Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,364 hashing jobs found, pricing in NZD

    The main purpose of this project is to broaden the mining capabilities of my current setup. I would like to have an efficient algorithm implemented that is capable of converting existing hashing power to mine using the SHA-256 algorithm. This would allow me to increase the diversity of my mining operations. Key requirements for this project include: - Developing an algorithm that can convert hashing power automatically - Primary focus on SHA-256 algorithm - Emphasis on compatibility across different systems rather than speed or energy efficiency Ideal candidates for this project will have a strong background in algorithm development, specifically relating to cryptocurrency mining. Familiarity with different mining algorithms, particularly SHA-256, is absolutely essential. L...

    $985 (Avg Bid)
    $985 Avg Bid
    26 bids

    ...intuitive user interface. Requirements Analysis: Implementing secure session management, hashing, and salting passwords. Conducting input validation and sanitization. Utilizing a tool to assess password strength. Implementing user authentication and access control. Integrating a database for secure password storage. Algorithm of Proposed Solution: Designing a database schema tailored for password storage. Employing web technologies such as HTML, CSS, and JavaScript for the user interface. —————————— Presentation Layer: User Interface (UI) creation with HTML, CSS, and JavaScript Handles user input validation and error handling Logic Layer: Implements core functionalities: user authentication, password hashing, pass...

    $241 (Avg Bid)
    $241 Avg Bid
    29 bids

    ...intuitive user interface. Requirements Analysis: Implementing secure session management, hashing, and salting passwords. Conducting input validation and sanitization. Utilizing a tool to assess password strength. Implementing user authentication and access control. Integrating a database for secure password storage. Algorithm of Proposed Solution: Designing a database schema tailored for password storage. Employing web technologies such as HTML, CSS, and JavaScript for the user interface. —————————— Presentation Layer: User Interface (UI) creation with HTML, CSS, and JavaScript Handles user input validation and error handling Logic Layer: Implements core functionalities: user authentication, password hashing, pass...

    $318 (Avg Bid)
    $318 Avg Bid
    37 bids

    I'm looking for an expert C# deve...this software will be to compare the hashed data with other CDs. Key Points: - The software should be designed to hash CDs at a speed that outperforms the hashing process in PowerShell, ensuring efficiency and time-saving - The primary focus of the hashing is to maintain the integrity of files on the CD, so I need a developer who understands the importance of this and can ensure the software is reliable in this regard - The software should be user-friendly, with a preference towards a fully automated process to make it as easy as possible for end-users. I'm looking for a skilled C# developer who has experience in creating high-speed hashing software, with a focus on file integrity. Please provide examples of similar proj...

    $6504 (Avg Bid)
    $6504 Avg Bid
    26 bids

    ...licenses for administrators. 4. Access to their product portal via external link. 5. Optimize the website for effective web search. Functional Requirements: 1. User Authentication and Authorization:  Allow users to register for an account or log in with existing credentials.  Differentiate between customer and administrator roles.  Implement secure authentication mechanisms (e.g., password hashing, session management). 2. Customer Portal:  Display a dashboard for customers to view their current product licenses, expiration dates, and payment history.  Provide options to purchase new licenses, renew existing ones, or cancel licenses.  Allow customers to update their account information (e.g., contact details, payment methods). 3. Product License Management:  Enable admin...

    $2204 (Avg Bid)
    $2204 Avg Bid
    165 bids

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    $41 (Avg Bid)
    $41 Avg Bid
    2 bids

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in your b...

    $75 (Avg Bid)
    $75 Avg Bid
    18 bids

    I have a C# code that's currently designed for file manipulation but I really need it to work like Powershell for data processing. - Task: I'm specifically working with text files and need to perform a hashing operation on them. - The end goal: The code needs to be able to read through the text files and hash them in a way that's similar to what one can do with Powershell. The ideal freelancer for this job should have: - Proficiency in C# programming, especially in the context of data processing. - A good understanding of hash functions and how to implement them in a C# code. - Familiarity with text file handling in C# is a plus. I'm looking for an efficient and smooth solution that's able to process large text files quickly. Your experience in simila...

    $64 (Avg Bid)
    $64 Avg Bid
    36 bids

    I require a specialist to build a solution that validates the authenticity of hashed data in video format. The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience i...

