The most comprehensive crypto glossary for Advanced level
The most comprehensive crypto glossary out there.
Cashscript
Language for developing smart contracts on the Bitcoin Cash (BCH) network.
Category:
Level: Advanced
Winding down
A process of returning DeFi tokens to their original form, which involves multiple platforms as well as other tokens.
Category:
Level: Advanced
Wrapping
Crypto can be wrapped for use in DeFi and DApps. Wrapping a token is necessary to make it compatible with Ethereum-based networks. The difference between a BTC and wBTC (wrapped bitcoin) is that the latter is an ERC20. If a user decides they want to unwrap their wBTC, the issuer of the wBTC will burn it and return the BTC back to the user’s wallet.
Category:
Level: Advanced
Yield curve
A simple graph that shows the interest rates on U.S. Treasury bonds over time. The U.S. Treasury updates yield curve rates daily, and investors and economists use the data to draw conclusions about the growth trajectory of the economy.
Category:
Level: Advanced
C++
One of the most popular programming languages today. C programming language extension allowing cross-platform development.
Category:
Level: Advanced
Zero basis risk swap (ZEBRA)
Also called a perfect or actual rate swap. It is a swap between the municipal government and a financial intermediary. Essentially, the municipality agrees to receive from the intermediary a floating (variable) interest rate on a specified amount of the principal. In return, the municipality pays a fixed interest rate to the financial intermediary.
Category:
Level: Advanced
Zk-Snarks
An acronym that stands for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. Zk-Snark is cryptographic proof that allows one party to prove that it has certain information without disclosing that information. This proof was made possible using a secret key generated before the transaction took place.
Category:
Level: Advanced
Bulletproofs
By using bulletproofs, cryptographic proofs can be reduced to a fraction of their current size. In the next PIVX privacy protocol, its integration will be considered.
Category:
Level: Advanced
Zk-Starks
Stands for Zero-Knowledge Scalable Transparent Argument of Knowledge. In simple terms, a zero-knowledge proof can prove something is true without having to reveal what exactly it is proving. More technically, it is a type of cryptographic proof that enables users to share validated data or perform computations with a third party without sharing data with this third party.
Category:
Level: Advanced
Boulderhash
A mining algorithm that requires 13 GB of RAM, making it nearly impossible to mine using zombie computers (botnet controlled).
Category:
Level: Advanced
BDoS (Blockchain denial of service)
A BDoS attack targets the blockchain’s consensus mechanism design. By slowing down or stopping mining rewards altogether, BDoS aims to discourage miners from the specific blockchain.
Category:
Level: Advanced
BCHD
An alternative full node Bitcoin Cash implementation written in Golang.
Category:
Level: Advanced
Attack surface
A concept in software development that considers all possible points, avenues, or vulnerabilities in a system. The attack surface of a system is an indication of its security.
Category:
Level: Advanced
Asymmetric cryptography
The process of sending a message encrypted for specific recipients in such a way that anyone can confirm the sender's authenticity, but only the intended recipient can see the contents.
Category:
Level: Advanced
Aroon Indicator
A method for identifying trends in financial markets, identifying changes and corrective retracements, and gauging their strength.
Category:
Level: Advanced