Search our executive blockchain insights and services.
…Cryptographic Key A succinct definition of Cryptographic Key Cryptographic KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic KeyA cryptographic key is a series of symbols used in an algorithm to encrypt or decrypt text. It is a crucial component of cryptographic systems and used to transform plaintext into ciphertext, or vice versa.Cryptographic keys are also employed to digitally sign and…
Learn MoreCryptographic Proof A succinct definition of Cryptographic Proof Cryptographic ProofLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC PROOFCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic ProofCryptographic proof refers to the use of cryptographic techniques to provide evidence or verification of the authenticity, integrity, and validity of data or transactions. In the context of cryptocurrencies and blockchain technology, cryptographic proofs…
Learn More…Public Key A succinct definition of Public Key Public KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPUBLIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPublic KeyA public key is a cryptographic key used to encrypt messages intended for a particular recipient. A more technical definition of a public key is a series of letters and numbers used to encrypt plaintext into ciphertext. Because of this, public keys can be freely shared, as opposed to private keys, …
Learn MoreCryptographic Hash Function A succinct definition of Cryptographic Hash Function Cryptographic Hash FunctionLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC HASH FUNCTIONCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic Hash FunctionA cryptographic hash function is an algorithm with a repeatable sequence of specific actions. This sequence is used to transform a variable-length arbitrary data string into a fixed-length format called a hash.For …
Learn MorePrivate Key A succinct definition of Private Key Private KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYPRIVATE KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinPrivate KeyA private key is a string of randomly generated letters and numbers used alongside an algorithm to encrypt and decrypt data. It can be in the form of a 256-character-long binary code, a QR code, a 64-digit hexadecimal code, or a mnemonic phrase. Regardless of their form, private keys are an i…
Learn More…A lender requires collateral in order to reduce the risk of a borrower not paying them back.Full definitionCollateralisationCollateralisation refers to the practise of using one asset as insurance in order to borrow another asset or secure a loan.Full definitionCollection ValueCollection Value is the aggregated monetary value of all the NFTs in a collection.Full definitionComposabilityComposability is combining or linking different decentralised finance (DeFi) protocols and applications.Full def…
Learn MoreBeginner’s Guide to Zero-Knowledge Proofs Learn how ZK proofs protect privacy in blockchain. Simple terms, key types, and real-world uses explained for beginners. Beginner’s Guide to Zero-Knowledge ProofsLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain13 Jun 2025|INTERMEDIATE|5 MIN READBeginner’s Guide to Zero-Knowledge ProofsLearn how ZK proofs protect privacy in blockchain. Simple terms, key types, and real-world uses explained for beginners.Key Takeaways Zer…
Learn MoreSolana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum Challengers Explore the key differences in speed, functionality, and ecosystem innovation between Solana and Polkadot, two top Ethereum competitors. Solana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum ChallengersLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYAltcoins2 May 2025|BEGINNERS|7 MIN READSolana vs Polkadot: Comparing Speed and Functionality of Two Top Ethereum ChallengersE…
Learn MoreWhat Is Decentralised Identity, and How Does It Work? Learn about decentralised identity, and how blockchain and verifiable credentials reshape digital privacy, security, and user control in Web3. What Is Decentralised Identity, and How Does It Work?Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain6 Jun 2025|INTERMEDIATE|6 MIN READWhat Is Decentralised Identity, and How Does It Work?Learn about decentralised identity, and how blockchain and verifiable credentials resh…
Learn More…So, in this example, we can define public key and private key as: Public Key: Starting point A, ending point EPrivate Key: Number of hops from A to E To be more general, for a given elliptic curve (as shown below), the public key is (P, G), where P is the start point and G is the end point (a special pre-defined [constant] EC point), and the private key is k (k is an integer and P = k * G). Diffie-Hellman Key Exchange Algorithm The Diffie-Hellman algorithm is used to establish a shared secret t…
Learn More