Password Manager

Tool that generates and stores strong unique passwords, often with secure sharing and 2FA support.

Proxy Re Encryption

Cryptographic technique where a proxy can transform ciphertext from one key to another without learning the plaintext.

Password Hashing

Using memory hard algorithms like Argon2 or scrypt with salt and pepper to store passwords safely.

Proof of History

Verifiable delay based sequence used by Solana to order events without relying on synchronized clocks.

Proof of Burn

Consensus or allocation method where coins are provably destroyed to gain rights or bootstrap a chain.