Elliptic trabalhos

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    233 elliptic trabalhos encontrados, preços em USD

    ...consulted during the problem-solving process. What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a blo...

    $11 (Avg Bid)
    $11 Média
    3 ofertas

    ...implement the solution from first principles. Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block...

    $13 / hr (Avg Bid)
    $13 / hr Média
    7 ofertas

    ...plane of idiosyncratic identity. However I don’t have the maths background to effectively put this together cohesively. I am using a theologically based metaphor to unify the determinate and indeterminate aspect fields of experience reality as a jumping off point. I have follow the bread crumbs, so to speak, into Real projective plane and Orientable double cover manifolds as an extension of elliptic geometry as a solution to Euclid’s 5th axiom of the parallel postulate....

    $264 (Avg Bid)
    ADC
    $264 Média
    30 ofertas

    I'm needing an expert in Hyperbolic Geometry, preferably with a grounding in astrophysics, quantum mechanics, and particle physics, for my project revolving around the Real Projective Plane. Key Requirements: • Deep Und...plane of idiosyncratic identity. However I don’t have the maths background to effectively put this together cohesively. I am using a theologically based metaphor to unify the determinate and indeterminate aspect fields of experience reality as a jumping off point. I have follow the bread crumbs, so to speak, into Real projective plane’s and Orientable double cover manifolds as an extension of elliptic geometry as a solution to Euclid’s 5th axiom of the parallel postulate. Need an expert that can link concepts together mathematically...

    $749 (Avg Bid)
    $749 Média
    24 ofertas

    I'm looking for a proficient Python developer to create two distinct scripts utilizing Botan 2 and Botan 3 libraries. Each script should be able to generate Elliptic Curve Digital Signature Algorithm (ECDSA) signatures and verify them, focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding...

    $165 (Avg Bid)
    $165 Média
    27 ofertas

    I'm in need of a skilled C# / Javascript developer with a strong background in cryptography to help debug an Encryption and Decryption System using Elliptic Curve Integrated Encryption Scheme (ECIES) specifically for encrypting messaging content. Please note that code are already in place and task is just to debug and make sure it works. The successful candidate for this project will be someone who can efficiently integrate custom security protocols to enhance our platform's privacy and security features. **Essential Skills and Experience:** - Proficiency in javascript and C# programming - Expert understanding of cryptographic principles - Experience with ECIES or similar encryption methods **Project Objectives:** - ECIES encryption/decryption system in javascript an...

    $88 (Avg Bid)
    $88 Média
    25 ofertas

    ...the following tasks in GNU Octave or Matlab, which can run under GNU Octave: 1. transport the EEG data to GNU Octave 2. remove noise and other artefacts 3. provide the possibility to select certain positions in the extended 10-20 system from the EEG data (e.g. Cz, F3, F4) 4. apply Hanning windowing to the filtered signal at the selected position 5. use an elliptic bandpass filter [1.5-45] GHz (see attachment) 6. call the MATLAB elliptic filter function to extract theta, alpha, beta, beta-low, beta-high and gamma bands 7. plot the individual frequency bands 8. create an FFT and calculate and plot the amplitude, absolute power, relative power and power spectral density (PSD) of theta, alpha, beta-low, beta-high, gamma, alpha/beta, alpha/theta, theta/beta, alpha/(beta+gamma)...

    $173 (Avg Bid)
    $173 Média
    6 ofertas

    Patch mod_ssl-2.8.31-1.3.41 (or apache) to: 1) disable Disable Export Cipher Suites 2) Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) 3) Use a Strong, Diffie Hellman Group Guide to Deploying Diffie-Hellman for TLS: I have a working Apache 1.3.41 + mod_ssl-2.8.31-1.3.41 + openssl-1.0.1k + php 4.4.9. Openssl was installed like this: Apache 1.3.41 was installed like this: PHP 4.4.9 was installed like this: Downloads: http://67.215

    $570 (Avg Bid)
    Destacado
    $570 Média
    10 ofertas

    ...used is Quanta. The smart contract bets the year a quantum computer finds a private key for the point/public key on secp192k1 stored within the smart contract. Proceeds are distributed between (i) the winner address that finds the private key and (ii) users who successfully predicted the year of the break. Small differences from standard ETH smart contracts include the ability to perform elliptic curve point multiplication in secp192k1 and work with QRL addresses. Requirements: - Experience with EVM/Solidity and smart contract development - Ability to implement Solidity calculations for curves other than secp256k1 - Understanding of decentralized prediction markets and their functionalities - Knowledge of blockchain technology and its implementation in smart contracts Al...

