|
Algorithmic Stablecoin |
Algorithmic stablecoins are cryptocurrencies designed to achieve price stability and balance the circulating supply of the asset with demand (usually pegged to a reserve price). |
Source |
anonymity |
Anonymity |
“Anonymous” is if no one knows who you are. |
Source |
arbitrage-bots |
Arbitrage Bots |
Trading bots are computer programs that algorithmically buy and sell various cryptocurrencies at the right time with the goal of generating a profit. Arbitrage bots are a specific subset of trading bots that structure trades to take advantage of different prices for a single asset either across different trading pairs or on different trading platforms. |
Source |
|
Audits |
Generally speaking, an audit is an independent assessment of a project seen through the lens of a particular concern. Examples of these concerns include code correctness, security, compliance, economics, etc. |
Source |
amm |
Automated Market Makers |
Decentralized exchanges that implement liquidity pools of trading pairs rather than a centralized orderbook. |
Source |
|
Block Rewards |
The reward given to miners for successfully solving a cryptographic problem at each block in a Proof-of-Work blockchain system. |
Source |
|
Bonding Curves |
A linear or non-linear function that relates the price of a token algorithmically to its supply. |
Source |
bft |
Byzantine Fault Tolerance |
Byzantine Fault Tolerance is the characteristic which defines a system that tolerates the class of failures that belong to the Byzantine Generals’ Problem |
Source |
chain-reorg-attacks |
Chain Reorganization |
Chain reorganisations happen when a node on the blockchain network realizes that what it thought was the canonical chain turned out not to be. When this happens, the transactions in the latter part of its chain (i.e. the most recent transactions) are reverted and rather the transactions in the newer replacement are executed. |
Source |
consensus |
Consensus |
Consensus is a group decision-making process in which group members develop, and agree to support a particular decision (e.g. the one in the best interest of the whole or the most valid decision). |
Source |
cfmm |
Constant Function Market Maker |
Automated market makers that use a fixed formula to relate price to reserve balances. |
Source |
|
Constant Mean Markets |
A generalization of a constant product market maker which allows for more than 2 assets and where the reserves of each asset can be weighted in arbitrary other methods than simply 50/50. |
Source |
constant-product |
Constant Product Markets |
Automated market makers that use a formula of the form x*y=k where k is constant to relate price to reserve balances, e.g. Uniswap. |
Source |
|
Correct-By-Construction Casper |
CBC Casper is a family of ""correct-by-construction"" consensus protocols that share the same proof of asynchronous, Byzantine fault tolerant consensus safety. |
Source |
dao |
DAO |
Decentralized Autonomous Organization. A public and permissionless organization that is governed programmatically and is not under the control of a single entity. |
Source |
dex |
Decentralized Exchange |
A platform for exchanging asset pairs that is not under the control of a single entity and is generally implemented using a smart contract, allowing users to trade with each other or with the protocol directly without requiring a trusted third party. |
Source |
defi |
DeFi |
A collective term for public financial products and services that are accessible built on top of smart contract based blockchain systems and are not under the control of a single entity. |
Source |
derivatives |
Derivatives |
A derivative is a contract between two or more parties whose value is based on an agreed-upon underlying financial asset (like a security) or set of assets (like an index). |
Source |
eip1559 |
EIP-1559 |
A particular improvement proposal to the Ethereum blockchain that implements a moving base fee in accordance with demand and gas usage. |
Source |
ethereum |
Ethereum |
Ethereum is a decentralized blockchain which implements automated smart contracts in a payment and transaction oriented architecture. |
Source |
flash-loans |
Flash Loans |
Flash loans are loans issued on a smart-contract based blockchain that require no capital from the borrower and are allowed to be paid back in the same block, allowing users to instantaneously perform arbitrage trades without significant capital investment. |
Source |
formal-verification |
Formal Verification |
Formal verification is essentially concerned with identifying the correctness of hardware and software design operation. |
|
|
Fraud Proofs |
A fraud proof is a way to prove that a blockchain tip is invalid. |
Source |
front-running |
Front-Running |
Entering into an equity trade, options or futures contracts with advance knowledge of a block transaction that will influence the price of the underlying security to capitalize on the trade. |
Source |
game-theory |
Game Theory |
Game theory is the study of the ways in which interacting choices of economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. |
Source |
|
Gas Costs |
Gas refers to the unit that measures the amount of computational effort required to execute specific operations on the Ethereum network. Since each Ethereum transaction requires computational resources to execute, each transaction requires a fee. Gas refers to the fee required to successfully conduct a transaction on Ethereum. |
Source |
governance |
Governance |
The problem area for answering who can make decisions, how they are made, and who is accountable for a given system. |
Source |
interoperability |
Interoperability |
Interoperability refers to the basic ability of computerized systems to connect and communicate with one another readily, even if they were developed by widely different manufacturers in different industries. In cryptonetworks, this generally refers to between different blockchain systems. |
Source |
iot |
Internet of Things |
Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. |
Source |
layer-2 |
Layer 2 |
Layer 2 is a collective term for solutions designed to help scale applications by handling transactions off the main chain (layer 1). |
Source |
mev |
Miner Extractable Value |
Value that is extractable by miners directly from smart contracts as cryptocurrency profits. |
Source |
mining |
Mining |
