Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

A high‑performance, open‑source RPC framework using Protocol Buffers for serializing structured data, enabling efficient, strongly typed communication between services....

Read More

A group of authorized nodes or signers in cross‑chain protocols (e.g., Wormhole) responsible for attesting and signing messages to ensure secure message delivery across chains....

Read More

A trusted party (address or device) authorized to approve social recovery operations for a wallet....

Read More

UI features in blockchain explorers that suggest relevant pages, filters, and data views based on user context and query history, improving discoverability and reducing friction....

Read More

A denomination of ether (ETH) equal to one billion (10^9) wei or 0.000000001 ETH. Gwei is the standard unit used to express gas prices in Ethereum, making transaction fee amounts more readable....

Read More

A predetermined event in cryptocurrency protocols where the rate of new token issuance is reduced by 50%, typically affecting mining or staking rewards. Halving events create predictable supply…...

Read More

A permanent divergence in a blockchain where nodes running previous versions will no longer be compatible with the new version. Hard forks require all nodes to upgrade to the latest version to stay…...

Read More

A local Ethereum network emulator built into the Hardhat development framework, providing fast block mining, forking mainnet state, and advanced debugging features....

Read More

A tamper‑resistant hardware device designed to generate, store, and manage cryptographic keys with enforced security policies....

Read More

A tamper‑resistant hardware device that securely generates, stores, and manages cryptographic keys, ensuring that private keys never leave the secure boundary....

Read More

A physical device that securely stores private keys offline and signs transactions without exposing keys to internet‑connected systems....

Read More

A fixed-length alphanumeric string that uniquely represents data of any size, generated by running that data through a cryptographic hash function. In blockchain systems, hashes are used to identify…...

Read More

A specific type of Message Authentication Code (MAC) that uses a cryptographic hash function (like SHA-256) in combination with a secret cryptographic key....

Read More

A rack‑mounted frame that holds multiple ASIC mining hash boards—circuit boards populated with hash engine chips—forming the core of a mining rig....

Read More

A hardware or software component optimized to compute cryptographic hash functions (e.g., SHA‑256, Keccak‑256) at high throughput, commonly used in mining rigs and blockchain nodes....

Read More

A mathematical algorithm that transforms input data of arbitrary size into a fixed-size output (hash value or digest) in a way that is deterministic, efficient, and practically irreversible. Hash…...

Read More

A patented distributed ledger technology that uses a gossip protocol to spread information and a virtual voting consensus mechanism based on a Directed Acyclic Graph (DAG) of events. It aims for high…...

Read More

The process of transforming data of any size into a fixed-length string using a mathematical algorithm. In blockchain contexts, hashing is used to create unique identifiers for blocks and…...

Read More

The speed at which a miner or network can compute cryptographic hash functions, typically measured in hashes per second (H/s)....

Read More

A smart contract that locks funds until a cryptographic preimage is revealed or a timeout elapses, enabling trustless atomic swaps and payment channels....

Read More

A tree data structure composed of cryptographic hashes where leaf nodes contain hashes of data blocks and non-leaf nodes contain hashes of their children. Hash trees (commonly called Merkle trees)…...

Read More

An abbreviation for Hierarchical Deterministic Wallet. It is a cryptocurrency wallet system that generates multiple key pairs (and thus addresses) from a single master seed phrase, organizing them in…...

Read More

A data visualization that displays values in a matrix or geographical layout using color gradients to indicate intensity, often used to show transaction volume, gas prices, or network activity…...

Read More

A distributed ledger platform that uses the hashgraph consensus algorithm to provide fast, fair, and secure transactions without the energy consumption of proof-of-work blockchains. Hedera Hashgraph…...

Read More

A scheme enabling on-chain transfer of wallet access to designated heirs upon proof of owner’s death or inactivity....

Read More

A package format for Kubernetes applications, defining a set of YAML templates and default configuration values to deploy and manage complex services as a single release....

Read More

The settlement risk arising when one party pays out funds in a cross‑border transaction before receiving the corresponding funds, named after the 1974 Herstatt Bank failure....

Read More

An ecosystem of interconnected blockchains with different architectures, consensus mechanisms, and virtual machines, bridged to enable asset and message interoperability....

Read More

A type of order in trading systems where size and/or price parameters are concealed from the public order book to prevent market impact or detection by other traders....

Read More

A type of cryptocurrency wallet that can generate a tree-like structure of key pairs (private and public keys) from a single master seed. This allows users to manage multiple accounts and addresses…...

Read More

Algorithmic trading strategy that executes a large number of orders at very high speeds, often leveraging low‑latency connections and co‑location to capitalize on minute price discrepancies....

Read More

Abbreviation for Hash-based Message Authentication Code. A MAC that uses a cryptographic hash function and a secret key....

Read More

A slang term originating from a misspelled forum post meaning “hold,” referring to the strategy of holding cryptocurrency assets long‑term regardless of market volatility....

Read More

An on‑chain metric that groups UTXOs by age (time since last spend) and visualizes the distribution as “waves,” indicating how long coins remain dormant before moving....

Read More

A decentralized organizational framework that distributes authority through self‑organizing teams (circles) rather than a traditional management hierarchy....

Read More

An integrated governance approach that considers technical, economic, legal, and social factors to manage a blockchain ecosystem as an interdependent whole....

Read More

A set of interconnected blockchains that share the same virtual machine, consensus mechanism, and transaction format, enabling seamless interoperability....

Read More

A cryptographic technique that allows computations to be performed on encrypted data without decrypting it first. The results of operations on encrypted data, when decrypted, match the results of the…...

Read More

A hybrid custody model combining a ‘hot’ wallet for daily transactions and a ‘cold’ wallet for long‑term storage, enabling both convenience and security....

Read More

An urgent code update applied directly to a production smart contract or service to address critical bugs or vulnerabilities without a full release cycle....

Read More

A Byzantine Fault Tolerant (BFT) consensus protocol designed for blockchain systems that achieves high throughput, scalability, and security through a leader-based approach with linear message…...

Read More

Any wallet connected to the internet (software, web, or mobile) that stores private keys online, enabling quick transactions but increasing exposure to cyber‑threats....

Read More

A Polkadot/Substrate mechanism enabling message passing between parachains via the relay chain, routing messages horizontally across the network....

Read More

A blockchain architecture where a central chain (the hub) connects multiple specialized chains (the spokes), facilitating interoperability and shared services while allowing each spoke to maintain…...

Read More

Aliases that map complex cryptographic addresses to memorable names (e.g., ENS, Unstoppable Domains), improving usability and reducing errors....

Read More

An automated market maker design that combines features of constant‑function AMMs and order‑book matching to improve price efficiency and reduce impermanent loss....

Read More

A blockchain that combines elements of both public (permissionless) and private (permissioned) blockchains. Hybrid blockchains aim to offer controlled access and privacy for certain data or…...

Read More

A consensus mechanism that combines elements from two or more different consensus algorithms to leverage their respective strengths and mitigate their weaknesses. This approach aims to achieve a…...

Read More

An oracle design combining decentralized on‑chain data aggregation with centralized high‑frequency feeds to balance security, latency, and cost....

Read More

Layer‑2 scaling solutions that combine optimistic and ZK rollup techniques to leverage benefits of both: fast deposits and low-cost proofs with fraud‑proof security....

Read More