    $148 (Avg Bid)
    $148 Avg Bid
    13 bids

    ...transaction processing, and data storage, while the frontend will provide a user-friendly interface for interacting with the application. 4. User Registration and Authentication: To ensure security and protect user data, the application will implement a robust user registration and authentication system. This section discusses the importance of secure authentication practices, such as password hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripti...

    $472 (Avg Bid)
    $472 Avg Bid
    9 bids

    I need a proficient Embedded Engineer to design a PCB prototype for...& Gerber files has to be provided - NEEDS to be cost-effective for mass production - Any mining algorithm should/could be programmable - Considerable high hashrate is expected - Raspberry Pi 3/4/5, ESP32xxx, Arduino or any other microcontroller can be used The main focus of this project is: - Low cost hardware ( PCB ) - Electrical Efficiency - Mining capabilities - Scalability - Considerable hashing rates expected This project has a budget of 500-750 USD for a running & tested prototype and has to be done ASAP. You have totally freedom of the components you want to use, but remember that the cost of the PCB itself should not be astronomical. The freelancer has to signed an IP Agreement and NDA once we ...

    $981 (Avg Bid)
    $981 Avg Bid
    18 bids

    ...use the discount codes and start registering for the course with the discounted price. Skills: Graphic Design, HTML, PHP, Website Design User/Account :- Super Admin / Sub admin/ User Other :- 1} Module for School Exam 2} live certificate 3) Typing Speed Test Features: User Authentication: Allow users to register, login, and manage their accounts. Secure user authentication with password hashing and salting. Typing Tests: Provide typing tests in both Hindi and English languages. Generate random paragraphs or sentences for users to type. Calculate typing speed (words per minute) and accuracy. Display results and provide feedback to users after completing a test. Mock Tests: Create mock tests for various exams or certifications. Include multiple-choice questions, fill in ...

    $1053 (Avg Bid)
    $1053 Avg Bid
    82 bids

    I'm looking for a database expert who can help me implement a masking technique for sensitive data i...database expert who can help me implement a masking technique for sensitive data in MySQL. Key Points: - Types of Sensitive Data: The solution should focus on masking Social Security Numbers, Credit Card Numbers, and Email Addresses. - Approach: I would like the data to be securely stored using a Hashing mechanism. - Database System: The project will involve working specifically with MySQL. The ideal candidate should have a deep understanding of database management, data security and Hashing techniques. Experience with data masking and MySQL is crucial. The project requires a meticulous and thorough approach to ensure that all sensitive data is properly masked and se...

    $106 (Avg Bid)
    $106 Avg Bid
    12 bids

    ...skilled Laravel developer to carry out an essential task—resetting the Admin Panel password for my Laravel 6.0 website. Key Tasks: -ensuring the new password gets hashed securely -standard password reset procedure, maintaining existing encryption methods as I'm uncertain of the specific encryption standard used. Requirements: - Expertise in Laravel 6.0 - Experience with standard Laravel password hashing - Exceptional problem solving, particularly in cases with limited source information - Intermediate understanding of Laravel's native or custom password encryption standards beneficial. Backup files for the Laravel project are available. It is imperative to maintain the confidentiality of all information gained while working on this project. Note: all work mus...

    $51 (Avg Bid)
    $51 Avg Bid
    14 bids

    ...meter to discourage trivial modifications of weak passwords. - Display warnings for passwords that exceed the maximum length without truncation. - Implement an "eye" icon for toggling password visibility. Security Enhancements: - Check passwords against a list of breached passwords and prompt users to change them if matched. - Use Argon2 for password hashing with a unique salt for each password. - Integrate an additional HMAC layer for hashing with a highly secure secret salt. - Implement two-factor authentication (2FA) using a popular service like Google Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session r...

    $39 (Avg Bid)
    $39 Avg Bid
    30 bids

    ...What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the tas...

    $18 (Avg Bid)
    $18 Avg Bid
    3 bids

    ...(ORM). ? Pydantic, used by FastAPI, for the data validation and settings management. ? PostgreSQL as the SQL database. ? React for the frontend. ? Using TypeScript, hooks, Vite, and other parts of a modern frontend stack. ? Chakra UI for the frontend components. ? An automatically generated frontend client. ? Dark mode support. ? Docker Compose for development and production. ? Secure password hashing by default. ? JWT token authentication. ? Email based password recovery. ✅ Tests with Pytest. ? Traefik as a reverse proxy / load balancer. ? Deployment instructions using Docker Compose, including how to set up a frontend Traefik proxy to handle automatic HTTPS certificates. ? CI (continuous integration) and CD (continuous deployment) based on GitHub Actions....

