A group of authorized nodes or signers in cross‑chain protocols (e.g., Wormhole) responsible for attesting and signing messages to ensure secure message delivery across chains....
Read MoreA trusted party (address or device) authorized to approve social recovery operations for a wallet....
Read MoreUI features in blockchain explorers that suggest relevant pages, filters, and data views based on user context and query history, improving discoverability and reducing friction....
Read MoreA local Ethereum network emulator built into the Hardhat development framework, providing fast block mining, forking mainnet state, and advanced debugging features....
Read MoreA tamper‑resistant hardware device designed to generate, store, and manage cryptographic keys with enforced security policies....
Read MoreA tamper‑resistant hardware device that securely generates, stores, and manages cryptographic keys, ensuring that private keys never leave the secure boundary....
Read MoreA physical device that securely stores private keys offline and signs transactions without exposing keys to internet‑connected systems....
Read MoreA specific type of Message Authentication Code (MAC) that uses a cryptographic hash function (like SHA-256) in combination with a secret cryptographic key....
Read MoreA hardware or software component optimized to compute cryptographic hash functions (e.g., SHA‑256, Keccak‑256) at high throughput, commonly used in mining rigs and blockchain nodes....
Read MoreA mathematical algorithm that transforms input data of arbitrary size into a fixed-size output (hash value or digest) in a way that is deterministic, efficient, and practically irreversible. Hash…...
Read MoreA smart contract that locks funds until a cryptographic preimage is revealed or a timeout elapses, enabling trustless atomic swaps and payment channels....
Read MoreA distributed ledger platform that uses the hashgraph consensus algorithm to provide fast, fair, and secure transactions without the energy consumption of proof-of-work blockchains. Hedera Hashgraph…...
Read MoreA scheme enabling on-chain transfer of wallet access to designated heirs upon proof of owner’s death or inactivity....
Read MoreA package format for Kubernetes applications, defining a set of YAML templates and default configuration values to deploy and manage complex services as a single release....
Read MoreThe settlement risk arising when one party pays out funds in a cross‑border transaction before receiving the corresponding funds, named after the 1974 Herstatt Bank failure....
Read MoreAn ecosystem of interconnected blockchains with different architectures, consensus mechanisms, and virtual machines, bridged to enable asset and message interoperability....
Read MoreA type of order in trading systems where size and/or price parameters are concealed from the public order book to prevent market impact or detection by other traders....
Read MoreA type of cryptocurrency wallet that can generate a tree-like structure of key pairs (private and public keys) from a single master seed. This allows users to manage multiple accounts and addresses…...
Read MoreAlgorithmic trading strategy that executes a large number of orders at very high speeds, often leveraging low‑latency connections and co‑location to capitalize on minute price discrepancies....
Read MoreAn on‑chain metric that groups UTXOs by age (time since last spend) and visualizes the distribution as “waves,” indicating how long coins remain dormant before moving....
Read MoreAn integrated governance approach that considers technical, economic, legal, and social factors to manage a blockchain ecosystem as an interdependent whole....
Read MoreA set of interconnected blockchains that share the same virtual machine, consensus mechanism, and transaction format, enabling seamless interoperability....
Read MoreA cryptographic technique that allows computations to be performed on encrypted data without decrypting it first. The results of operations on encrypted data, when decrypted, match the results of the…...
Read MoreA hybrid custody model combining a ‘hot’ wallet for daily transactions and a ‘cold’ wallet for long‑term storage, enabling both convenience and security....
Read MoreAn urgent code update applied directly to a production smart contract or service to address critical bugs or vulnerabilities without a full release cycle....
Read MoreA Byzantine Fault Tolerant (BFT) consensus protocol designed for blockchain systems that achieves high throughput, scalability, and security through a leader-based approach with linear message…...
Read MoreAny wallet connected to the internet (software, web, or mobile) that stores private keys online, enabling quick transactions but increasing exposure to cyber‑threats....
Read MoreA Polkadot/Substrate mechanism enabling message passing between parachains via the relay chain, routing messages horizontally across the network....
Read MoreA blockchain architecture where a central chain (the hub) connects multiple specialized chains (the spokes), facilitating interoperability and shared services while allowing each spoke to maintain…...
Read MoreAliases that map complex cryptographic addresses to memorable names (e.g., ENS, Unstoppable Domains), improving usability and reducing errors....
Read MoreAn automated market maker design that combines features of constant‑function AMMs and order‑book matching to improve price efficiency and reduce impermanent loss....
Read MoreA blockchain that combines elements of both public (permissionless) and private (permissioned) blockchains. Hybrid blockchains aim to offer controlled access and privacy for certain data or…...
Read MoreA consensus mechanism that combines elements from two or more different consensus algorithms to leverage their respective strengths and mitigate their weaknesses. This approach aims to achieve a…...
Read MoreAn oracle design combining decentralized on‑chain data aggregation with centralized high‑frequency feeds to balance security, latency, and cost....
Read MoreLayer‑2 scaling solutions that combine optimistic and ZK rollup techniques to leverage benefits of both: fast deposits and low-cost proofs with fraud‑proof security....
Read More