Starcoinz logo

"cryptographic key"

Search our executive blockchain insights and services.

cryptographic key

Cryptographic Key

★★★★★

Cryptographic Key A succinct definition of Cryptographic Key Cryptographic KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic KeyA cryptographic key is a series of symbols used in an algorithm to encrypt or decrypt text. It is a crucial component of cryptographic systems and used to transform plaintext into ciphertext, or vice versa.Cryptographic keys are also employed to digitally sign and…

Learn More
products services

Cryptographic Proof

★★★★

Cryptographic Proof A succinct definition of Cryptographic Proof Cryptographic ProofLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC PROOFCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic ProofCryptographic proof refers to the use of cryptographic techniques to provide evidence or verification of the authenticity, integrity, and validity of data or transactions. In the context of cryptocurrencies and blockchain technology, cryptographic proofs…

Learn More
public key

Public Key

★★★★

…Public Key A succinct definition of Public Key Public KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPUBLIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPublic KeyA public key is a cryptographic key used to encrypt messages intended for a particular recipient. A more technical definition of a public key is a series of letters and numbers used to encrypt plaintext into ciphertext. Because of this, public keys can be freely shared, as opposed to private keys, …

Learn More
cryptographic hash

Cryptographic Hash Function

★★★★

Cryptographic Hash Function A succinct definition of Cryptographic Hash Function Cryptographic Hash FunctionLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC HASH FUNCTIONCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic Hash FunctionA cryptographic hash function is an algorithm with a repeatable sequence of specific actions. This sequence is used to transform a variable-length arbitrary data string into a fixed-length format called a hash.For …

Learn More
private key

Private Key

★★★★

Private Key A succinct definition of Private Key Private KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPRIVATE KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPrivate KeyA private key is a string of randomly generated letters and numbers used alongside an algorithm to encrypt and decrypt data. It can be in the form of a 256-character-long binary code, a QR code, a 64-digit hexadecimal code, or a mnemonic phrase. Regardless of their form, private keys are an i…

Learn More
token standard

Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and Cryptocurrency

★★★★

…A lender requires collateral in order to reduce the risk of a borrower not paying them back.Full definitionCollateralisationCollateralisation refers to the practise of using one asset as insurance in order to borrow another asset or secure a loan.Full definitionCollection ValueCollection Value is the aggregated monetary value of all the NFTs in a collection.Full definitionComposabilityComposability is combining or linking different decentralised finance (DeFi) protocols and applications.Full def…

Learn More
zk proofs

Beginner’s Guide to Zero-Knowledge Proofs

★★★★

Beginner’s Guide to Zero-Knowledge Proofs Learn how ZK proofs protect privacy in blockchain. Simple terms, key types, and real-world uses explained for beginners. Beginner’s Guide to Zero-Knowledge ProofsLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain13 Jun 2025|INTERMEDIATE|5 MIN READBeginner’s Guide to Zero-Knowledge ProofsLearn how ZK proofs protect privacy in blockchain. Simple terms, key types, and real-world uses explained for beginners.Key Takeaways Zer…

Learn More
solana polkadot

Solana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum Challengers

★★★★

Solana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum Challengers Explore the key differences in speed, functionality, and ecosystem innovation between Solana and Polkadot, two top Ethereum competitors. Solana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum ChallengersLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYAltcoins2 May 2025|BEGINNERS|7 MIN READSolana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum ChallengersE…

Learn More
decentralised identity

What Is Decentralised Identity, and How Does It Work?

★★★★

What Is Decentralised Identity, and How Does It Work? Learn about decentralised identity, and how blockchain and verifiable credentials reshape digital privacy, security, and user control in Web3. What Is Decentralised Identity, and How Does It Work?Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain6 Jun 2025|INTERMEDIATE|6 MIN READWhat Is Decentralised Identity, and How Does It Work?Learn about decentralised identity, and how blockchain and verifiable credentials resh…

Learn More
public key

Cryptography — Putting the Crypto Into Currency

★★★★

…So, in this example, we can define public key and private key as: Public Key: Starting point A, ending point EPrivate Key: Number of hops from A to E To be more general, for a given elliptic curve (as shown below), the public key is (P, G), where P is the start point and G is the end point (a special pre-defined [constant] EC point), and the private key is k (k is an integer and P = k * G). Diffie-Hellman Key Exchange Algorithm The Diffie-Hellman algorithm is used to establish a shared secret t…

Learn More