Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

A thorough review of proxy-based smart contract architectures to identify vulnerabilities in upgrade mechanisms, storage layouts, and access controls....

Read More

A blockchain node that discards old block or state data while retaining the minimal information needed to validate and relay new transactions....

Read More

An EU regulation that mandates banks to open APIs for third-party providers, promoting competition, innovation, and stronger customer authentication in payment services....

Read More

The state of using a persistent identifier (like a blockchain address) that is not directly linked to one's real-world identity. Pseudonymity in blockchain allows users to maintain a consistent…...

Read More

A unique alphanumeric identifier derived from a public key through hashing algorithms that serves as a destination for sending cryptocurrency transactions on a blockchain network. Public addresses…...

Read More

A blockchain network where data is publicly visible and anyone can participate in the network activities without permission, including reading the ledger, sending transactions, and (in most cases)…...

Read More

Half of an asymmetric cryptographic key pair that can be openly shared without compromising security. The public key is used to encrypt messages or verify digital signatures, while being…...

Read More

Cryptographic systems using asymmetric key pairs (public/private) for secure communication, signing, and encryption....

Read More

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption....

Read More

A metric for data center energy efficiency calculated as the ratio of total facility energy to IT equipment energy; values closer to 1.0 indicate better efficiency....

Read More

An oracle design where smart contracts initiate requests to fetch external data on demand from off-chain services....

Read More

Coordinated manipulation tactics where actors inflate an asset’s price through false hype and then sell off at the peak, leaving other investors with losses....

Read More

A Solidity function modifier indicating the function neither reads nor writes contract state, depending only on its input parameters....

Read More

An oracle design where off-chain services proactively send or “push” data updates to smart contracts at predefined intervals or upon specific events....

Read More

Real-time alerts sent to users’ wallets or devices to inform them of transaction events, price movements, or security issues....

Read More

A DeFi strategy vault that generates yield by selling put options on an underlying asset, earning premiums while taking on downside exposure....

Read More

A fundamental principle in Euclidean geometry stating that in a right-angled triangle, the sum of the squares of the two legs equals the square of the hypotenuse....

Read More

A decentralized oracle network designed to deliver high-fidelity, low-latency financial market data to blockchain applications....

Read More

QKD

Abbreviation for Quantum Key Distribution. A method of secure key exchange based on principles of quantum mechanics....

Read More

A set of techniques and metrics to manage and guarantee performance levels—such as latency, throughput, and reliability—for networked services and applications....

Read More

A social engineering attack where malicious actors replace or tamper with legitimate QR codes to redirect users to phishing sites or deliver malware....

Read More

Design principles and techniques for creating intuitive, reliable QR code scanning experiences within applications....

Read More

A voting mechanism where participants purchase votes with credits at a cost equal to the square of the number of votes, allowing them to express the intensity of their preferences....

Read More

A custodian meeting regulatory standards (e.g., SEC Rule 206(4)-2) to hold client assets with required controls, audits, and insurance....

Read More

A field of cryptography that leverages principles of quantum mechanics to perform cryptographic tasks. Unlike Post-Quantum Cryptography (which develops classical algorithms resistant to quantum…...

Read More

A secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, with…...

Read More

An enterprise‑focused, permissioned variant of Ethereum developed by ConsenSys, offering transaction and privacy controls for consortium networks....

Read More

In cryptocurrency trading pairs, the quote currency is the second listed currency that determines the value of the base currency. It represents the asset in which the price of the base currency is…...

Read More

A leader‑based consensus algorithm for managing a replicated log, designed for understandability and practical implementation in distributed systems....

Read More

An adaptation of Redundant Array of Independent Disks (RAID) technology principles for blockchain node infrastructure that provides data redundancy, improved performance, and fault tolerance for…...

Read More

A specialized blockchain oracle that provides verifiable, unpredictable, and tamper-resistant random numbers for decentralized applications. These oracles deliver cryptographically secure random…...

Read More

A type of liquidity provision order in decentralized exchanges (particularly concentrated liquidity AMMs) where assets are only deployed within a specific price range. Range orders allow liquidity…...

Read More

Cryptographic proofs that verify a secret value lies within a specific range without revealing the actual value itself. In blockchain systems, range proofs allow verification that a transaction…...

Read More

An open-source protocol for creating and trading non-fungible tokens (NFTs) across multiple blockchains. Rarible Protocol provides the infrastructure for minting, buying, selling, and transferring…...

Read More

A numerical value assigned to non-fungible tokens (NFTs) to quantify their relative scarcity based on trait combinations and frequencies. Rarity scores provide a standardized method to compare the…...

Read More

A blockchain full node implemented on a Raspberry Pi, a small, affordable single-board computer. These low-power devices allow individuals to participate in blockchain networks at minimal hardware…...

Read More

A contract design that restricts the frequency or volume of operations per account or globally to mitigate spam and abuse....

Read More

A security and resource management mechanism that restricts the number of operations, transactions, or API calls that can be performed within a specific timeframe in blockchain systems. Rate limiting…...

Read More

A type of Non-Fungible Token (NFT) whose metadata, appearance, or properties can change dynamically in response to external events, data feeds (oracles), or interactions. These changes are typically…...

Read More

The user experience elements and design patterns that provide immediate feedback about blockchain events and transaction states to users. Real-Time Notification UX combines on-chain data monitoring…...

Read More

A blockchain-based token that represents ownership, fractional ownership, or access rights to tangible or intangible assets existing outside the digital realm. This process is known as the…...

Read More

A token whose individual balances and total supply are periodically adjusted (rebased) to achieve a target price or supply metric....

Read More

A mechanism used by some cryptocurrencies where the total supply of the token is automatically adjusted (increased or decreased) algorithmically, with the changes applied proportionally to all token…...

Read More

A Solidity function declared as `receive()` that executes only when a contract receives plain Ether with empty calldata....

Read More

A backup key or code distinct from the seed phrase, used to restore wallet access under specified recovery schemes (e.g., social recovery)....

Read More

Features programmed into smart contract wallets that allow users to regain access to their funds or control over their wallet if they lose their primary access keys (e.g., a device-specific key).…...

Read More

A list of human-readable words, typically 12 to 24 in length, that allows a user to regain access to their cryptocurrency wallet and its associated funds if their primary wallet device is lost,…...

Read More

A Non-Fungible Token (NFT) that grants its holder the right to exchange or 'redeem' it for a specific physical item, digital good, service, or exclusive experience. The redemption process typically…...

Read More

Redfish is a standard API specification for IT infrastructure management, developed by the DMTF (Distributed Management Task Force). It uses RESTful web services to provide a modern, secure, and…...

Read More

In the context of blockchain and cryptocurrency security, red teaming is a full-scope, multi-layered adversarial attack simulation. It is designed to rigorously test the security defenses, incident…...

Read More