Cryptographers For Hire

  • Cryptography
Suggestions:
more

Countries

Specific Location

Exams

Hourly Rate (USD)

Rating

Online

  • Hire ITSecurityPro
    4.5
    18 reviews $25 USD per hour
    penetration testing (4)Network & server Penetration testing (5)Stress and quality test (6)Encryption/d188fdd4a3Cryptography602f62d66f (7)Mobile apps penetration testing (8)WAF bypass (9)Forensics (10)Voip pentest (11
    Experienced Penetration Tester/IT Security Analyst and has been working in the field of IT Security from more then 4 years, completed 6 Cyber Security certifications. Making the penetration test reports public is against the ethics and law so i cannot add to the portfolio.I would be happy if employed by you and will work to the best of my abilities. **Pay one time configurations fee and get you personal threat monitoring dashboard for your VPS/Dedicated Server to block upcoming Cyber Attacks, interested? Get Demo Today** (1)Web Application Pentetration testing (2)Wordpress Security (3)CMS penetration testing (4)Network & server Penetration testing (5)Stress and quality test (6)Encryption/Cryptography (7)Mobile apps penetration testing (8)WAF bypass (9)Forensics (10)Voip pentest (11)Wireless security (12)Ransomwares data recovery (13)Code analysis (14)IT Security Operation Center Deployment (15)ELK Stack, Graylog, OSSEC, OSSIM, AlienVault etc. (16) ISO 27001, PCI DSS and Gap Analysis less
  • Hire szubaira
    0.8
    1 review $25 USD per hour
    Information Technology & Information Security professional, proven Technical & Business Management Expertise, in a career spanning 28+ Years. Expertise: 1. Information Security, d188fdd4a3Cryptography602f62d66f 2. Technical writing, Search Articles 3. Business Plan. 4. Proposals 5. Presentations
    Information Technology & Information Security professional, proven Technical & Business Management Expertise, in a career spanning 28+ Years. Expertise: 1. Information Security, Cryptography 2. Technical writing, Search Articles 3. Business Plan. 4. Proposals 5. Presentations less
  • Hire Raghavanps
    2.7
    5 reviews $15 USD per hour
    Solutions for problems of Mechanical Engineering and Applied Mathematics in the fields of Fundamental Algorithms, d188fdd4a3Cryptography602f62d66f, Mechanical Engineering (Thermodynamics, Combustion, Propulsion, Heat transfer, Fluid Dynamics), Energy and Power, Chemical Engineering, Control Engineering and Instrumentation.
    Solutions for problems of Mechanical Engineering and Applied Mathematics in the fields of Fundamental Algorithms, Cryptography, Mechanical Engineering (Thermodynamics, Combustion, Propulsion, Heat transfer, Fluid Dynamics), Energy and Power, Chemical Engineering, Control Engineering and Instrumentation. less
  • Hire sakiib
    0.8
    1 review $7 USD per hour
    : d188fdd4a3Cryptography602f62d66f , Security , Research , Kali Linux , Wireless Security , Networks. Information Security. Always ready for any kind of assignments / Research / tasks on d188fdd4a3cryptography602f62d66f , Statistics , probability ,KALI linux , Wireless Protocols like WEP / WPA / WPA 2. Here to make an impact.
    Certified Mobile Application Penetration Tester (elearnsecurity). A constant learner, A University Teacher, a Security Researcher. Trainer, Passionate about teaching . Area of Expertise / Interest: Cryptography , Security , Research , Kali Linux , Wireless Security , Networks. Information Security. Always ready for any kind of assignments / Research / tasks on cryptography , Statistics , probability ,KALI linux , Wireless Protocols like WEP / WPA / WPA 2. Here to make an impact. less
  • Hire akshatamrit
    2.6
    4 reviews $15 USD per hour
    I am EC-Council certified ethical hacker. I have experience in d188fdd4a3cryptography602f62d66f, information security. I've worked on different virtualization and server setup including email server setup will all
    I am EC-Council certified ethical hacker. I have experience in cryptography, information security. I've worked on different virtualization and server setup including email server setup will all records update. I also have expertise in customized php application development, mobile application development and website development including multiple cms and e-commerce with fully customized plugins and modules. less
  • Hire ahmsak
    3.4
    5 reviews $40 USD per hour
    *LEX/YACC *FLEX/BISON *Regular Expressions *Interpreter/Parser -Artificial Intelligence (AI) *Search Algorithms -d188fdd4a3Cryptography602f62d66f *RSA *Elliptic Curve d188fdd4a3Cryptography602f62d66f *Caesar Cipher *Transposition Cipher
    My rating is 5/5, which means that if I agree to a project, I will do my best to finish it perfectly and on time. Your Satisfaction is my top priority. My area of knowledge and interest includes: -Algorithms *Algorithm Design *Complexity Analysis *Recursion and Recurrence Solving -Functional and Logic Programming *Prolog *Haskell *Answer Set Programming (ASP) *CLIPS *Racket/DrRacket *LISP *Erlang *OCaml *ml *sml/nj *F# *Scheme *Clojure *Scala *Akka Framework *Spark -Discrete Optimization *MiniZinc *Planning *GOLOG *Graphplan *Linear Programming -Compiler Design *Automata Theory *DFA/NFA *LEX/YACC *FLEX/BISON *Regular Expressions *Interpreter/Parser -Artificial Intelligence (AI) *Search Algorithms -Cryptography *RSA *Elliptic Curve Cryptography *Caesar Cipher *Transposition Cipher -Scientific and Parallel Computing *Matlab *Mathematica *C/C++ *Python *Java *CUDA *OpenCL *OpenAcc *OpenGL *OpenMP *MPI *PVM *R Programming Language *Ruby I look forward to work on your projects! less