Mining is the process of verifying cryptocurrency transactions and recording them in the public blockchain ledger. Those who have the required hardware and computing power are called miners. |
Source |
|
Multi-Signature |
Multisignature wallets (or multisig, for short), are cryptocurrency wallets that require two or more private keys to sign and send a transaction. The storage method requires multiple cryptographic signatures (a private key’s unique fingerprint) to access the wallet. |
Source |
network-security |
Network Security |
Blockchain network security is a comprehensive risk management system for a blockchain network, using cybersecurity frameworks, assurance services and best practices to reduce risks against attacks and fraud. |
Source |
non-fungible |
Non-Fungible |
Non-fungible assets are unique, indivisible, and not interchangeable. |
Source |
|
On-Chain Governance |
On-chain governance refers to the system for managing control and development of a blockchain-based network. This encompasses methods for collecting information, structuring incentives, collecting signal from ecosystem participants, and ultimately acheiving consensus (usually voting) on decisions. |
Source |
|
Optimistic |
Optimism refers to transaction schemes that use Optimisitic Rollups. I.e. they rely on using fraud proofs to prevent invalid state transitions from happening. In simple terms, if there was a dispute about the result of a transaction that modifies a user's ETH balance, the user would try to replay that exact transaction on Ethereum to demonstrate the correct result there. |
Source |
oracles |
Oracles |
Oracles are smart contract structures that deliver off-chain information to on-chain systems. |
Source |
payment-channel |
Payment Channel |
A Payment Channel is class of techniques designed to allow users to make multiple payment transaction, namely on Bitcoin, without commiting all of the transactions to the Bitcoin block chain. In a typical payment channel, only two transactions are added to the blockchain but a nearly unlimted number of payments can be made between the participants off-chain. |
Source |
|
Plasma |
An architecture which frames all blockchain calculation into a community of MapReduce structures, plus an additional way to execute Proof-of-Stake token linkage ahead of pre-existing blockchains, with the conception that Nakamoto Consensus Drivers disincline block restraint, guaranteed by implementing a smart contract on the root blockchain using the Proof-of-Fraud method. |
Source |
post-mortem |
Post-Mortem |
A retrospective analysis of events that have taken place in the cryptocurrency and cryptonetwork space. |
|
privacy |
Privacy |
“Private” is if what you purchased, and for what amount, are unknown. |
Source |
proof-of-reserve |
Proof-of-Reserve |
A definitive proof regarding the amount of monetary value held in a given account or wallet. |
Source |
proof-of-stake |
Proof of Stake |
Proof of stake is a type of consensus mechanism used by blockchain networks to achieve distributed consensus where users stake their assets to become a validator in the network. Validators are responsible for the same thing as miners in proof-of-work: ordering transactions and creating new blocks so that all nodes can agree on the state of the network. |
Source |
proof-of-work |
Proof of Work |
Proof-of-work is the underlying algorithm that sets the difficulty and rules for the work miners do. Mining is the ""work"" itself. It's the act of adding valid blocks to the chain. This is important because the chain's length helps the network spot the valid chain and understand the chain's current state. The more ""work"" done, the longer the chain, and the higher the block number, the more certain the network can be of the current state of things |
Source |
quantum-computing |
Quantum Computing |
Quantum computer are quantum bits or qubits (CUE-bits) which can store information in quantum form (superposition of multiple states). |
Source |
|
Randomness Beacons |
A cryptographic beacon (also known as a randomness beacon) is a service that provides a public source of randomness. |
Source |
regulatory |
Regulatory |
Refers to regulatory topics, policies, and bodies. |
|
rollups |
Rollups |
Rollups are solutions that perform transaction execution outside layer 1, but post transaction data on layer 1 and inherit the security properties of the layer 1 chain. |
Source |
scalability |
Scalability |
Scalability is the measure of a system’s ability to increase or decrease in performance and cost in response to changes in application and system processing demands. In cryptonetworks, this refers to how transaction costs grow relative to increased size and usage of the network. |
Source |
schelling-point |
Schelling Point |
The ability of actors to coordinate their behavior even when not able to communicate. Coordinative solutions in games which are arrived at more often than theory would predict. |
Source |
securitization |
Securities |
Securities are fungible and tradable financial instruments used to raise capital in public and private markets. |
Source |
simulation |
Simulation |
Computer simulation is a program that is run on a computer and that uses step-by-step methods to explore the approximate behavior of a mathematical model |
Source |
|
Sidechain |
Sidechains are emerging mechanisms that allow tokens and other digital assets from one blockchain to be securely used in a separate blockchain and then be moved back to the original blockchain if needed. |
Source |
staking-derivatives |
Staking Derivatives |
Derivative products linked to either the amount of stake deposited by a user into a protocol and/or the staking rewards distributed by the protocol to network participants. |
Source |
sybil-protection |
Sybil Protection |
Protection against an attack where where a node in a network illegitimately claims multiple identities. |
Source |
testing |
Testing |
Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. |
Source |
|
Verifiable Delay Functions |
A verifiable delay function (VDF) is a function f : X → Y that takes a prescribed time to compute, even on a parallel computer. However once computed, the output can be quickly verified by anyone. Moreover, every input x ∈ X must have a unique valid output y ∈ Y. |
Source |
zero-knowledge |
Zero Knowledge Proofs |
An indirect proof of a public statement where the indirect proof leaks no sensitive details and has the property that trurth of the indirect proof means the direct proof is also true. |
Source |