    $5000 - $10000
    Destacado Secreto
    $5000 - $10000
    38 ofertas

    Project Title: Implementation of Fiat Shamir Protocol Using Elliptic Curve Cryptography Description: I am looking for a skilled developer who can implement the Fiat Shamir protocol using elliptic curve cryptography. The project requires the following: Programming Language: - The implementation should be done using Python. Code Documentation: - A detailed explanation and documentation of the code is required. Deadline: - The project needs to be completed within a week. Ideal Skills and Experience: - Strong proficiency in Python programming language. - In-depth knowledge and experience with elliptic curve cryptography and the Fiat Shamir protocol. - Ability to provide detailed code documentation. - Excellent problem-solving and debugging skills. - Strong communicati...

    $156 (Avg Bid)
    $156 Média
    13 ofertas
    NS2 Project Encerrado left

    I am seeking assistance from a skilled freelancer to develop a network simulation project using either NS2 or NS3. The objective of this project is to implement a written simulation code based on a research paper and enhance it by incorporating ECDSA (Elliptic Curve Digital Signature Algorithm) encryption. The freelancer is expected to provide sufficient documentation and explanation, enabling me to understand the functionality of the code. Project Requirements: Replicate the results of the main research paper (link provided below) using NS2 or NS3. The research paper serves as the basis for this project. Integrate ECDSA encryption into the simulation code. ECDSA is preferred due to its strong cryptographic properties and suitability for resource-constrained networks. Thoroughly d...

    $388 (Avg Bid)
    $388 Média
    7 ofertas

    I am seeking assistance from a skilled freelancer to develop a network simulation project using either NS2 or NS3. The objective of this project is to implement a written simulation code based on a research paper and enhance it by incorporating ECDSA (Elliptic Curve Digital Signature Algorithm) encryption. The freelancer is expected to provide sufficient documentation and explanation, enabling me to understand the functionality of the code. Project Requirements: Replicate the results of the main research paper (link provided below) using NS2 or NS3. The research paper serves as the basis for this project. Integrate ECDSA encryption into the simulation code. ECDSA is preferred due to its strong cryptographic properties and suitability for resource-constrained networks. Thoroughly d...

    $60 (Avg Bid)
    $60 Média
    41 ofertas

    Hi, I have written a code in c++ that numerically solves elliptic PDE (porous media) using SOR method. I'm looking for a freelancer who can implement this in parallel using MPI and red black ordering technique.

    $132 (Avg Bid)
    $132 Média
    4 ofertas

    ... The main goal of this program is to detect anomalies and attacks in IIoT. For this purpose, we used the Swat dataset. Now we are using federated learning. In federated learning, each client trains the local model with their data and then shares it with central server to detect anomalies. The central server for detecting anomalies uses an auto-encoder decoder model. To improve privacy, we use Elliptic-curve cryptography. When each client wants to share their local model with the central server, first encrypt it with the public key of the central server to make sure no one else can access the model. When the central server receives the models from clients, it first encrypts them with its private key, then aggregates and make a global model. Then when a central server wants to send...

    $57 (Avg Bid)
    $57 Média
    13 ofertas

    Unable to call function for a node module called elliptic

    $18 (Avg Bid)
    $18 Média
    15 ofertas

    We are in search of a skilled programmer to create two functioning computer programs for solving the Elliptic Curve Discrete Logarithm Problem (EDLP) on the secp160k1 and secp192k1 curves. There must be two programs - first Pollard Rho, second BSGS The programs should implement the Pollard Rho and BSGS algorithms, utilizing multicore and multithreading technology, as well as a bloom filter. The software must be written in Python3. If you have experience in this field and are up for the challenge, please send your inquiry and qualifications. Please specify the final price without any additional later charges, as the budget will not be increased. You can use from github, but you must modificate for new curves. - properties of curve secp160k1 :

    $180 (Avg Bid)
    $180 Média
    13 ofertas
    Trophy icon Logo design Encerrado left

    i would like to design a logo for a technology company called "Elliptic Group"

    $50 (Avg Bid)
    Garantido
    $50
    643 inscrições
    Elliptic curve task Encerrado left

    Want to add full example regarding Elliptic curve, Jacobian, Affine and how to caluclate the cost m,s, and calculate ECSM as scalar to know what is the best algorithm have to use