    $297 (Avg Bid)
    $297 Avg Bid
    74 bids

    ...I have not much time to do it myself. Key Project Requirements: - Version Control: Git - Database Connection: MySQL - Functionality: User registration and login, product catalog management (store, fetch, and modify products in the database) - Use of Design Patterns: Singleton, Observer, MVC, and any others you feel are necessary Additional Skills and Experience: - JUnit - Netbeans - Password hashing techniques (if time permits, otherwise store passwords as plaintext.) - Experience with implementing design patterns in Java applications - Proficiency in MySQL and database management Please provide examples of similar projects you've completed in the past. Prior experience with e-commerce applications is a plus. PLEASE REFER TO FOR DETAILED INSTRUCTIONS. I have prepared 3

    $211 (Avg Bid)
    $211 Avg Bid
    10 bids

    I am currently using Google Cloud Platform (GCP) and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked ...

    $236 (Avg Bid)
    $236 Avg Bid
    18 bids

    ...in. Python might work or some sort of hashing algorithm. It will need a user front end also. Basically I need to Generate a Private Key (HEX) from a public Bitcoin Address from a Private Key Range (Bits). For instance I need to generate a Private Key (HEX) from the Private Key Range (Bits) from the Start key in HEX format of a user inputed minimum range of say - 0000000000000000000000000000000000000000000000020000000000000000 to the End key in HEX format of say - 000000000000000000000000000000000000000000000003ffffffffffffffff for the bitcoin wallet address of for example - 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so Please send my 2 attached documents - PROJECT BRIEF and Bitcoin Private Key Finder website layout You will need bitcoin knowledge and hashing/algorithm knowledge ...

    $1183 (Avg Bid)
    $1183 Avg Bid
    47 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but w...currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security...

    $21 (Avg Bid)
    $21 Avg Bid
    26 bids

    ...Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this challenge is for you to understand and implement the validation logic manually. Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate the hash, and meet the chall...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    7 bids

    I am looking to enhance the security level and add features to my current Payten payment gateway through PHP. This gateway is functionally intact yet bordering obsolescence. Our ideal candidate should have substantial experience with Payten, PHP, and secure payment gateways. The scope of work involves: -Upgrading Payten to the latest standard hashing algorithm (SHA3) -Addition or improvement of specific features, which will be disclosed further during the discussions. Proficiency in PHP and a solid understanding of secure payment gateways is desirable. The intended applicant needs to have prior experience with Payten to be considered. I am open to additional recommendations to future-proof our payment gateway. The amount you bid is what I will accept! after bidding I will not si...

    $287 (Avg Bid)
    $287 Avg Bid
    61 bids

    I'm seeking a proficient C# developer, who's skilled in creatin...applications. My project specifically requires the development of an application utilizing algorithms, data structures along with MVC and WPF. • You'll be implementing a MVC structure which should include user authentication, efficient database interaction, and dynamic webpage creation. Ideal Skills: • Mastery in C# • Extensive experience with MVC and WPF • Knowledge about sorting, graph, and hashing algorithms is preferred but not mandatory • Strong understanding of database interactions • Reliable in creating dynamic web pages. Please note, being detail-oriented and capability of effective workflow management is also expected for seamless project execution. Look...

    $264 (Avg Bid)
    $264 Avg Bid
    50 bids

    this is for both bitcoin and litecoin address bitcoin bc1 and tb1 litecoin ltc1 addresses, need code in python to exlpain the encoding / decoding of the address, all steps, all code need commenting As someone committed t...handling this encoding scheme's complexities would be very beneficial. -SHA-256 Functioning: Your in-depth understanding of SHA-256's operation is crucial. I'm not looking to implement it myself yet; I just want to understand how it works under the hood. Ideal skills and experience include a strong working knowledge of Python, expertise in the Bech32 encoding format, and an understanding of SHA-256 hashing algorithm functionalities. If you're a tenacious problem-solver with an educational spirit, I'd love to learn under your guidanc...

