An Ethereum Improvement Proposal (EIP-2535) that standardizes a modular smart contract system allowing contracts to be upgraded incrementally and have virtually no size limit. It uses a central proxy…...
Read MoreA decentralized authentication mechanism that enables users to prove control of a Decentralized Identifier (DID) through cryptographic challenge-response protocols without relying on centralized…...
Read MoreThe entity or system that has the authority to make changes to a Decentralized Identifier (DID) Document, including updating authentication keys, service endpoints, and verification methods. DID…...
Read MoreA machine-readable document containing metadata associated with a Decentralized Identifier (DID), specifying verification methods, service endpoints, and controller information that enables…...
Read MoreA specific implementation specification that defines how Decentralized Identifiers are created, resolved, updated, and deactivated within a particular distributed system or network. DID Methods…...
Read MoreA software component that translates a Decentralized Identifier (DID) into its corresponding DID Document by implementing the resolution procedures specified by the relevant DID Method. Resolvers…...
Read MoreA mathematical framework applied to blockchain data analysis that adds calibrated noise to query results, providing provable privacy guarantees while maintaining statistical utility for legitimate…...
Read MoreA network‑wide parameter that adjusts how hard it is to find a valid proof‑of‑work hash, ensuring blocks are produced at a roughly constant rate....
Read MoreA mechanism in blockchain protocols that automatically calibrates the mining difficulty based on observed network hash rate to maintain consistent block production intervals. Difficulty adjustment…...
Read MoreAnother term for Target Hash in Proof-of-Work (PoW) mining. It refers to the specific numerical threshold that a block hash must be below for the block to be valid. The network adjusts this target to…...
Read MoreAny digitally stored value, right, or property tracked on a blockchain or distributed ledger that can be uniquely identified, owned, transferred, and verified without requiring a central authority....
Read MoreA regulated entity that holds and safeguards digital assets on behalf of clients, offering security, compliance, and insurance services....
Read MoreLaws and guidelines governing how service providers must store, secure, and manage clients’ digital assets (cryptocurrencies, tokens) to ensure consumer protection and system integrity. These…...
Read MoreA tokenized debt instrument issued on a blockchain representing a loan obligation with fixed interest and maturity, offering increased transparency, fractional ownership, and automated settlement....
Read MoreAn electronic document used to prove the ownership of a public key and verify the identity of an individual, server, or other entity. Digital certificates are issued by trusted third parties called…...
Read MoreAn ownership stake in a company or project represented by tokens on a blockchain, conferring rights such as dividends, voting, or profit share. Digital equity instruments mirror traditional shares…...
Read MoreThe property of certain digital assets that makes them provably limited in supply and resistant to duplication or counterfeiting. Blockchain technology enables digital scarcity by solving the double-…...
Read MoreA blockchain token or instrument that represents an investment contract, share, or debt—subject to securities laws—providing rights such as profit share, dividends, or governance....
Read MoreA mathematical scheme for verifying the authenticity of digital messages or documents. In blockchain systems, digital signatures prove ownership of a private key without revealing the key itself,…...
Read MoreA Federal Information Processing Standard for digital signatures that enables authentication, non-repudiation, and integrity verification of digital messages or documents. DSA uses public-key…...
Read MoreA digital replica of a physical asset, process, or system—recorded on a blockchain—to enable real‑time monitoring, simulation, and lifecycle management....
Read MoreA secure digital storage system specifically designed to protect sensitive cryptocurrency information such as private keys, seed phrases, and authentication credentials. Digital vaults employ…...
Read MoreA data structure consisting of vertices and directed edges where information flows in one direction without cycles, used in some blockchain systems as an alternative to linear chains of blocks. DAGs…...
Read MoreA storage system that combines multiple disk drives into a single logical unit for redundancy, performance, and capacity (e.g., RAID configurations)....
Read MoreOn‑chain and off‑chain processes—such as arbitration, mediation, or governance votes—designed to resolve conflicts over transactions, smart contract outcomes, or governance proposals....
Read MoreA digital system for recording transactions and related data in multiple places simultaneously. Unlike traditional databases, distributed ledgers have no central data store or administration…...
Read MoreA lightweight, portable unit of software packaging that bundles an application and its dependencies in an isolated user‑space environment, ensuring consistent execution across platforms....
Read MoreA verifiable credential binding a blockchain identity (DID or address) to a domain name, enabling trustable on‑chain proofs of domain ownership....
Read MoreThe practice of registering domain names—often similar to established brands or projects—with the intent to profit from resale or to mislead users....
Read MoreA decentralized network providing distributed denial‑of‑service (DDoS) mitigation by routing traffic through a mesh of nodes that filter and absorb attack traffic....
Read MoreA fundamental challenge in digital currency systems where the same digital token could potentially be spent more than once if there's no mechanism to prevent copying or duplication. Solving the…...
Read MoreLow‑level programs that enable operating systems to communicate with hardware devices (e.g., GPUs, network cards), facilitating blockchain node performance and connectivity....
Read MoreAn economic framework where a blockchain protocol or application utilizes two distinct but complementary tokens with different functionalities, typically separating governance or investment value…...
Read MoreA privacy attack where an adversary sends tiny amounts of cryptocurrency (dust) to many addresses, then tracks spending patterns to de‑anonymize users by linking addresses....
Read MoreA sale mechanism where the price of tokens starts high and decreases at set intervals until all tokens are sold or a reserve price is reached, encouraging price discovery and fair allocation....
Read MoreA security testing approach that examines smart contract behavior at runtime by executing transactions, fuzzing inputs, and monitoring for vulnerabilities under realistic conditions....
Read MoreNon‑fungible tokens whose metadata or visual representation can change over time or in response to external inputs, events, or on‑chain conditions....
Read MoreA programmable royalty mechanism for NFTs or digital assets where royalty rates can adjust over time or based on criteria such as resale price, volume, or holder actions....
Read MoreA dynamic trait in a Non-Fungible Token (NFT) is an attribute or characteristic of the NFT that can change over time based on external conditions, interactions, or predefined logic within its smart…...
Read MoreECC (Error-Correcting Code) memory is a type of computer data storage that can detect and correct common kinds of internal data corruption. It is primarily used in servers, workstations, and critical…...
Read MoreThe concept that blockchain users can potentially pay transaction fees or operational costs in any asset with sufficient market liquidity rather than being restricted to using only the network's…...
Read MoreEconomic exploit modeling is the process of designing and analyzing models to identify and assess potential vulnerabilities in a system (especially DeFi protocols) that arise from an attacker…...
Read MoreThe design of rewards and penalties in a token ecosystem to align participant behavior with protocol objectives....
Read MoreAn economic security model refers to the framework of incentives, disincentives, costs, and rewards designed into a system (particularly decentralized networks like blockchains or DeFi protocols) to…...
Read MoreThe economic security of oracles refers to the mechanisms and incentives designed to ensure that oracle networks provide accurate and reliable data to smart contracts, primarily by making it…...
Read MoreAn edge device is a piece of hardware that sits at the periphery ("edge") of a larger network, typically where the physical world interacts with the digital world. These devices often collect data,…...
Read More