Looks like no one added any tags here yet for you.
Cryptocurrency
A digital currency that uses cryptography for security and operates on a decentralized network.
Double-spending
The risk that a digital currency can be spent twice.
Public-Key Encryption
An encryption method that uses two keys: a public key for encryption and a private key for decryption.
Symmetric Encryption
An encryption technique where the same key is used for both encryption and decryption.
Hash Function
A mathematical function that converts an input into a fixed-size string of bytes, typically a digest that represents the data.
BlockChain
A distributed ledger technology that records transactions in a series of blocks linked together using cryptographic hashes.
Digital Signature
A cryptographic method used to validate the authenticity and integrity of a message or document.
Anonymity
The state of being not identifiable within a set of subjects.
Tamper-evident log
A log that can show evidence of any unauthorized access or modification.
Merkle tree
A data structure that uses cryptographic hashes to efficiently and securely verify the integrity of data.
Pseudorandom Number
A number generated by an algorithm that approximates the properties of random numbers.
Non-repudiation
The assurance that someone cannot deny the validity of something.
Encryption vs Encipherment
Encryption is the process of converting information into a secure format, while encipherment specifically refers to the transformation into a form that is unintelligible to unauthorized users.
Hiding property
A property of hash functions ensuring that it is infeasible to determine input from the output.
Integrity
The assurance that the information is unaltered and authentic.
Availability
The property that ensures users have access to information and systems when needed.
Public-Key Certificate
A digital certificate used to prove ownership of a public key.
Decentralization
The distribution of functions and powers away from a central authority.
Cryptanalytic Attacks
Attacks that exploit weaknesses in encryption algorithms to decipher the cipher.
Puzzle-friendliness
The property of a hash function indicating it is difficult to find an input that produces a given output.