    $36 (Avg Bid)
    $36 Média
    17 ofertas

    I want to have an elliptic curve example with scalar calculation mathmetically

    $14 (Avg Bid)
    $14 Média
    13 ofertas
    Cryptographer Encerrado left

    ...architect, build, audit and deliver secure but easy-to-use solutions for onboarding new users to Web3. **What you’ll do:** - Architect solutions and document them through technical specifications, diagrams and academic papers - Design and build proofs of concept - Review architectures and implementations, identify flaws or vulnerabilities and propose fixes **Skills:** - Golang - Elliptic curve cryptography (ECC), with schemes such as ECDSA, EdDSA, BLS, and curves such as secp256k1, curve25519 - Threshold Signature Schemes (TSS) - Multi-party Computation (MPC) - Distributed Key Generation (DKG) - Secure enclaves **Nice to haves:** - Blockchain and smart contract development, preferably Cosmos SDK - Experience in building crypto wallets or related ap...

    $26 / hr (Avg Bid)
    $26 / hr Média
    15 ofertas

    EEG data will be made available in .edf format. Your job is to do the following in MATLAB: 1. Export EEG data in MATLAB. 1(a). Remove noise and other artefacts 2. Apply Hamming window for the filtered signal. 3. Use Elliptic band-pass filter [1.5-45] GHz 4. Call the MATLAB function of elliptic filter to extract Theta, Alpha, Beta, Beta-Low, Beta-High, and gamma bands. 5. Plot the individual bands. 6. Get FFT and calculate Power Spectral Density of the bands. 7. Calculate and plot PSD of Alpha, Beta-low, Beta-High, Gamma, Alpha/Beta, Alpha/Theta, Theta/beta, Alpha/(beta+Gamma), (Theta/Beta+Gamma)

    $140 (Avg Bid)
    $140 Média
    26 ofertas

    EEG data will be made available in edf format. Your job is to do the following in MATLAB: 1. Export EEG data in MATLAB. 1(a). Remove noise and other artefacts (if visible) 2. Apply Hamming window for the filtered signal. 3. Use Elliptic band-pass filter [1.5-45] GHz 4. Call the MATLAB function of elliptic filter to extract Theta, Alpha, Beta, Beta-Low, Beta-High, and gamma bands. 5. Plot the individual bands. 6. Get FFT and calculate Power Spectral Density of the bands. 7. Calculate and plot PSD of Alpha, Beta-low, Beta-High, Gamma, Alpha/Beta, Alpha/Theta, Theta/beta, Alpha/(beta+Gamma), (Theta/Beta+Gamma)

    $151 (Avg Bid)
    $151 Média
    24 ofertas

    Hi. I need a cryptography programmer who can code for me a highly sophisticated elliptic curve cryptography key generator (preferably using OpenSSL) which I can hash with SHA-256. If ECC is too complex, RSA may also be substituted as a replacement as I believe both of these methods use a public and private key. I already have the working SHA-256 hash code but I need someone to help me with the ECC or RSA code. The idea would be that we would hash the data and then sign the hash. This will prove that whoever generated this hash has the private key. Then you get the data that you want to verify, calculate the hash on it and then check that. If the calculated hash matches the one in the signature then the signature is valid. At this point we will have have high confidence that the da...

    $486 (Avg Bid)
    Urgente
    $486 Média
    17 ofertas

    FPGA in Vivado (RSA and elecptic curve) croptography implementing a modern cryptography algorithm ( Elliptic Curve ) and RSA-1024 bit  in cloud computing environment  using FPGA  and VIVADO HLS software to synthesis C++ code. then compare between two methods in terms of performance and time with most recent research , the main aspect for the proposed work plan is as follow: Generator to generate the keys based on the type of data then determines which method to use and key size for each method. Photos and video encrypted using Elliptic curve , text data encrypted using RSA. And select key size based on data type. the selected method will base a suitable mathematical algorithm to implement each step and phase which Comply with VIVADO HLS. Compare the result wi...

    $282 (Avg Bid)
    $282 Média
    6 ofertas

    ...scoping, ideating, building and deploying -Also architecting, maintenance and enhancements of smart contracts and relate products -Code review -Develop, integrate and evaluate cryptographic tools, products and frameworks. -Be subject matter expert offering vision and development around current and new cryptography concepts, blockchains and tools ○ Public/Private key encryption and digital signature (elliptic curve) ○ Key management (e.g. hsm, threshold cryptography, multiparty computation) ○ Zero knowledge proofs) -Troubleshooting cryptographic anomalies and issues You bring to the table: -Solidity -RUST -Startup experience. -Relentless -Unafraid of failing and iterating -Proactive and ownership minded - you find productivity even when not assigned -Values decentralized finance ...

