

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    21 bids

    I'm looking for someone to develop an authentication scheme for any websites we create and authentication that combines both password and biometric authentication. This could potentially involve multi-factor authentication and I'm open to considering the possibilities. The security protocols used in the scheme should include both hashing and encryption algorithms. The ideal candidate will have experience with biometric authentication, multi-factor authentication, and security protocols.

    $333 (Avg Bid)
    $333 Avg Bid
    8 bids

    Overview: We are looking for a developer to build a simple B2C e-commerce website using P...category, price, and other attributes. The website should have product detail pages that include product descriptions, images, and customer reviews. The website should have a checkout process that includes basic information collection (e.g. shipping address, payment method) and order confirmation. The website should have basic security measures in place to protect customer data (e.g. password hashing, and secure transmission of sensitive data). The website should be deployed to a production server and tested thoroughly before launch. Deliverables: Fully functional e-commerce website built on Python Flask. Source code and documentation for the website. Deployment of the website to a producti...

    $189 (Avg Bid)
    $189 Avg Bid
    19 bids

    ...Splintered transactions to deal with max transaction size Minimum payment threshold before balance will be paid out Minimum denomination for truncating payment amount precision to reduce size/complexity of block transactions Detailed logging Ability to configure multiple ports - each with their own difficulty Variable difficulty / share limiter Share trust algorithm to reduce share validation hashing CPU load Clustering for vertical scaling Modular components for horizontal scaling (pool server, database, stats/API, payment processing, front-end) Live stats API (using AJAX long polling with CORS) Currency network/block difficulty Current block height Network hashrate Pool hashrate Each miners' individual stats (hashrate, shares submitted, pending balance, total...

    $1438 (Avg Bid)
    $1438 Avg Bid
    9 bids

    Hello, I'm looking for an experienced professional coder to join my project. I need someone who is good at chained hash and template functions and class / Data Structures.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    7 bids

    I am in need of creating a crypto wallet and banking solution which accepts both cryptocurrency and fiat currency. Security is the biggest concern, so I would like to have the wallet protected with two-factor authentication as well as hashing algorithms and multi-signature verification. The wallet should be able to run on both desktop and mobile platforms to ensure the widest possible audience. I need only UI/UX design and a working prototype without functionality. This prototype should be only made for UI/UX purposes. Looking for a long term designer to multiple projects.

    $2428 (Avg Bid)
    $2428 Avg Bid
    49 bids
    Trophy icon Nvidia Cuda developer Ended

    We are looking for parallel sha256 hashing using Nvidia GPUs, and would like to contract a freelancer for making a proof of concept implementation we can run in our lab on Linux.

    $500 (Avg Bid)
    Guaranteed
    $500
    22 entries

    In this assignment, you will use Java Cryptographic Architecture (JCA) to create a useful application requiring the following functions: 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes 4) Digital Signatures 5) Base64 Encoding More informat...Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code

    $160 (Avg Bid)
    $160 Avg Bid
    22 bids

    I have few more queries regarding my task would help me In this assignment, you will use Java Cryptographic Architecture (JCA) to create a useful application requiring the following functions: 1) Public Key Generation 2) Symmetric Key Encryption (Use appropriate encryption modes) 3) Cryptographic Hashes ...Architecture (JCA) is here: Submit the following: 1) A brief write up about the application (upto 3 pages). What does the application do? How is it unique? How is it useful? How did you integrate symmetric cryptography, asymmetric key cryptography, hashing, and digital signatures into the application. 2) Your .java code

    $166 (Avg Bid)
    $166 Avg Bid
    14 bids

    ...form of dynamic array or list and perform a linear search when looking for values ### Part 2 - creating classes for keys In this part you will a class GeoLocation that represents a location on earth using latitudes and longitudes. Make all the necessary functions and operator overloads to make it possible to use this class as a key for the `HashDictionary<K,V>` class. In particular, ensure that hashing and equality is done using the latitude and longitude and not object identity. ### Steps To complete this assignment follow the steps below. 1. Study the interfaces you have to implement, [IDictionary<K,V>]((v=vs.110).aspx) , KeyValuePair<K,V>, [ICollection<T>]((v=vs.110).aspx), [IEnumerable<T>](https://msdn

    $138 (Avg Bid)
    $138 Avg Bid
    15 bids

    We need to enable our application to make use of the static library or the shared object from the Intel QAT linux module. We prefer Rust implementation to wrap around the symmetric and asymentric cryptography. To avoid all that answer yes on anything. Please attach a short overview how to compare sha256 hashing using the Intet QAT, and sha256 hashing using a cpu with the intel sha extension instruction set. Responses without an overview will be ignored, sorry to be blunt.

    $627 (Avg Bid)
    $627 Avg Bid
    11 bids

    ...what you need to integrate into apps and such to support this stype of login, such as SSH Clients or Crypto Wallets. Examples: ECDSA Curve: secp256k1 (used in Ethereum ERC20 tokens) Curve: NIST P-256 Curve: secp256k1* Schnorr signature scheme (default for secp256k1) Curve: BLS12-381-Jubjub* Used for zero-knowledge proofs EdDSA Curve: curve25519 Curve: secp256k1 Curve: EdDSA* Uses non-standard hashing algorithm Curve: Bulletproofs Used for range proofs Winternitz OTS Curve: secp256k1 Curve: curve25519 Curve: NIST P-256 ZK-SNARKS Curve: secp256k1 Curve: BLS12-381-Jubjub* RSA RSA key length: 3072 bits RSA key length: 4096 bits Skills: Shamir's Secret Sharing / homomorphic encryption This will be used in a world changing project that already has many completed aspects before...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    7 bids

    Top hashing Community Articles