Cube
Trade
Pro
Advanced trading interface with professional tools
Swap
Exchange cryptocurrencies instantly
Bundles
Trade multiple tokens in a single transaction
Algos
Create and manage automated trading strategies
Portfolio
Portfolio
View your cryptocurrency holdings and performance
Orders
Track your open and completed orders
Transactions
View your complete transaction history
Rewards
Rewards Dashboard
View your rewards and claim loot boxes
Blocks Leaderboard
See top traders competing for block rewards
Referral Leaderboard
See top referrers and track referral rankings
Investors
Investor Resources
Browse investor resources and documentation
Presentation (pdf)
Download investor presentation
Settings
Profile
Your profile and account verification
Subaccounts
Separate portfolios across subaccounts
Address Book
Manage saved withdrawal addresses
Multi-Factor Authentication
Add a verification step for sensitive account actions
API Keys
Connect applications to your account
Onramp
Link bank account to buy crypto
Account Recovery
Manage account recovery setup
Learn
News
Read the latest news, announcements, and updates from Cube Exchange
What-Is Guides
Learn about cryptocurrencies
FAQ
Frequently asked questions about Cube Exchange
Fees
View our transparent fee schedule and pricing information
Security
Learn more about Cube Exchange security
About
About
Learn more about Cube Exchange
Legal
Legal information, terms of service, privacy policy, and risk disclosures
EN
Select Language
EN
English
ES
Español
ID
Bahasa Indonesia
JA
日本語
PL
Polski
PT
Português
RU
Россия
TH
แบบไทย
TR
Türkçe
UK
Україна
VI
Tiếng Việt
ZH-CN
简体中文
ZH-TW
繁體中文
Light
Dark
System
Sign In
/
Foundations
/
Cryptography
/
Hash Functions
/
Foundations: Cryptography / Hash Functions
What Is Keccak-256?
Keccak-256 matters because the name hides two different realities: a broad sponge-based hash family and a specific 256-bit variant used by systems like Ethereum. Once you see how the sponge construction trades speed for security through the rate and capacity, the design becomes much less mysterious.
Mar 21, 2026
•
21 min read
#HASH FUNCTIONS
What is SHA-256?
SHA-256 is the quiet workhorse behind block identifiers, commitments, address derivation, digital signatures, and many integrity checks across crypto systems. Its importance comes from a simple promise: a tiny change in input should produce a completely different 256-bit fingerprint that is easy to compute and hard to fake.
Mar 21, 2026
•
24 min read
#HASH FUNCTIONS
What is Poseidon Hash?
Poseidon hash matters because ordinary hashes are cheap on CPUs but expensive inside zero-knowledge proofs. Poseidon flips that tradeoff: it is built from finite-field arithmetic so Merkle trees, commitments, and private transactions can be proven with far fewer circuit constraints.
Mar 21, 2026
•
24 min read
#HASH FUNCTIONS
What is a Cryptographic Hash Function?
Cryptographic hash functions are one of the quiet load-bearing ideas in modern computing. They turn data of any size into a short fingerprint, and the reason that fingerprint is useful is not compression but a specific kind of one-way structure: it should be easy to compute, but infeasible to reverse or to fake by finding collisions.
Mar 21, 2026
•
24 min read
#HASH FUNCTIONS