🔔 TKEY listing on the exchange 🔔 TKEY listing on the exchange

Your Own Bank.

No Blocks, No Sanctions, No Control.

Technical Documentation

Decentralized Wallet.

Decentralization is one of the most important features that Tkeycoin differs from a usual e-money. No organization in the World controls Tkeycoin platform. No one can tell you what to do with your savings. Transfer money around the globe, buy your favorite goods in your favorite stores, cash your savings on International exchanges and markets.


Any amounts and any time frames. No blocks.


Anonymously and fast. No control.


Any country and any devices. No sanctions.

P2P Network.

Peer-to-peer decentralized network with equal rights of all its participants. This type of network is stable and secure as all the users are the servers and clients at the same time. No one can block all the detached P2P servers at once.


Improved Proof-of-Work algorithm that safely protects a P2P Network from the constant requests ( DDoS attacks, spam). The hackers should solve a special puzzle that requires a significant amount of time and resources.

Curve25519 & Ed25519.

The scheme of elliptic curves signatures that provide even more security than ECDSA & DSA. It differs from the analogs with the better performance and safety.

Secure Hash Algorithms x256.

A time-honored function, developed by the U.S. National Security Agency (NSA). The estimated collision time is 6,5x10^33 years.

Security is the Core.

More Opportunities Download the Wallet

“The paper form the SafeCurves website was supported by the U.S. National Science Foundation under grant 1018836 and by the Netherlands Organisation for Scientific Research (NWO) under grant 639.073.005.”


“SHA-256 was certified by FIPS PUB 180-4, CRYPTREC, and NESSIE. The certification process is the part of The Cryptographic Module Validation Program (CMVP).”