The process of creating and securely storing a copy of critical cryptographic keys, such as private keys or seed phrases, to prevent irreversible loss of access to cryptocurrency funds or digital…...
Read MoreThe cryptographic process of generating new keys from existing key material using deterministic algorithms. In cryptocurrency contexts, key derivation enables the creation of hierarchical wallet…...
Read MoreA cryptographic algorithm that derives one or more secret keys from a master key or a password using a pseudorandom function. KDFs are often used to stretch keys, making them more resistant to brute-…...
Read MoreA cryptographic method by which two or more parties can securely establish shared secret keys over an insecure communication channel, enabling them to encrypt subsequent messages....
Read MoreThe process of creating cryptographic keys used for encryption, digital signatures, and other security operations in blockchain systems. Key generation produces the public and private key pairs that…...
Read MoreThe set of practices, policies, and technologies used to generate, store, distribute, use, archive, and revoke cryptographic keys. In the context of blockchain, it primarily refers to the secure…...
Read MoreA systematic review of processes, controls, and technologies used to generate, store, rotate, and retire cryptographic keys to ensure they meet security and compliance requirements....
Read MoreA managed service for creating, storing, rotating, and controlling access to cryptographic keys used to encrypt data, sign transactions, and secure communications....
Read MoreUser interface and experience patterns for generating, storing, backing up, and recovering cryptographic keys in blockchain applications, aiming to reduce user errors and improve security....
Read MoreMechanisms enabling users to regain access to their cryptographic keys or accounts after loss, including social recovery, Shamir’s Secret Sharing, custodial backups, and multi‑signature schemes....
Read MoreThe practice of periodically replacing old cryptographic keys with new ones. This proactive security measure limits the amount of data protected by a single key and reduces the potential damage if a…...
Read MoreSplitting a private key into multiple shares using secret sharing (e.g., Shamir’s) so that only a threshold of shares can reconstruct the key....
Read MoreA cryptographic method where a private key is divided into multiple parts, called shares or shards. These shares are distributed among different parties or stored in separate locations. A certain…...
Read MoreAn encrypted digital file that stores a cryptocurrency private key, protected by a user-created password. The keystore file combines the security of encryption with the convenience of password-based…...
Read MoreA hardware device that allows a user to control multiple computers using a single keyboard, video monitor, and mouse, often used in server operations to manage blockchain nodes....
Read MoreKate‑Zaverucha‑Goldberg polynomial commitments: a cryptographic scheme that allows one to commit to a polynomial and later open it at any point with a short proof, used for data availability and…...
Read MoreA non‑fungible token representing ownership of a parcel of virtual land in a metaverse or blockchain‑based world, often granting rights to build, monetize, or govern that space....
Read MoreA service‑level agreement that guarantees a maximum end‑to‑end delay for API responses, transaction confirmations, or data feeds, with defined remedies if latency targets are missed....
Read MoreA type of public-key cryptography that uses mathematical structures called lattices. It is a leading candidate for post-quantum cryptography (PQC) because the underlying hard problems are believed to…...
Read MoreA platform that hosts and facilitates token sales—including ICOs, IEOs, IDOs, and IFOs—providing fundraising, vetting, and distribution infrastructure....
Read MoreA mechanism where users stake a platform’s native token to earn allocations in upcoming token sales or new token emissions....
Read MoreThe native cryptocurrency or token of a base blockchain protocol, known as a Layer 1 blockchain. These tokens are used for core network functions such as paying transaction fees (gas) and…...
Read MoreA token specific to a Layer 2 scaling solution or protocol built on top of a Layer 1 blockchain. These tokens typically have utility within the Layer 2 ecosystem, such as for paying fees on the L2,…...
Read MoreA technique used in NFT marketplaces that allows users to create and sign a sell order without immediately committing it to the blockchain. The transaction only gets processed and recorded on-chain…...
Read MoreA gas-efficient approach to NFT creation where the token metadata is prepared and cryptographically signed by the creator, but the actual on-chain minting process is deferred until the moment of…...
Read MoreA technique used in NFT collections where the actual visual content and attributes of tokens are initially hidden and only revealed after the mint has completed. Lazy reveal uses encrypted or…...
Read MoreA family of hardware security devices that store private keys for cryptocurrency and digital assets offline in a secure element, requiring physical confirmation for transactions. Ledger devices…...
Read MoreA original Bitcoin address format (P2PKH) starting with “1”, predating SegWit upgrades....
Read MoreA standardized 20-character alphanumeric code that uniquely identifies legal entities participating in financial transactions globally. In the blockchain context, LEIs are increasingly used to…...
Read MoreDecentralized applications built on blockchain networks that enable peer-to-pool lending and borrowing of cryptocurrencies and digital assets without traditional financial intermediaries. These…...
Read MoreA blockchain interoperability solution that uses lightweight clients to verify and relay information between different blockchain networks without requiring full node validation of the entire chain.…...
Read MoreA cryptographic technique that allows verification of blockchain transactions without downloading and processing the entire chain. Light client verification enables resource-constrained devices and…...
Read MoreA Layer 2 scaling solution for Bitcoin that enables fast, low-cost transactions through a network of payment channels. Lightning Network allows participants to conduct unlimited transactions off-…...
Read MoreA network participant that only downloads block headers rather than the entire blockchain, relying on full nodes to provide relevant transaction data when needed. Light nodes enable blockchain…...
Read MoreCryptographic algorithms specifically designed for resource-constrained environments, providing security with minimal processing power, memory, energy consumption, or bandwidth requirements.…...
Read More