Cryptocurrency Algorithms

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

Search Algorithms


593 Coins

Scrypt, a memory intensive algorithm, is used by many cryptocurrencies as Proof of Work. Scrypt mining is usually performed using…


280 Coins

X11, a hashing algorithm created by Dash core developer Evan Duffield in 2014, was well received by the mining community…


191 Coins

SHA stands for 'Secure Hash Algorithm'. It is part of the SHA-2 family, the successor to the SHA-1 algorithm, which…


144 Coins

The Quark hashing algorithm is based on a one level hash function and does not require a large amount of…


88 Coins

X13 is the same as X11, with its low energy usage, but instead using thirteen different hashes, making the algorithm…

Proof of Stake (PoS)

84 Coins

In the Proof of Stake (PoS) algorithm, each node that holds cryptocurrency that is eligible to add the next block…


60 Coins

CryptoNight runs in a semi random fashion and is a memory-hard hash function. It is designed to be mined inefficiently…


48 Coins

Ethash is a hashing algorithm used in Ethereum-based blockchain currencies. It is the successor to Dagger Hashimoto, designed to be…


47 Coins

Announced in June 2014, NeoScrypt is Proof of Work (PoW) algorithm that is derived from the original Scrypt algorithm. NeoScrypt…


33 Coins

EquiHash, created by Alex Biryukov and Dmitry Khovratovich, was first unveiled in 2016, at the Network and Distributed System Security…

Delegated Proof of Stake (DPoS)

29 Coins

Created by Daniel Larimer, Delegated Proof of Stake (DPoS), is the fastest, most efficient and decentralized consensus today. It works…


25 Coins

Founded and utilised by BitSend (BSD), Xevan is a hashing algorithm developed specifically for mining cryptocurrencies. It uses the X17…


24 Coins

SHA-256D is sometimes referred to as Double SHA-256. The principle behind the algorithm is to apply the SHA-256 algorithm twice.…


22 Coins

The NIST5 algorithm is ASIC resistant and utilises a combination of five hashing algorithms, Grøstl, Skein, Blake, Keccak and JH.…


19 Coins

Created by Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, Keccak was a finalist in a cryptographic hash…


18 Coins

X15 is based on X11 and is similar to X13, but instead of using eleven hash functions, it utilises fifteen…


14 Coins

X16r is an algorithm based on the classic X11 algorithm. It uses sixteen chained hashing algorithms instead of eleven. Blake,…


13 Coins

Lyra2REv2 is the version two of the Lyra2RE algorithm, which was developed by the Vertcoin team for Vertcoin (VTC) cryptocurrency.…
Showing 1 to 18 of 124 results
Page 1 of 7