Search our executive blockchain insights and services.
…Cryptographic Hash Function A succinct definition of Cryptographic Hash Function Cryptographic Hash FunctionLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC HASH FUNCTIONCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic Hash FunctionA cryptographic hash function is an algorithm with a repeatable sequence of specific actions. This sequence is used to transform a variable-length arbitrary data string into a fixed-length format called a hash.For …
Learn MoreHash A succinct definition of Hash HashLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYHASHCopy linkShare on TwitterShare on FacebookShare on LinkedinHashIn the context of blockchain, a hash is the result of a cryptographic function that takes an input (or message) and produces a fixed-size string of characters, which is typically a hexadecimal number. The output, known as the hash value or hash digest, is unique to the specific input data. Even a small change in the input data …
Learn MoreHashing A succinct definition of Hashing HashingLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYHASHINGCopy linkShare on TwitterShare on FacebookShare on LinkedinHashingA hashing algorithm on a blockchain takes an infinite number of bits, puts them through calculations, then outputs a fixed number of bits. No matter the length of the input data, the output is always rectified at a fixed length.Hashing helps to prevent major issues in the cryptocurrency industry, including double…
Cryptographic Key A succinct definition of Cryptographic Key Cryptographic KeyLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC KEYCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic KeyA cryptographic key is a series of symbols used in an algorithm to encrypt or decrypt text. It is a crucial component of cryptographic systems and used to transform plaintext into ciphertext, or vice versa.Cryptographic keys are also employed to digitally sign and…
Learn MoreCryptographic Proof A succinct definition of Cryptographic Proof Cryptographic ProofLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYCRYPTOGRAPHIC PROOFCopy linkShare on TwitterShare on FacebookShare on LinkedinCryptographic ProofCryptographic proof refers to the use of cryptographic techniques to provide evidence or verification of the authenticity, integrity, and validity of data or transactions. In the context of cryptocurrencies and blockchain technology, cryptographic proofs…
Learn More…A lender requires collateral in order to reduce the risk of a borrower not paying them back.Full definitionCollateralisationCollateralisation refers to the practise of using one asset as insurance in order to borrow another asset or secure a loan.Full definitionCollection ValueCollection Value is the aggregated monetary value of all the NFTs in a collection.Full definitionComposabilityComposability is combining or linking different decentralised finance (DeFi) protocols and applications.Full def…
Learn MoreWhat Is Crypto Mining? Mining used to be about precious metals, but it has acquired a new meaning. In this article, learn about crypto mining and how it works. What Is Crypto Mining?Level UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYBlockchain16 Dec 2022|INTERMEDIATE|7 MIN READWhat Is Crypto Mining?Mining used to be about precious metals, but it has acquired a new meaning. In this article, learn about crypto mining and how it works. Key Takeaways: Mining, in the crypto lexicon,…
Learn More…Keccak offers many benefits, such as efficient performance and good resistance to attacks. RIPEMD RIPEMD is a family of cryptographic hash functions that includes RIPEMD, RIPEMD-128, and RIPEMD-160. There also exist 256- and 320-bit versions of this algorithm. RIPEMD-160 is an improved version and the most widely used version in the family. Final Words: Applying Cryptography in Practise Cryptography has a surprisingly long history, but one with seemingly endless possibilities for future usage. T…
Learn More…Keccak offers many benefits, such as efficient performance and good resistance to attacks. RIPEMD RIPEMD is a family of cryptographic hash functions that includes RIPEMD, RIPEMD-128, and RIPEMD-160. There also exist 256- and 320-bit versions of this algorithm. RIPEMD-160 is an improved version and the most widely used version in the family. Final Words: Applying Cryptography in Practise Cryptography has a surprisingly long history, but one with seemingly endless possibilities for future usage. T…
Learn More…Keccak offers many benefits, such as efficient performance and good resistance to attacks. RIPEMD RIPEMD is a family of cryptographic hash functions that includes RIPEMD, RIPEMD-128, and RIPEMD-160. There also exist 256- and 320-bit versions of this algorithm. RIPEMD-160 is an improved version and the most widely used version in the family. Final Words: Applying Cryptography in Practise Cryptography has a surprisingly long history, but one with seemingly endless possibilities for future usage. T…
Learn More