Cryptanalysis jobs

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Habilidades
Idiomas
    Estado do Trabalho
    47 cryptanalysis trabalhos encontrados, preços em USD

    ...new references (journals). The references should be related to Braids NP-hard problem, Braid Conjugacy problem and some papers which clearly support our claims that no cryptanalysis attacks on Braid Conjugacy problems. Please also note that it is not important to find paper that directly talk about braids in hash functions, but It is very good to

    $112 (Avg Bid)
    $112 M\u00e9dia
    14 ofertas

    I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques. - Differential and linear cryptanalysis - Algebraic attacks - Key schedule attacks - Etc .. This will include writing the text that describe each in details.

    $103 (Avg Bid)
    $103 M\u00e9dia
    3 ofertas

    I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques. - Differential and linear cryptanalysis - Algebraic attacks - Key schedule attacks - Etc .. This will include writing the text that describe each in details.

    $106 (Avg Bid)
    $106 M\u00e9dia
    7 ofertas

    Differential and linear cryptanalysis Algebraic attacks Key schedule attacks i want this analysis conducted

    $21 (Avg Bid)
    $21 M\u00e9dia
    7 ofertas

    I have proposed a Simplifi...experimentally and compared against multiple cipher. I wish to extend the analysis by providing additional analysis based using the following techniques. - Differential and linear cryptanalysis - Algebraic attacks - Key schedule attacks - Etc .. This will include writing the text that describe each in details.

    $174 (Avg Bid)
    $174 M\u00e9dia
    2 ofertas

    ...resilient against the following attacks: 01. brute-force 02. differential cryptanalysis 03. linear cryptanalysis 04. differential-linear cryptanalysis 05. truncated differentials 06. higher-order differentials 07. interpolation attack 08. davies attack 09. related-key cryptanalysis 10. algebraic attack 11. side channel attack 12. and other attacks

    $500 (Avg Bid)
    $500 M\u00e9dia
    1 ofertas
    Cryptanalysis Encerrado left

    Hello, I want you to teach me as much as possible about cryptanalysis technique. Thank you.

    $129 (Avg Bid)
    $129 M\u00e9dia
    3 ofertas
    Write a Report Encerrado left

    i have a questionnaire of 10 questions regarding cryptanalysis and it security i want them be be answered its like a quiz For Computer Science graduate.1 USD for 1 Question.

    $113 (Avg Bid)
    $113 M\u00e9dia
    6 ofertas

    A text is to be decrypted using Vigenere Cryptanalysis

    $20 (Avg Bid)
    $20 M\u00e9dia
    6 ofertas

    the project is the implementation of particle swarm optimization technique for cryptanalysis.....where the input is the text encrypted through aes algorithm and the letter frequencies of various english letters (bigram/trigram) to obtain the key by which the plain text is encrypted....and the same process with genetic algorithm The implementation

    $429 (Avg Bid)
    $429 M\u00e9dia
    5 ofertas

    the project is the implementation of particle swarm optimization technique for cryptanalysis.....where the input is the text encrypted through aes algorithm and the letter frequencies of various english letters (bigram/trigram) to obtain the key by which the plain text is encrypted.... The implementation of pso algorithm is required in this project

    $181 (Avg Bid)
    $181 M\u00e9dia
    7 ofertas
    Write some Software Encerrado left

    This cryptanalysis assignment consists of a software implementation of an algorithm that tries to decrypt an L-symbol challenge ciphertext computed using a permutation cipher. Informally speaking, your program's goal is to find the plaintext used to compute this ciphertext within a reasonable amount of time. Specifically, your program should print on

    $43 (Avg Bid)
    $43 M\u00e9dia
    3 ofertas
    Cryptanalysis Encerrado left

    Hello, I want you to teach me how exactly implement each of the cryptanalysis method. Happy bid!

    $266 (Avg Bid)
    $266 M\u00e9dia
    2 ofertas

    Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI More details will be shared at the time of discussion..

    $426 (Avg Bid)
    Local
    $426 M\u00e9dia
    1 ofertas

    Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI More details will be shared at the time of discussion..

    $192 - $576
    Local
    $192 - $576
    0 ofertas

    Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI More details will be shared at the time of discussion....

    $399 (Avg Bid)
    $399 M\u00e9dia
    4 ofertas
    Cryptanalysis Encerrado left

    Hello, I want to teach me all of the cryptanalyst method that can be used to break a chiper. Thank you.

    $201 (Avg Bid)
    $201 M\u00e9dia
    3 ofertas
    Write some Software Encerrado left

    it is a project based on neural cryptography... simulation of basic part can be find at: [login to view URL] and...tography and also in the pdf attached. Its about the generation of key through synchronization of neural networks and encryption and decryption through AES. And the cryptanalysis of AES through PSO algorithm.

    $253 (Avg Bid)
    $253 M\u00e9dia
    5 ofertas

    Breaking a simple 128 bit authentication algorithm of an embedded device. The host sends message X: 128 bit to the device, device respon...thus simple (takes few microseconds to compute on an embedded microcontroller). We need to find the algorithm f(). We can pass any sequence of data X to produce Y for cryptanalysis methods. An example is attached.

    $528 (Avg Bid)
    $528 M\u00e9dia
    5 ofertas

    3 Pieces of code(similar to the exercise problems).

    $44 (Avg Bid)
    $44 M\u00e9dia
    10 ofertas