Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Abbreviation that, in the blockchain staking context, typically stands for Staking-as-a-Service. A third-party service that manages staking operations for users....

Read More

SafePal is a cryptocurrency wallet brand that provides a suite of solutions for managing and securing digital assets, including hardware (cold storage) wallets, software (mobile app) wallets, and…...

Read More

In blockchain development, particularly within the context of smart contracts interacting with token standards like ERC-20, ERC-721, and ERC-1155, "safe transfer" refers to the use of specific…...

Read More

Abbreviation for Simple Agreement for Future Tokens, a contractual instrument for compliant pre‑token sale fundraising....

Read More

A random string of data that is added to an input (like a password) before it is hashed. Salts are used to prevent pre-computation attacks such as rainbow table attacks, ensuring that identical…...

Read More

SAML (Security Assertion Markup Language) is an open standard, XML-based framework primarily used for exchanging authentication and authorization data between different parties, specifically between…...

Read More

A strategy where an attacker observes a pending transaction in the mempool, places a buy order before it and a sell order after it, profiting from the price movement caused by the victim’s trade....

Read More

The smallest unit of Bitcoin, equal to 0.00000001 BTC (one hundred millionth of a bitcoin). Named after Bitcoin's pseudonymous creator, Satoshi Nakamoto, this denomination enables precise…...

Read More

The capacity of a blockchain to handle increasing transaction volume, user activity, and data growth without compromising performance or security....

Read More

In the context of Elliptic Curve Cryptography (ECC), scalar multiplication is the operation of repeatedly 'adding' an elliptic curve point to itself a specified number of times (the scalar). It is a…...

Read More

A digital signature scheme known for its simplicity, efficiency, and support for native multi-signature aggregation. Schnorr signatures provide a mathematical proof that the signer knows the private…...

Read More

SCP

SCP is the acronym for the Stellar Consensus Protocol, a Byzantine agreement protocol that allows decentralized, leaderless networks to reach consensus efficiently without requiring complete trust…...

Read More

A password-based key derivation function (KDF) designed by Colin Percival. Scrypt is intentionally computationally and memory intensive to make large-scale custom hardware attacks (like those using…...

Read More

A software development kit providing libraries, tools, and APIs to interact with blockchain networks, smart contracts, and wallets in web or mobile applications....

Read More

A property of cryptographic hash functions meaning that given an input message (m1), it is computationally infeasible to find a *different* input message (m2) that produces the same hash output as…...

Read More

A specific elliptic curve used in cryptography, defined by the Standards for Efficient Cryptography Group. Secp256k1 is most notably used in Bitcoin, Ethereum, and many other cryptocurrencies for…...

Read More

A set of best practices and guidelines that developers follow to write code resistant to common security vulnerabilities....

Read More

A framework integrating security practices throughout every phase of software development, from requirements to maintenance....

Read More

A tamper-resistant hardware component designed to securely store cryptographic keys and perform sensitive operations in isolation....

Read More

A specialized, tamper-resistant microcontroller chip embedded within some hardware wallets, designed to securely store cryptographic keys (like private keys) and perform cryptographic operations in…...

Read More

Privacy-preserving smart contracts executed within Trusted Execution Environments (TEEs), encrypting inputs, outputs, and state to protect confidentiality....

Read More

Methods and technologies for protecting private keys against unauthorized access, theft, or loss....

Read More

A cryptographic technique that enables multiple parties to jointly compute a function over their inputs while keeping those inputs private. sMPC allows collaborative computation without requiring…...

Read More

Laws and rules governing the issuance, trading, and reporting of securities on regulated exchanges to protect market integrity and investors....

Read More

The practice of loaning securities to borrowers, typically for short selling, in exchange for collateral and lending fees....

Read More

The issuance of tokenized financial securities on a blockchain, compliant with applicable regulations, representing equity, debt, or other assets....

Read More

A formal notification issued by blockchain projects, smart contract platforms, or security researchers that discloses vulnerabilities, exploits, or security incidents affecting blockchain systems.…...

Read More

A centralized visualization and monitoring interface that aggregates security-related data from multiple blockchain sources to provide real-time insights into threats, vulnerabilities, and security…...

Read More

A structured system of policies, procedures, roles, and responsibilities that guides how an organization manages security risks across its blockchain operations and assets. Security governance…...

Read More

A comprehensive system that collects, analyzes, and correlates security data from blockchain nodes, smart contracts, and supporting infrastructure to detect threats, monitor compliance, and…...

Read More

Quantifiable measurements used to assess the security posture, risk exposure, and security program effectiveness of blockchain protocols, applications, and infrastructure. Security metrics and key…...

Read More

Specialized blockchain oracles that provide smart contracts with security-related information from trusted external sources, such as vulnerability databases, threat intelligence feeds, or security…...

Read More

A comprehensive, predefined set of procedures and decision frameworks for responding to specific security incidents or vulnerabilities in blockchain systems. Security playbooks provide structured…...

Read More

The user experience design of security-related notifications, warnings, and approval requests presented to users during blockchain interactions. Security Prompt UX focuses on effectively…...

Read More

A token that represents a tradable financial asset—such as equity, debt, or profit share—and is subject to securities regulations....

Read More

A specialized trading platform that is regulated and licensed to facilitate the buying, selling, and trading of security tokens. These tokens are digital representations of ownership in real-world…...

Read More

A regulated sale of security tokens, combining blockchain issuance with compliance to securities laws, often involving accredited investors....

Read More

Educational programs and ongoing initiatives designed to inform users, employees, developers, and investors about the unique security risks, common threats, and essential best practices associated…...

Read More

A sequence of typically 12 to 24 simple words generated by a cryptocurrency wallet to back up and recover access to the wallet's funds. This phrase acts as a master key, allowing the recreation of…...

Read More

Seed Phrase Management UX (User Experience) refers to the design, interface, and interaction patterns that users encounter when generating, backing up, verifying, and potentially recovering their…...

Read More

A Bitcoin address using Segregated Witness (P2WPKH or P2WSH), encoded in Bech32 with prefix “bc1”, enabling lower fees and malleability fixes....

Read More

The profit a protocol earns from issuing new tokens, often used to fund operations or distribute to stakeholders....

Read More

In the realm of digital identity, privacy-enhancing technologies (PETs), and data management, selective disclosure is the capability for an individual (the 'prover' or 'holder') to reveal only…...

Read More

A term often used synonymously with Self-Stake, referring to the amount of a Proof-of-Stake (PoS) network's native token that a validator operator has personally staked or 'bonded' to their own…...

Read More

Practice where users retain full control over their private keys, without relying on third‑party custodians....

Read More

An opcode (operation code) in some smart contract platforms (notably Ethereum) that allows a contract to remove its own code and storage from the blockchain state, sending any remaining Ether in its…...

Read More

A contract with code that automatically enforces and executes terms when predefined conditions are met, without human intervention....

Read More

A malicious mining strategy in Proof-of-Work (PoW) blockchains where a miner or a group of colluding miners find a new block but deliberately withhold it from the rest of the network. They continue…...

Read More

A type of digital wallet that allows individuals to create, own, and control their digital identity and its associated data (like verifiable credentials) without relying on traditional centralized…...

Read More

A digital wallet that empowers individuals to create, own, manage, and control their digital identity information—including unique Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs)—…...

Read More