    $37 / hr (Avg Bid)
    $37 / hr Média
    12 ofertas
    Signature Validation Encerrado left

    Need to validate the signature using Bouncy Castle and Elliptic Curves algorithm in C#. Will provide the valid data, public key and signature for validation.

    $153 (Avg Bid)
    $153 Média
    2 ofertas
    Business card Encerrado left

    Elliptic Cyber business card

    $50 (Avg Bid)
    $50 Média
    1 ofertas

    The main goal is to draw an elliptic arrow (kind of an elliptic as the example joined). One "circle" more must be added to the elliptic arrow (compare to the one joined). Some different kind of characters must be drawn along the arrow. They don’t have to be “well defined” neither complex drawing but have to express some sort of emotion from struggling (at the beginning of the elliptic arow) to thrive (at the end of the elliptic arow). As a matter of fact, a first character has to be drawn at the beginning of the arrow and this character should express that he/she is "starting" a long journey toward the upper part of the arrow. Then, to illustrate the path, 4 to 8 other characters (different age and style...) should b...

    $112 (Avg Bid)
    Garantido Concurso Top
    $112
    24 inscrições

    I need website/application creation services like traveloka and pancakeswap but modified as well as seen in the ...Amazon S3, Cloudflare, Crashlytics, Datadog, Fabric, Facebook Comments, Fastly, ThreatMetrix, Vimeo, Wordpress, reCAPTCHA Productivity: G Suite, Microsoft Office 365, Skype for Business, Slack, Airflow, Edmodo, Siftery Discover JavaScript Libraries and Functions: Sentry, Facebook SDK, Facebook for Websites, Twitter Platform, JQuery, JQuery UI, Webpack, React, RavenJS, Google API, crypto browserify, Elliptic, Moment JS, React-Intl, Iodash Advertising: DoubleClick, Google Remarketing, Facebook Custom Audiences, Criteo, DoubleClick Bid Manager Email Hosting Provider: DoubleClick, Amazon SES, Google Apps for Business, SPF, Microsoft Azure DNS Customer Support: Instabug, Ze...

    $40587 (Avg Bid)
    $40587 Média
    40 ofertas

    We need to pick the method from paper 1 and light weight elliptic curves from paper 2. Implement ecdh using the method picked for those lightweight elliptic curves We need to implement fixed-base comb method for fixed base scalar multiplication, Montgomery ladder method for variable base scalar multiplication .we need to identify whether the additional scalar multiplication is fixed or variable or anything else To get the properties of mote curves, identify a library that supports more curves *Mote curves I have also highlighted the trace and code Material 1 appendix has the trace of fixed base comb method Material 2 appendix has sample code of fixed base comb method I searched and got them This is all the details till now

    $18 - $153
    Destacado
    $18 - $153
    0 ofertas

    ...performance of encryption/ decryption. I prefer using the Golang gofe library that is offering different state-of-the-art implementations of functional encryption schemes. Have you done any job related to ABE before? if so Can you share some? I am using this library: what I need is to evaluate the performance of encryption and decryption using 256-bit BN elliptic curve to generate cryptographic keys. Please check the Library and let me know if you can do it or not what kind of code are you going to build? I built a very simple function in form of chaincode, if you are familiar with Hyperledger Blockchain I can share it with you. This is the chaincode I have, in the makeIdAndVal function, I added the gofe library. take a look and let me know if you can

    $38 / hr (Avg Bid)
    $38 / hr Média
    5 ofertas

    ...certificate managementproblem and identity-based schemes face the key escrow”problem. Therefore, to address these problems, certificatelesspublic auditing schemes have been introduced on the basis ofbilinear pairing, which incur high computation overhead, and thus it is not suitable for CPS. To reduce the computationoverhead, in this paper, Using elliptic curve cryptography, we propose an efficient pairing-free certificateless public auditingscheme for cloud-based CPS. The proposed scheme is moresecure against type I/II/III adversaries and efficient comparedto other certificateless based schemes...

    $153 (Avg Bid)
    $153 Média
    1 ofertas

    #Write a simple and small implementation for 2 questions in cryptography written via a Python language; a simple package based on the RSA algorithm to provide encrypting/decrypting and digital signature signing and verifying. 2. Implement a simple (ECC) Elliptic-curve cryptography package, to provide encrypting/decrypting and digital signature signing and verifying.

