KMS (Key Management System)
Hardware or cloud service for generating, storing, and using keys with strong access controls.
Hardware or cloud service for generating, storing, and using keys with strong access controls.
Practice of replacing cryptographic keys periodically to limit blast radius of compromise.
Function like PBKDF2, scrypt, or Argon2 used to derive keys from passwords or seeds securely.
Collaborative trusted setup that generates structured reference strings for KZG commitments.
Commitment scheme (Kate‑Zaverucha‑Goldberg) enabling succinct proofs of polynomial evaluations; used for data availability and blobs.
Hash function used by Ethereum for addresses and ABI encoding; close to SHA‑3 but not identical.
Minting deferred until purchase; creator signs a voucher, buyer pays gas at claim.
Write‑optimized storage structure used by RocksDB, LevelDB; common in node databases.