Key Rotation

Practice of replacing cryptographic keys periodically to limit blast radius of compromise.

Key Pair

Cryptographic public and private keys used for signing and address derivation.

KZG Polynomial Commitment

Commitment scheme (Kate‑Zaverucha‑Goldberg) enabling succinct proofs of polynomial evaluations; used for data availability and blobs.

Kademlia DHT

Distributed hash table used in P2P networks for efficient node and content discovery.

Keccak‑256

Hash function used by Ethereum for addresses and ABI encoding; close to SHA‑3 but not identical.

Log Bloom

Bloom filter in block headers summarizing events and addresses for fast log queries.