  • Hire Elsa22
    0.8
    1 review $10 USD per hour
    like CISSP, CCNP , MSCE, CEH and ITILv3 I am well proficient in Technical writing related to Database , Computer security , d188fdd4a3Cryptography602f62d66f, Networking , Windows system and Project management. As well as
    I believe in working smarter rather than working harder & it's being a basic principle of my life. Besides that always my objective is to do my tasks in my level best in order to provide a quality service for my clients. I have done my bachelors of computer science from University college Dublin - Ireland, and Masters from Computer forensics. I am certified with several vendor certifications like CISSP, CCNP , MSCE, CEH and ITILv3 I am well proficient in Technical writing related to Database , Computer security , Cryptography, Networking , Windows system and Project management. As well as technical support and information security testing. Further I have a creative mindset, I do logo designs, Web design and multimedia works. So if you are looking for someone who is highly committed,reliable,multi tasking and time oriented,then here I am. Thanks for viewing my profile & look forward to work with you less
  • Hire sarathginjupalli
    4.0
    7 reviews $30 USD per hour
    cyber security and block chain technologies and had a strong development background. I majorly accepts the research projects in d188fdd4a3cryptography602f62d66f or that involves d188fdd4a3cryptography602f62d66f. If you are very
    I'm post graduate in Information Security and a crypto enthusiast. I worked across various organizations for about 7 years in security domain. I worked majorly in the network security, automotive cyber security and block chain technologies and had a strong development background. I majorly accepts the research projects in cryptography or that involves cryptography. If you are very specifically looking for a cryptographer for any of your project needs you can contact me. These days I'm actively working on the projects related to crypto-currencies and block chain technologies. So if you have one such project I'll be more interested. Git username: sg777 less
  • Hire utkarshkatiyar19
    3.7
    5 reviews $30 USD per hour
    , Data Structures, Networking , d188fdd4a3Cryptography602f62d66f, Databases, Operating Systems , Compilers, Data Mining , Web Scraping, Website Designing, SEO, Machine Learning, Hadoop, Spark, Hive, Data
    "If you can be anything in this world, be kind" I have proven experience in C , C++ , Java, Python, PHP, HTML, CSS R, PL/SQL, Android and mobile app development . I am an expert in Algorithms, Data Structures, Networking , Cryptography, Databases, Operating Systems , Compilers, Data Mining , Web Scraping, Website Designing, SEO, Machine Learning, Hadoop, Spark, Hive, Data Analytics, Statistics, Sentiment Analysis, Natural Language Processing etc. If you have any project in these fields then let me know. Thanks for Reading" less
  • Hire wassily
    3.0
    1 review $30 USD per hour
    of components and controls, COM / ActiveX Hardware I/O (USB, COM, LPT), sockets, network communication protocols d188fdd4a3Cryptography602f62d66f, software copy protection, smart-cards (java-cards) Software: Datarescue Interactive Disassembler Pro (IDA) WinDbg Macrovision InstallShield
    Hire for $100- and above projects; if it's reverse engineering/hacking, I do whitehat only. I'm a brainbench.com certified Master Windows API Programmer, Visual C++ and Delphi programmer. Major software projects: www.scoutdongle.com - SCout - standalone software for Motorola phones firmware upgrade and setup (MS Visual C++). Software and data files protection is based on smart-cards www.smart-clip.com - SmartMoto - a tool that performs mobile firmware upgrade and service operations by the use of the external smart-clip device (MS Visual C++). –°opy protection system based on smart-cards, integration of the StarForce copy protection in the executable. Abonent - an accounting package for city network of water supply that determines water distribution and payment (starting with Borland Pascal, TurboVision and ending with Firebird SQL database and network client software in Borland Delphi at present) ReadIt - a Windows 9x integrated program that reads aloud user interface elements and events to visually impaired people (MS Visual C++) System tools for Windows 9x/NT - system/driver function call monitors (MS Visual C++) Area of Expertise: Algorithms design and implementation Creation of components and controls, COM / ActiveX Hardware I/O (USB, COM, LPT), sockets, network communication protocols Cryptography, software copy protection, smart-cards (java-cards) Software: Datarescue Interactive Disassembler Pro (IDA) WinDbg Macrovision InstallShield less

Hey , here are some offline freelancers

Hey , here are some offline freelancers matching ""