    $218 (Avg Bid)
    $218 Avg Bid
    2 bids

    I'm looking for a prof...them, focusing on their application in user authentication. Key Requirements: - Generation and verification of ECDSA signatures using Botan 2 and Botan 3 - Scripts should be designed for user authentication - The use of SHA-256 as the hashing algorithm for ECDSA signatures Ideal Skills: The ideal freelancer for this project will have extensive experience in Python development with proven knowledge of digital signatures, specifically ECDSA. Familiarity with Botan cryptographic library is a major requirement. They should also have a solid understanding of hashing algorithms, particularly SHA-256. Attention to detail and ability to meet deadlines is also a key expectation. Note: Please remember that I need two scripts, each compatible with Botan...

    $271 (Avg Bid)
    $271 Avg Bid
    26 bids

    I'm looking for a skilled and experienced specialist in JavaScript programming and encryption for a specific task. Your mission will be to simulate an encryption function from another website. Here are the project specifics: - Deep understanding of encryption is mandatory. You need to be conversant with different types of encryption like symmetric, asymmetric, and hashing. For this project, we're particularly interested in custom encryption. - You'll have to work on the encryption algorithm and the custom encryption specification. - Familiarity with common web technologies and encryption libraries would be beneficial. Ideal Skills: - JavaScript - Custom Encryption - Algorithm implementation This project requires a person with an eye for detail and an ability to del...

    $554 (Avg Bid)
    $554 Avg Bid
    28 bids

    Hello prospective bidders, I am in need of a crypto expert that can assist me in implementing encryption, decryption, and hashing principles to my project. About the Project: - Specific cryptographic services required include Encryption, Decryption, and Hashing. - I believe understanding the balance between security and performance is vital, as we wouldn't want to sacrifice one for the other. - The main platforms for applying these services need to run on HackerRank. Requirements: - Demonstrable knowledge on encryption, decryption and hashing principles. - Prior experience in implementing cryptographic services on web-based platforms and HackerRank. - Medium to high understanding of cyber security principles. - Good communication and problem-solving skills. ...

    $23 (Avg Bid)
    $23 Avg Bid
    3 bids

    Create a new .net 7.0 application that will fully i...the protocol LNURL-auth. The following functions of LNURL-auth need to be implemented: -register -login -link -auth Documentation for LNURL-auth can be found here: Please read the documentation and make sure you fully understand the project before applying. To apply, please type what the sha256 of "helloworld" is to show you know knowledge of hashing, and please type the last sentence of the documentation to show you have read it fully. A linux machine will be given that ready for you to deploy to. The database will be sql server. **Ideal Skills and Experience:** - Proficient in .NET 7.0 framework. - Strong background in developing authentication systems. - Python experience is a plus

    $344 (Avg Bid)
    $344 Avg Bid
    30 bids

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $277 (Avg Bid)
    $277 Avg Bid
    5 bids

    We are seeking an experienced individual or team with expertise in Bitcoin mining to assist with optimizing our mining operation. The project involves maximizing hash rates using the SHA256 hashing algorithm to increase our chances of successfully mining Bitcoin blocks. probably the “nerdminers “ software can work.

    $179 (Avg Bid)
    $179 Avg Bid
    5 bids

    I need a Windows, iOS and anndroid/iphone application developed using C# and perhaps flutter for the mobile app. The application should possess specific features that secure the system. The end point protection app would work as a whitelist and block everything else from installing/running. This would work by hashing files and checking against a database of known safe apps. Apps should also be able to be ring fenced ie. not able to escalate permissions of run other apps for services from within, or make internet traffic etc. You can see an end point protection example called threatlocker.

    $4392 (Avg Bid)
    $4392 Avg Bid
    70 bids

    ...calculation formulas for cryptocurrency mining This is current result and formula I have for BTC (but its wrong): Certainly! Here is the information presented in regular text: Certainly, here is a general formula for calculating the daily mining yield for an Antminer S9, with the data filled in: Mining Yield = (Hashing Power * Block Reward * 86400) / (Network Hashrate * (1 - Mining Pool Fee)) - (Power Consumption * 24 * Cost Per kWh) Here are the filled-in data for an Antminer S9: - Hashing Power: 13.5 TH/s (Terahashes per second) - Block Reward: 6.25 BTC (Bitcoin) - Network Hashrate: (current network hashrate of Bitcoin) - Mining Pool Fee: (fee charged by the mining pool) - Power Consumption: 1350 W (Watts) - Cost Per kWh: (electricity cost per kilowatt-hour) Pleas...

