A networking or protocol component that directs blockchain transactions and messages across nodes or between different chains....
Read MoreThe complete set of data representing all accounts, balances, smart contracts, and variables at a specific block height in a blockchain. State represents the current condition of the blockchain…...
Read MoreThe validation of a block and its inclusion in the blockchain, with each subsequent block built on top of it representing an additional confirmation that strengthens its permanence and security…...
Read MoreA web-based tool or application that allows users to search and visualize data from a blockchain, including blocks, transactions, addresses, and other network statistics. Block explorers serve as the…...
Read MoreThe number of blocks connected in the blockchain before a specific block. It represents the position of a block in the blockchain measured from the genesis block (block height 0)....
Read MoreA distributed ledger architecture where each account maintains its own blockchain (account-chain), enabling asynchronous updates and eliminating the need for global consensus on all transactions.…...
Read MoreThe continuous measurement of how quickly and reliably new blocks spread across a blockchain’s peer‑to‑peer network....
Read MoreThe incentive—usually in native cryptocurrency—granted to the miner or validator who successfully produces and appends a new block to the blockchain....
Read MoreA denial‑of‑service tactic where an attacker fills blocks with spam or low‑value transactions to bloat block size, increase fees, and slow network processing....
Read MoreThe amount of newly created cryptocurrency that is awarded to the miner or validator who successfully creates a new valid block and adds it to the blockchain. This subsidy is a key incentive for…...
Read MoreThe statistical variability in the time intervals between successive blocks, influenced by consensus randomness and network factors....
Read MoreA subversive mining strategy where a miner or pool member finds a valid block but withholds it from the network or pool to harm others’ revenue....
Read MoreA digital signature scheme based on bilinear pairings on elliptic curves, named after its creators Boneh, Lynn, and Shacham. BLS signatures enable efficient signature aggregation, threshold signing,…...
Read MoreA mathematical formula implemented in a smart contract that algorithmically determines the price of a token based on its circulating supply. As the supply increases (tokens are bought/minted), the…...
Read MoreA small piece of firmware that initializes hardware components and loads an operating system or hypervisor into memory upon system start. It serves as the first code executed after power‑on or reset....
Read MoreSmart‑contract systems that allow users to deposit assets as collateral and borrow other tokens against that collateral. They automate interest rates and liquidation processes without intermediaries....
Read MoreA wallet where the private key is derived from a memorized passphrase, without storing any seed or key material physically....
Read MoreA UI pattern showing the user’s path within a multi‑layered application or website, allowing easy back‑tracking and context awareness. Commonly displayed as a horizontal list of links....
Read MoreA security assessment focused on cross‑chain bridge smart contracts, relayers, and off‑chain components to ensure safe asset transfers between blockchains....
Read MoreCommunication paths between blockchains or layer‑2 networks that carry messages and transactions, often implemented via state channels, payment channels, or messaging protocols....
Read MoreThe process of incorporating assets transferred via a bridge into a destination chain’s ecosystem, including wallets, dApps, and liquidity pools....
Read MoreCollateral assets locked on an origin chain that back the issuance of corresponding tokens on a destination chain. It secures cross‑chain borrowing or leveraged positions....
Read MoreA non‑fungible token that represents ownership of a unique asset on one chain but is usable on another chain via a bridging mechanism....
Read MoreFinancial products that provide coverage against losses arising from cross‑chain bridge hacks, smart contract bugs, or mismanagement of locked assets....
Read MoreA smart contract or off‑chain service that selects the optimal path and mechanism for transferring assets across multiple bridges or chains....
Read MoreThe set of assumptions, threat vectors, and defense mechanisms that underpin the safety of a cross‑chain bridge....
Read MoreAn economic penalty system that confiscates a misbehaving validator’s or relayer’s bond if they produce fraudulent or malicious cross‑chain messages....
Read MoreA set of smart contracts and off‑chain components that enable transfer of value and data between distinct blockchain networks....
Read MoreA type of Web3 wallet that operates as an extension within a web browser (like Chrome, Firefox, or Brave). It allows users to manage their crypto assets and interact seamlessly with decentralized…...
Read MoreBSIMM is a descriptive software security model based on real-world data from various organizations, which helps entities understand, measure, and improve their software security initiatives. It…...
Read MoreA bug bounty platform is an online service or marketplace that connects organizations with ethical hackers (security researchers) to identify and report vulnerabilities in the organizations' software…...
Read MoreA bull market is a financial market condition characterized by a sustained period of rising asset prices, typically accompanied by investor optimism, strong confidence, and expectations of continued…...
Read MoreA burn-in test is a process where a new component or system, typically electronic or mechanical, is operated continuously under normal or accelerated conditions for a period to detect early failures…...
Read MoreThe capability of a distributed system to reach consensus and continue operating correctly even when some nodes fail or act maliciously. Byzantine Fault Tolerance (BFT) algorithms ensure network…...
Read MoreA caching layer is a high-speed data storage layer positioned between applications and a primary data store (like a database or a blockchain node's full state). It stores frequently accessed data…...
Read MoreA candlestick chart is a style of financial chart used to describe price movements of a security, derivative, or cryptocurrency over a specific time period. Each "candlestick" typically shows the…...
Read MoreCapital efficiency refers to how effectively a business, protocol, or investment uses its capital (financial resources) to generate profits, returns, or achieve its objectives. High capital…...
Read MoreCarbon credits are tradeable certificates or permits that represent the right to emit one metric ton of carbon dioxide or equivalent greenhouse gases. In the blockchain context, carbon credits are…...
Read MoreCertificate Authorities (CAs) are trusted entities in public key infrastructure (PKI) that issue and manage digital certificates. These certificates bind a public key to an identity (e.g., a person,…...
Read MoreThe California Consumer Privacy Act (CCPA) is a state-wide data privacy law in California, USA, that grants consumers more control over the personal information that businesses collect about them. It…...
Read More