As for cryptographic research:
... to whom it may concern

Dear internet Partner,

the attached files are meant not as a "paper" within the field of the
tight organized cryptographic discipline but rather as a discussion
contribution for the advancement of cryptography.
Details are presented in the following articles:

      http://www.telecypher.net/ENBytesys.pdf   (English)
      http://www.telecypher.net/DEBytesys.pdf   (deutsch)

      http://www.telecypher.net/Codingma.pdf    (English)
      http://www.telecypher.net/Codierma.pdf     (deutsch)

The herein described "CypherMatrix"  procedure is grounded on
the roots of cryptographic as used since centuries.
The method uses bytes only, simple mathematics including
MODULO calculation and number systems from on base 2
up to on base 256.

Anybody who wants to share with my thoughts may give me
an echo.

With internet greetings
Ernst Erich Schnoor
Munich (Germany)
eschnoor at multi-matrix.de

Reply via email to