BTCBitcoin
$3,583.44 +4.16%
XRPXRP
$0.3117678593 +2.62%
ETHEthereum
$94.20 +3.28%
XLMStellar
$0.1228303997 +4.43%
EOSEOS
$2.02 +11.85%
USDTTether
$0.9898420039 -0.94%
BCHBitcoin Cash
$107.75 +0.65%

Cryptocurrency Algorithms

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

194 Coins

Scrypt, a memory intensive algorithm, is used by many cryptocurrencies as Proof of Work. Scrypt mining is usually performed using…

X11

76 Coins

X11, a hashing algorithm created by Dash core developer Evan Duffield in 2014, was well received by the mining community…

71 Coins

SHA stands for 'Secure Hash Algorithm'. It is part of the SHA-2 family, the successor to the SHA-1 algorithm, which…

32 Coins

In the Proof of Stake (PoS) algorithm, each node that holds cryptocurrency that is eligible to add the next block…

X13

20 Coins

X13 is the same as X11, with its low energy usage, but instead using thirteen different hashes, making the algorithm…

14 Coins

Ethash is a hashing algorithm used in Ethereum-based blockchain currencies. It is the successor to Dagger Hashimoto, designed to be…

14 Coins

Announced in June 2014, NeoScrypt is Proof of Work (PoW) algorithm that is derived from the original Scrypt algorithm. NeoScrypt…

13 Coins

The Quark hashing algorithm is based on a one level hash function and does not require a large amount of…

12 Coins

CryptoNight runs in a semi random fashion and is a memory-hard hash function. It is designed to be mined inefficiently…

11 Coins

Created by Daniel Larimer, Delegated Proof of Stake (DPoS), is the fastest, most efficient and decentralized consensus today. It works…

9 Coins

EquiHash, created by Alex Biryukov and Dmitry Khovratovich, was first unveiled in 2016, at the Network and Distributed System Security…

7 Coins

The NIST5 algorithm is ASIC resistant and utilises a combination of five hashing algorithms, Grøstl, Skein, Blake, Keccak and JH.…

7 Coins

Grøstl is a tweaked version of its predecessor, called Grøstl-0, which was a hashing algorithm submitted to the National Institute…

7 Coins

Founded and utilised by BitSend (BSD), Xevan is a hashing algorithm developed specifically for mining cryptocurrencies. It uses the X17…

5 Coins

Created by Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, SHA-3 (Secure Hash Algorithm Version 3), also known…

5 Coins

This hashing algorithm was entered in the SHA-3 National Institute of Standards and Technology (NIST) cryptographic algorithm competition, back at…

5 Coins

Created by Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, Keccak was a finalist in a cryptographic hash…

4 Coins

Blake2s is the second algorithm based on BLAKE2, the other being Blake2b. Blake2s is optimized for 8 to 32-bit platforms.…

4 Coins

CryptoNight V7 is the seventh version of the original CryptoNight algorithm. It introduces a change in Proof of Work (PoW),…

X17

4 Coins

Developed back in 2014, X17 is a based on the X11 algorithm. It is comprised of seventeen different hashing functions,…

4 Coins

The PoS 3.0 algorithm is version 3 of the Proof of Stake (PoS) algorithm. The algorithm aims to provide fare…

X15

4 Coins

X15 is based on X11 and is similar to X13, but instead of using eleven hash functions, it utilises fifteen…

3 Coins

Blake2b is one of two algorithms based on BLAKE2, the other being Blake2s. Blake2b is optimized for 64-bit platforms, whereas…

3 Coins

Lyra2REv2 is the version two of the Lyra2RE algorithm, which was developed by the Vertcoin team for Vertcoin (VTC) cryptocurrency.…

3 Coins

Derived from threefish, the Skein algorithm is a cryptographic hash function that came in the top five of a National…

2 Coins

SHA-512 is the same as SHA-256, however, it is 50% faster and uses a 64-bit platform, rather than a 32-bit…

2 Coins

Blake256 is the predecessor to Blake2s, based on the original Blake algorithm. There are several versions of Blake now. The…

2 Coins

The Lyra2RE algorithm is a NIST5 based chained algorithm that was developed in July, 2014, by the Vertcoin (VTC) team.…

2 Coins

The Scrypt² algorithm is a memory hard version of the original Scrypt algorithm.…

2 Coins

The Argon2 algorithm was created in 2015 by researchers of the Luxemburg National University. It aimed to tackle to issues,…

2 Coins

This algorithm fully depends on the the Bitcoin system and was developed by the creators of the Counterparty (XCP) coin.…

2 Coins

Myriad-Groestl is a cryptocurrency specific algorithm, created for and used by Myriad (XMY). It is sometimes referred to as Myr-Groestl…

2 Coins

Qubit was designed for CPU mining, but after GPU mining software became popular, this way of mining became less effective.…

2 Coins

Scrypt-N is a modified version of the original Scrypt algorithm, developed for Litecoin (LTC). The goal is the same as…

2 Coins

Time Travel (sometimes referred to as TimeTravel10) is an algorithm created in 2016 by the developers of the Machinecoin (MAC)…

2 Coins

Based on the Equihash algorithm, Equihash 144,5, also known as Zhash, has the goal of hardening the protocol to be…

1 Coin

Ouroboros is unlike other algorithms, since it is the first blockchain protocol based on Proof of Stake (PoS), rather than…

1 Coin

Released in 2012, the Ripple algorithm, Ripple Protocol Consensus Algorithm (RPCA), is built on a distributed, open source internet protocol,…

1 Coin

Leased Proof of Stake is an advanced version of the Proof of Stake (PoS) algorithm. Traditionally in the Proof of…

1 Coin

X11GOST is a derivative of the X11 algorithm. The difference is that it is suitable for mining on GPUs. The…

