Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Methods used to ensure that data provided to a system, such as a smart contract or blockchain node, is correct, well-formed, and within expected parameters before it is processed. This is a critical…...

Read More

A critical security flaw in blockchain applications where the source of randomness used by a smart contract is predictable, manipulable, or biased, allowing attackers to anticipate or influence…...

Read More

Specialized financial service providers that secure and manage digital assets on behalf of institutional investors, corporations, and funds using enterprise-grade security infrastructure, governance…...

Read More

Custody services tailored for institutional clients, combining advanced security, compliance, and operational integrations for large‑scale digital asset holdings....

Read More

A DeFi mechanism where users provide capital to an insurance pool or fund, which is used to cover potential losses from specific risks (e.g., smart contract exploits, stablecoin depegging). In return…...

Read More

A specialized blockchain oracle that provides smart contracts with external data needed for insurance-related operations, such as weather conditions, flight delays, crop yields, or market events.…...

Read More

A decentralized risk-sharing mechanism on blockchain where participants contribute funds to a collective reserve used to cover potential losses from specified events such as smart contract failures,…...

Read More

The legal structures, requirements, and oversight mechanisms that govern blockchain-based insurance products and providers across different jurisdictions. These frameworks address how decentralized…...

Read More

A vulnerability where arithmetic operations exceed the maximum value of a data type, wrapping around to zero or a lower value....

Read More

A vulnerability where subtracting below zero wraps the value to the maximum of the data type....

Read More

IP tokenization is the process of converting intellectual property rights—such as patents, copyrights, trademarks, and trade secrets—into digital tokens on a blockchain. These tokens can represent…...

Read More

An algorithmic system used in decentralized exchanges and cross-chain protocols that dynamically determines the optimal path for executing crypto trades across multiple liquidity sources, DEXs, or…...

Read More

A hardware-based security technology developed by Intel that creates isolated memory regions called enclaves within a computer's processor, protecting sensitive code and data from unauthorized access…...

Read More

A protocol that enables communication and asset transfers between independent blockchain networks in a secure, trustless manner using light client verification. IBC allows sovereign blockchains to…...

Read More

A cross-blockchain protocol that allows a blockchain or smart contract to securely control an account on a separate connected blockchain, enabling cross-chain transactions and contract interactions…...

Read More

A blockchain design approach that enables multiple independent blockchains to communicate, transfer assets, and share functionality while maintaining their sovereignty. Interchain architecture…...

Read More

A blockchain security model where multiple independent chains share a common validator set for consensus, allowing smaller or newer blockchains to leverage the security and validator decentralization…...

Read More

The protocols, mechanisms, and practices that enable multiple Decentralized Autonomous Organizations (DAOs) to coordinate decision-making, share resources, resolve disputes, and collaborate on…...

Read More

Protocols and frameworks that enable secure message passing and state verification between different blockchain domains, including separate layer-1 networks, subnets, shards, or sovereign rollups.…...

Read More

An open protocol for sending payments across different ledgers, designed to facilitate transfers between any two payment systems regardless of the underlying technology. Interledger Protocol (ILP)…...

Read More

A protocol suite for sending payments across different ledgers and payment networks by routing packets of value through connector nodes, enabling seamless cross‑ledger transfers without requiring a…...

Read More

A blockchain-based decentralized computing platform designed to extend the public internet with serverless cloud functionality, allowing developers to build and deploy autonomous applications…...

Read More

The foundational communications protocol of the Internet that provides an addressing and packet routing system for data transmission between devices across networks. Internet Protocol (IP)…...

Read More

A set of agreed‑upon technical specifications, data formats, and protocols that enable different blockchain networks, applications, and services to communicate, exchange assets, and share data…...

Read More

An oracle service designed to deliver the same authenticated data feed—such as price oracles or randomness—to multiple blockchain networks via standardized interfaces and proof verification…...

Read More

Layer‑2 rollup solutions architected with common messaging and state‐sharing protocols so that different rollup chains can directly interact—calling each other’s contracts and sharing liquidity—…...

Read More

A distributed, peer‑to‑peer file storage protocol that uses content addressing to uniquely identify files and enable decentralized hosting....

Read More

A protocol or system that enables different Layer 2 rollups to exchange messages, assets, and data while maintaining cryptographic verification of state validity. Inter-rollup communication allows…...

Read More

A monitoring system that analyzes network traffic, system logs, and application behavior to detect suspicious patterns or known attack signatures, issuing alerts for potential security breaches....

Read More

A security appliance or software that not only detects but also actively blocks or mitigates malicious traffic and activities in real time based on predefined rules or behavioral analysis....

Read More

A DeFi lending protocol that allows users to borrow synthetic inverse tokens—whose value moves opposite to underlying assets—enabling on‑chain short positions without centralized intermediaries....

Read More

A financial service where a company sells its accounts receivable (invoices) to a factor at a discount in exchange for immediate cash, shifting credit risk and collection efforts to the factor....

Read More

A device equipped with sensors, actuators, and network connectivity that collects and transmits data to blockchain or edge networks for recording, automation, or analytics....

Read More

IP

IP is the abbreviation for Internet Protocol, the fundamental communications protocol that provides addressing and routing for data packets across interconnected computer networks. The acronym also…...

Read More

A shorthand for the InterPlanetary File System, a P2P protocol for content‑addressed storage and sharing of files....

Read More

A content identifier (CID) in IPFS, typically a multihash encoding of a file’s cryptographic hash (SHA‑256 or similar), used to retrieve content in a content‑addressed network....

Read More

A service that holds (pins) IPFS content on dedicated nodes to guarantee availability and persistence of specified CIDs, preventing garbage collection....

Read More

Intelligent Platform Management Interface—a standardized out‑of‑band hardware management protocol that provides remote monitoring, logging, power control, and console access independent of the host…...

Read More

An international standard specifying requirements for establishing, implementing, maintaining, and improving a Business Continuity Management System (BCMS) to ensure operations continue during…...

Read More

An international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS) to protect…...

Read More

An international extension to ISO/IEC 27001 that specifies requirements and guidance for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (…...

Read More

A margin mode where each trading position has its own dedicated collateral allocation and risk is contained to that position; losses do not affect other positions’ collateral....

Read More

The rate at which new cryptocurrency tokens are created and entered into circulation over a specified time period, typically expressed as an annual percentage increase relative to existing supply.…...

Read More

A Byzantine Fault Tolerant consensus algorithm designed for permissioned blockchain networks that provides instant transaction finality and high throughput without forking. Istanbul BFT is an…...

Read More

A standardized file format that uses JavaScript Object Notation (JSON) to store an encrypted cryptocurrency private key along with the parameters needed for decryption. JSON keystores are…...

Read More

A stateless, lightweight remote procedure call protocol encoded in JSON, commonly used to interact with blockchain nodes....

Read More

Legal and regulatory challenges arising when blockchain activities cross national or regional boundaries, due to differing laws on securities, taxation, data privacy, and consumer protection....

Read More

A market data provider offering institutional‑grade historical and real‑time cryptocurrency trade, order book, and reference data via API and tick‑level feeds....

Read More

KDF

Abbreviation for Key Derivation Function. A cryptographic algorithm used to derive one or more secret keys from a secret value like a password or a master key....

Read More

A cryptographic hash function that produces a 256-bit output, serving as Ethereum's primary hashing algorithm. Keccak-256 is a variant of the Keccak algorithm, which was selected as the winner of the…...

Read More