    $990 (Avg Bid)
    $990 Avg Bid
    5 bids

    ...calculation formulas for cryptocurrency mining This is current result and formula I have for BTC (but its wrong): Certainly! Here is the information presented in regular text: Certainly, here is a general formula for calculating the daily mining yield for an Antminer S9, with the data filled in: Mining Yield = (Hashing Power * Block Reward * 86400) / (Network Hashrate * (1 - Mining Pool Fee)) - (Power Consumption * 24 * Cost Per kWh) Here are the filled-in data for an Antminer S9: - Hashing Power: 13.5 TH/s (Terahashes per second) - Block Reward: 6.25 BTC (Bitcoin) - Network Hashrate: (current network hashrate of Bitcoin) - Mining Pool Fee: (fee charged by the mining pool) - Power Consumption: 1350 W (Watts) - Cost Per kWh: (electricity cost per kilowatt-hour) Pleas...

    $33 (Avg Bid)
    $33 Avg Bid
    1 bids

    I'm looking for a professional developer who would be able to create price-comprising (like ) applications using Flask. The application should contain the following features: - Login - Register - Hashing user's data - Searching results sort - Search filters - Email verification by code - The project must be developed in Python, with use of HTML, JS and SQL - It should manifest as a web application. - Flask is the chosen web framework. You will also have to write a report for in format below :// ://

    $256 (Avg Bid)
    $256 Avg Bid
    35 bids

    Im looking for a mathematician expert to help me create a hash. The idea is that a string is converted into ASCII Keys. These ASCII keys are then combined to create a number in scientific notation. Then essentially we need to redefine the keys using the sceintific notation number.

    $18 (Avg Bid)
    $18 Avg Bid
    9 bids

    ...This feature is crucial as it will be the first point of interaction for users before they can access the exclusive features of our app. Key responsibilities include: - Collecting specific user information including username, password, account name, and email during registration. - Implementing password security. You'll need to apply a hashing process to password security in the registration process. Experience in password security and knowledge on hashing are must-haves. The ideal candidate should have previous experience in developing a secure and efficient registration process, particularly for React web apps backed by PostgreSQL. Strong knowledge of user authentication and data security is essential. ==== React Admin Theme:

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    46 bids

    Seeking freelance software developer for decentralised web app project. Skills needed: - Experience with React and Node.js - Strong understanding of REST APIs, - Working knowledge of IPFS or similar decentralised storage - Implementing end-to-end encryption, SSL/TLS - Data security concepts - hashing, key management - Containerisation with Docker, Kubernetes basics - Experience with CI/CD pipelines, Git workflows - Ability to write tested, maintainable code - Passion for privacy-focused technologies This is an opportunity to work on an innovative decentralised platform built for security and customisation. Looking for an expert in modern web app stacks with interest in emerging tech like IPFS and encryption. Please send a portfolio/resume if you have the required skills and are

    $4069 (Avg Bid)
    $4069 Avg Bid
    33 bids

    I am looking for a developer to assist with 2x way data communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything tog...am looking for a developer to assist with 2x way data communication between ESP32 Micro-Controller and Python and JavaScript servers. I have working sample code and need someone to bring everything together and ensure all code works for all test cases. AES256 is used for encryption algorithm, while the HmacSHA256 for hashing algorithm. Key requirements: - Good understanding of ESP32 MCU, Python, and JavaScript - Good understanding of data encryption, decryption and hashing techniques, particularly using AES256 & HmacSHA256 It is a small project needs to be completed...

    $103 (Avg Bid)
    $103 Avg Bid
    9 bids

    ...network of existing blockchains. This is why it is said that the blockchain network is an immutable technology. Debugging will consist of creating and deploying a brand new smart contract on the blockchain. It turns out that a developer is required here even more than at the start, because blockchain debugging requires carrying out an audit of your first smart contract. Just use the correct hashing algorithms and follow the steps outlined. If you are an experienced developer, you should be able to create your own blockchain. With a good server and plenty of time, you should get there. You will quickly realize, however, that creating a blockchain is not the most difficult challenge to overcome in the long term. Indeed, one thing is to create your blockchain network, the other is...

