Alexander Suvorov
Independent Researcher | Author of Pointer-Based Security & Local Data Regeneration Paradigms
Independent Researcher | Author of Pointer-Based Security & Local Data Regeneration Paradigms
Independent Researcher focused on fundamental computer science and information theory. Author of groundbreaking paradigms including Pointer-Based Security and Local Data Regeneration.
My work challenges conventional approaches to digital security and information transmission, proposing architectural shifts that eliminate vulnerable data existence and redefine communication as synchronous state discovery.
Author of published paradigms: The Pointer-Based Security Paradigm and The Local Data Regeneration Paradigm
Architectural Shift from Data Protection to Data Non-Existence
A fundamental rethinking of digital security architecture that eliminates vulnerable data existence rather than protecting it through conventional encryption.
@misc{suvorov_2025_17204738,
author = {Suvorov, Alexander},
title = {The Pointer-Based Security Paradigm: Architectural
Shift from Data Protection to Data Non-Existence},
month = sep,
year = 2025,
publisher = {Zenodo},
doi = {10.5281/zenodo.17204738},
url = {https://doi.org/10.5281/zenodo.17204738},
}
Ontological Shift from Data Transmission to Synchronous State Discovery
Fundamental theoretical work proposing an alternative to classical information transmission, where data is regenerated locally through synchronized computation.
@misc{suvorov_2025_17264327,
author = {Suvorov, Alexander},
title = {The Local Data Regeneration Paradigm: Ontological
Shift from Data Transmission to Synchronous State
Discovery},
month = oct,
year = 2025,
publisher = {Zenodo},
doi = {10.5281/zenodo.17264327},
url = {https://doi.org/10.5281/zenodo.17264327},
}
Practical Implementation of Security & Regeneration Paradigms
A research prototype demonstrating the practical feasibility of both paradigms through deterministic architecture with O(1) state access and mathematical verification.
@misc{suvorov_2025_17383447,
author = {Suvorov, Alexander},
title = {Deterministic Game Engine: Practical
Implementation of Pointer-Based Security and Local
Data Regeneration Paradigms},
month = oct,
year = 2025,
publisher = {Zenodo},
doi = {10.5281/zenodo.17383447},
url = {https://doi.org/10.5281/zenodo.17383447},
}
Architectural Security Transformation
Conceptual shift from data protection to data non-existence
Three fundamental transformations in security architecture
Proof-of-concept confirming paradigm feasibility
Information Theory Transformation
Reconceptualizing data as discoverable state
Three postulates of local data regeneration
Proof-of-concept confirming paradigm feasibility
Practical Implementation
Theoretical foundation for data non-existence
Ontological shift from transmission to discovery
Experimental validation through deterministic engine
Digital Security Architecture
Data Transmission Alternatives
For research collaboration, peer review, or academic discussion of security paradigms and information theory.