    $27 (Avg Bid)
    $27 Média
    2 ofertas

    This project is related to computer networks and information security. You should have strong knowledge of computational maths and geometric addition and scalar multiplication. You should have knowledge of SECP256K1 elliptic curve.

    $158 (Avg Bid)
    $158 Média
    8 ofertas

    This project is related to computer networks and information security. You should have strong knowledge of computational maths and geometric addition and scalar multiplication. You should have knowledge of SECP256K1 elliptic curve. Java related

    $167 (Avg Bid)
    $167 Média
    4 ofertas

    This project is related to computer networks and information security. You should have strong knowledge of computational maths and geometric addition and scalar multiplication. You should have knowledge of SECP256K1 elliptic curve.

    $133 (Avg Bid)
    $133 Média
    5 ofertas

    The project needs your skills in the field of encoding decoding and computer/web security. You should also have a sound understanding of elliptic curves + geometric addition and scalar multiplication SECP256K1

    $103 (Avg Bid)
    $103 Média
    2 ofertas

    The project needs your skills in the field of encoding decoding and computer/web security. You should also have a sound understanding of elliptic curves + geometric addition and scalar multiplication SECP256K1

    $163 (Avg Bid)
    $163 Média
    3 ofertas

    The project needs your skills in the field of encoding decoding and computer/web security. You should also have a sound understanding of elliptic curves + geometric addition and scalar multiplication SECP256K1

    $138 (Avg Bid)
    $138 Média
    4 ofertas

    The project needs your skills in the field of encoding decoding and computer/web security. You should also have a sound understanding of elliptic curves + geometric addition and scalar multiplication.

    $160 (Avg Bid)
    $160 Média
    8 ofertas

    Hi, for my small business propose i need to implement Elliptic curve implementation in C-language. I need some one who can have good knowledge on cryptography.

    $191 (Avg Bid)
    $191 Média
    5 ofertas

    Implement Diffie-Hellman key exchange on an ellptic curve (missing: 0 pts, implementation up to 10 pts) Implement a simple block cipher (missing: 0 pts, implementation up to 10 pts) Design a hybrid system (missing: 0 pts, implementation up to 10 pts)

    $14 (Avg Bid)
    $14 Média
    2 ofertas

    Implement Diffie-Hellman key exchange on an ellptic curve (missing: 0 pts, implementation up to 10 pts) Implement a simple block cipher (missing: 0 pts, implementation up to 10 pts) Design a hybrid system (missing: 0 pts, implementation up to 10 pts)

    $46 (Avg Bid)
    $46 Média
    1 ofertas

    I’m trying to build elliptic curve based homomorphic encryption to send big data to cloud encrypted and execute some data mining algorithms like association rule

    $850 (Avg Bid)
    $850 Média
    2 ofertas
    Software revision Encerrado left

    Software revision There is a project You need to iterate through the hash sequentially from 0 to f with the result written to the .txt file(hash, or key + address) Create two programs, one for compressed addresses, the other for uncompressed ones. Sta...revision There is a project You need to iterate through the hash sequentially from 0 to f with the result written to the .txt file(hash, or key + address) Create two programs, one for compressed addresses, the other for uncompressed ones. Start-stop of the hash in the specified range, or start in the specified range. Keys are used on the basis of elliptic curves. For example a call It will have to output 256 keys, starting from 1 and ending with ff.

    $52 (Avg Bid)
    $52 Média
    5 ofertas

    i need to solve few cryptography challenges which include, Diffie-Hellman, RSA, Elliptic Curves and Block ciphers etc

    $22 (Avg Bid)
    $22 Média
    2 ofertas

    i need to solve few cryptography challenges which include, Diffie-Hellman, RSA, Elliptic Curves and Block ciphers etc

    $20 (Avg Bid)
    $20 Média
    4 ofertas
    SOFTWARE development Encerrado left

    There is a project You need to iterate through the hash sequentially from 0 to f and write the result to the .txt file(hash, or key+ address) Create two programs, one for compressed addresses and one for uncompressed addresses. Start-stop of the hash in the specified range, or start in the specified range. Keys are used based on elliptic curves. For example a call It will have to output 256 keys, starting from 1 and ending with ff.

    $90 (Avg Bid)
    $90 Média
    2 ofertas