    $1223 - $2445
    Sealed
    $1223 - $2445
    21 bids

    I am looking for a web developer to create a custom-built website for me. The website will require a login authentication page for user registration. Key functionalities that I want on the website include: - User registration functionality Ideal skills and experience for this job: Frontend should be made with react and password hashing using python hashlib and database sqllite Please provide examples of previous custom website development projects you have worked on

    $68 (Avg Bid)
    $68 Avg Bid
    29 bids

    I am looking for a JavaScript developer to create a unique hashing function. This function needs to return an input that is hashed in hex format with 64 characters long. The hash must come with a decryption function.

    $27 (Avg Bid)
    $27 Avg Bid
    25 bids

    ...ensure alignment with solution goals. Collaborate with project managers and developers to guide development processes in line with solution requirements. Ensure solutions are scalable and adaptable for future modifications, considering the organization's goals. Qualifications And Experience Minimum 4 yrs+ experience with snowflake- snowflake SQL, Snow pipe, streams, Stored procedure, Task, Hashing, Row Level Security, Time Travel etc. Proficiency in SQL, data structures, and database design principles. Strong experience in ETL or ELT Data Pipelines and various aspects, terminologies with Pure SQL like SCD Dimensions, Delta Processing etc. 3+ years of Experience of working with AWS cloud services- S3, Lambda, Glue, Athena, IAM, CloudWatch, Redshift etc. 5+ years of p...

    $14707 (Avg Bid)
    $14707 Avg Bid
    2 bids

    ...Responsibilities: Design and develop a complex application using Java, Spring Boot, and React. Backend Development:Implement User Management using Spring Security. Develop features using JPA, native queries, DTOs, and Model Mapper. Knowledge of working with session management in Spring. Payment integration (e.g., Stripe). Incorporate Kafka and Redis for relevant modules. Ensure robust security with password hashing using bcrypt. Document the API using Swagger. Implement JUnit testing and demonstrate integration testing. Follow TDD/BDD methodologies. Build dynamic UI components using React features like JSX, useState, useEffect, useContext, useReducer, and React Router. Focus on responsive design using CSS flexbox and grid. Include State management with React Redux. CI/CD using Je...

    $834 (Avg Bid)
    $834 Avg Bid
    30 bids

    Project Details 1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. J...

    $944 (Avg Bid)
    $944 Avg Bid
    71 bids

    DSA Expert Needed for Beginner Level Problems I am in need of a DSA expert who has hands-on experience with various data structures and algorithms. I require assistance with the following specific areas: - Arrays and Lists - Trees and Graphs - Hashing and Sorting I have specific problems and challenges related to DSA that I need help with. The complexity level of the problems is beginner. Ideal Skills and Experience: - Strong understanding of data structures and algorithms - Proficiency in working with arrays, lists, trees, graphs, hashing, and sorting - Ability to solve beginner level DSA problems - Experience in providing clear explanations and guidance for DSA concepts - Excellent communication skills to effectively communicate and explain solutions If you are a DSA ...

    $973 (Avg Bid)
    $973 Avg Bid
    15 bids

    I am looking for a skilled freelancer to develop a Diffie-Hellman Calculator with specific functionality including encryption and decryption capabilities. (Python programming language)) The project also requires the development of an MD5 Hashing Calculator that can both generate and verify hashes. Additionally, I need a user-friendly interface with a 2D visualization and animation feature. Skills and experience needed for this project: - understanding of encryption and decryption algorithms or using existing ones - Proficiency in MD5 hashing algorithms - Experience in developing user-friendly interfaces - Proficiency in 2D visualization and animation techniques - Ability to create clear and concise documentation and user guides. if you can use open source codes from github...

    $277 (Avg Bid)
    $277 Avg Bid
    27 bids

    1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. Job Postings and B...

    $945 (Avg Bid)
    $945 Avg Bid
    74 bids

    1. User Registration and Authentication: Technical Implementation: • Utilize JWT (JSON Web Tokens) for authentication. • Implement user registration endpoints using HTTP methods like POST. • Use bcrypt or a similar library for hashing passwords securely. • Validate user inputs and handle errors gracefully. • Integrate OAuth for social media login (Facebook, Google). 2. Profile Creation and Management: Technical Implementation: • Design database schemas for user profiles using MySQL/PostgreSQL/MongoDB. • Implement CRUD (Create, Read, Update, Delete) operations for profiles. • Use form validation and sanitize inputs to prevent malicious data. • Store profile images/files in cloud storage (AWS S3, Google Cloud Storage). 3. Job Postings and ...

    $996 (Avg Bid)
    $996 Avg Bid
    81 bids

    Top hashing Community Articles