Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

The core software component of a financial exchange (centralized or decentralized) responsible for receiving, validating, and matching buy and sell orders according to a predefined order matching…...

Read More

The process of directing a client's trade order to a specific execution venue (e.g., an exchange, a market maker, or a dark pool) to achieve the best possible outcome, often based on factors like…...

Read More

A valid block that is not part of the main blockchain because a competing block at the same height was accepted by the network majority. Orphan blocks (also called stale blocks) represent alternative…...

Read More

The percentage of valid blocks that are mined but ultimately not included in the longest canonical blockchain, instead becoming orphaned (stale) blocks that represent wasted mining effort. Orphan…...

Read More

A family of provably secure proof-of-stake consensus protocols that power the Cardano blockchain. Ouroboros was the first proof-of-stake protocol to be developed through peer-reviewed research,…...

Read More

A security and administrative approach where blockchain node configuration, monitoring, and maintenance occurs through separate communication channels isolated from the primary blockchain network.…...

Read More

A language (BIP-380) for describing sets of scriptPubKeys (addresses) in wallets, enabling precise key and script management....

Read More

A risk management practice in decentralized finance where borrowers must deposit assets worth significantly more than the value of their loan, creating a security buffer against market volatility.…...

Read More

A specialized trading service that facilitates large cryptocurrency transactions directly between parties outside of conventional exchange order books. OTC desks enable high-volume trades with…...

Read More

A standardized awareness document identifying the most critical security vulnerabilities in web applications, adapted for blockchain and smart contract development. The OWASP Top 10 for blockchain…...

Read More

A Bitcoin privacy technique where the recipient of a payment contributes their own inputs to the transaction, breaking the common assumption in blockchain analysis that all inputs come from the same…...

Read More

Short for 'peer-to-peer network,' a distributed computer system where participants (peers) interact directly with each other without requiring central servers or intermediaries. In blockchain…...

Read More

The process of adding extra data to a message to ensure it reaches a required length or structure for cryptographic operations. Padding is essential for block ciphers and various hash functions that…...

Read More

A branch of cryptography that uses a bilinear map (a pairing) on elliptic curve groups (or other suitable groups) to enable advanced cryptographic schemes. Pairings allow for three-party Diffie-…...

Read More

A specialized type of decentralized identifier (DID) created for exclusive use between exactly two parties in a digital relationship, enhancing privacy by preventing correlation across different…...

Read More

A simulated trading practice that allows users to test cryptocurrency trading strategies using virtual funds without risking real money. Paper trading platforms replicate actual market conditions,…...

Read More

A physical printout of a public address and its corresponding private key (often as QR codes), allowing cold storage of crypto assets....

Read More

An application-specific blockchain that connects to and runs in parallel with a central relay chain, leveraging the shared security and interoperability of the Polkadot ecosystem. Parachains maintain…...

Read More

Nodes on a Polkadot or Kusama relay chain that collect parachain transactions, produce candidate blocks, and submit them to validators for inclusion in the shared relay chain....

Read More

An insurance model where payouts are triggered automatically by predefined parameters (e.g., weather data, flight delay) rather than assessed losses, often using oracles to verify the trigger event....

Read More

A private key in a hierarchical deterministic wallet from which child keys are mathematically derived. Parent keys combine with chain codes and indices to generate deterministic children, creating a…...

Read More

PSBT: a standardized format (BIP-174) for Bitcoin transactions that allows multiple parties or devices to add signatures in sequence....

Read More

Rewards—such as tokens, fees, or governance rights—offered to network participants (validators, collators, stakers) to encourage active contribution to protocol security and decentralization....

Read More

A modern, phishing-resistant credential based on FIDO standards, using public-key cryptography managed by the platform (e.g., OS or browser)....

Read More

A sequence of words (typically 12, 18, or 24) that serves as a human-readable representation of the cryptographic seed used to generate a hierarchical deterministic wallet's private keys. This…...

Read More

A widely used key derivation function designed to produce a cryptographic key from a password or passphrase. PBKDF2 applies a pseudorandom function, such as HMAC, to the input password along with a…...

Read More

Securely storing passwords by hashing them with a cryptographic hash function—often with salt and pepper—to prevent recovery of plaintext passwords in case of database compromise....

Read More

A software application designed to securely store and manage passwords, including those used to encrypt software wallets or to access cryptocurrency exchange accounts. It helps users create strong,…...

Read More

The process of acquiring, testing, and deploying software updates—patches—to fix vulnerabilities, improve performance, and add features in blockchain nodes and related infrastructure....

Read More

A family of consensus algorithms for state machine replication that guarantees safety under asynchronous networks with crash faults....

Read More

A smart contract or service that sponsors gas fees for users—often in meta‑transaction systems—by paying transaction fees on behalf of users based on predefined policies....

Read More

A specialized paymaster that sponsors gas for Non‑Fungible Financial Flows (NFFs), enabling fee‑less interactions with complex financial smart contracts for users....

Read More

A Bitcoin protocol (BIP‑47) enabling reusable, privacy‑preserving payment codes that allow payers to derive unique one‑time addresses for recipients without on‑chain address reuse....

Read More

Techniques—such as CoinJoin, tumblers, payment channels, and privacy-preserving cryptocurrencies—used to obscure transaction origins, amounts, and flows to enhance financial privacy....

Read More

An entity that facilitates electronic payments between merchants and customers, offering APIs, wallets, and compliance services for cryptocurrencies or fiat on‑ramps/off‑ramps....

Read More

A token primarily used as a medium of exchange to purchase goods or services, with a focus on transferability and liquidity....

Read More

A settlement mechanism ensuring that two linked payments—typically in foreign exchange or cross‑chain transfers—are settled simultaneously, eliminating principal risk....

Read More

A mining pool reward distribution method that allocates block rewards based on a miner's contribution of shares (partial solutions) over a recent window of time or share submissions, rather than…...

Read More

A mining pool reward distribution method that pays participants a fixed amount for each valid share (partial solution) they submit, regardless of whether the pool successfully mines a block. Pay-Per-…...

Read More

Abbreviation for Password-Based Key Derivation Function 2. A standard function for deriving cryptographic keys from passwords....

Read More

A Decentralized Identifier (DID) method enabling direct peer-to-peer DID exchanges without a global ledger, storing DID documents locally and exchanging via secure messaging....

Read More

A systematic evaluation of code, research, or protocols by independent experts to identify vulnerabilities, ensure correctness, and validate design before deployment....

Read More

A distributed computer architecture where participants (peers) communicate and share resources directly with each other without requiring central servers or intermediaries. In blockchain systems,…...

Read More

A blockchain or parachain configured to maintain a fixed exchange rate (peg) of an asset—such as a stablecoin or bridged token—via mechanisms like collateral pools, arbitrage incentives, or…...

Read More

The aspect of User Experience (UX) design focused on ensuring a decentralized application (dApp) or blockchain-related service feels fast, responsive, and efficient to the end-user, even when dealing…...

Read More

A blockchain network where participation is restricted to identified and approved entities, with access controls governing who can read the chain data, submit transactions, or participate in the…...

Read More

A decentralized application (dApp) where access to some or all of its functionalities is restricted to a specific set of authorized users or entities. This contrasts with permissionless dApps, which…...

Read More

A model of blockchain or decentralized application (dApp) governance where the ability to participate in decision-making processes (e.g., proposing changes, voting) is restricted to a select group of…...

Read More

Oracle systems that restrict who can provide data or operate oracle nodes to a pre-approved, vetted set of entities. This contrasts with permissionless oracles where anyone can potentially…...

Read More

A blockchain network that allows anyone to participate without requiring approval from any authority, enabling users to read the blockchain, submit transactions, run nodes, and participate in the…...

Read More