1 Coin

The PHI1612 hashing algorithm combines both Proof of Work (PoW) and Proof of Stake (PoS) systems, users can switch between…

1 Coin

Based on the Equihash, mining operations with Equihash 192/7 require 25-30% less power. It is also ASIC resistant.…

1 Coin

CryptoNight V8 is the eighth version of the original CryptoNight algorithm. It came into being after a scheduled fork and…

1 Coin

Created by Alexander Peslyak, Yescrypt is an algorithm based on the Scrypt algorithm, created by Colin Percival of Tarsnap. It…

1 Coin

1GB AES Pattern Search is a Proof of Work (PoW) algorithm, derived from the Momentum proof-of-work algorithm, that is based…

1 Coin

CryptoNight Heavy is an evolution of the CryptoNight algorithm. It was created in order to become ASIC resistant. The CryptoNight…

1 Coin

The CryptoNight Lite, CryptoNight Light algorithm is based on the standard CryptoNight algorithm. The hashing scratchpad has reduced from 2MB…

1 Coin

Dagger-Hashimoto, designed by Vitalik Buterin and the Ethereum team, is an initial version of the Ethash Proof of Work algorithm.…

1 Coin

HMQ1725, developed by the CryptoCoderz community, is a modernised version of the Quark hashing algorithm. This modification occurred as a…

1 Coin

HybridScryptHash256 is a combination of both the Hash256 and Scrypt algorithms. It was first used by the Mediterraneancoin (MED) cryptocurrency.…

1 Coin

Blue Midnight Wish, abbreviated to BMW, was submitted in 2012 to the SHA-3 National Institute of Standards and Technology (NIST)…

1 Coin

This algorithm is a Proof of Work (PoW) algorithm using a combination of SHA-256, SHA-512 and RIPEMD (RACE Integrity Primitives…

1 Coin

The Lyra2z algorithm was created by the Zcoin (XZC) cryptocurency in order to combat cloud mining operations. Based on the…

1 Coin

Created by the developers of the Cryptonite (XCN) cryptocurrency, M7 PoW is a Proof of Work (Pow) algorithm, named after…

1 Coin

Invented in 1998 by the IBM Corporation, the Mars algorithm was the result of a twenty year long search of…

1 Coin

Wild Keccak is a Proof of Work (PoW) memory-hard hashing algorithm based on the Keccak algorithm. It uses external scratchpad,…

1 Coin

Based on the original PHI algorithm, PHI2 is more miner-friendly and consumes up to sixty percent less energy, when compared…

1 Coin

This is the second version of the Proof of Stake (PoS) and is much more secure than its predecessor.…

1 Coin

Veltor is a custom algorithm, created for the Veltor cryptocurrency. Currently, Veltor is only used by the Veltor (VLT) coin.…

1 Coin

SkunkHash Raptor is a new, updated version of the original SkunkHash hashing algorithm. The difference between SkunhHash and SkunkHash Raptor,…

1 Coin

SpreadX11 is a hashing algorithm based on the classic X11 algorithm. The difference being that Spread X11 provides a sophisticated…

1 Coin

Tensority is an ASIC-friendly algorithm based on the Proof of Work consensus. Tensority is currently utilised by just one cryptocurrency,…

1 Coin

Tribus is an algorithm that was created for the hybrid cryptocurrency, Denarius (DNR). So far, Denarius is the first and…

X14

1 Coin

X14 was originally created to avoid ASIC mining, thus providing fare coin distribution. Based on X11, X14 uses fourteen different…

C11

1 Coin

C11 gets its name from the eleven hashing algorithms that are chained together. These algorithms are blake, Blue Midnight Wish,…

1 Coin

Aergo uses three algorithms, Proof of Work (POW), Proof of Stake (POS) and Delegated Proof of Stake (DPOS). It was…

1 Coin

This modified version of the Equihash algorithm is sometimes refered to as Aion, or Equihash 210,9. It was developed by…

1 Coin

Allium is a Proof of Work (PoW) algorithm specifically designed for Garlicoin. Garlicoin was running on the Scrypt-N, but after…

1 Coin

Argon2 was the winner of the Password Hashing Competition, back in July 2015. The algorithm has a high resistance to…

ZR5

1 Coin

ZR5, like NIST5 algorithm, uses all five algorithms. These five algorithms, Grøstl, Skein, Blake, Keccak and JH, were the finalists…

1 Coin

Whirlpool was developed back in the year 2000, but is still going strong today. It is a 512 bit hash…

1 Coin

SHA-1, designed by the United States National Security Agency (NSA), is a hashing algorithm that takes an input and outputs…

HSR

1 Coin

JH

1 Coin

JH is a hashing algorithm created by Hongjun Wu. It was submitted to the National Institute of Standards and Technology…

1 Coin

Lyra2 is an evolution of the Lyra algorithm, designed by Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade,…

1 Coin

CryptoNight Lite v7 is another variant of the CryptoNight algorithm.…

1 Coin

SHA-224 is part of the SHA-2 family of cryptographic hash functions. SHA-2 was originally designed by the U.S. National Security…

0 Coins

Based on moderately connected directed acyclic graphs, or DAGs, is where Dagger draws its name. The Dagger algorithm is an…

0 Coins

Based on the original Lyra2 algorithm, the Lyra2z330 algorithm is designed primarily for CPU miners. This algorithm runs the most…

M7M

0 Coins

An improved version of the M7M algorithm, M7M was also created only for CPU mining. After the invention of GPUs…

0 Coins

SHA-256D is sometimes referred to as Double SHA-256. The principle behind the algorithm is to apply the SHA-256 algorithm twice.…

0 Coins

Shabal is a hashing algorithm that was submitted by a group of French researchers, as part of a National Institute…

0 Coins

The SkunkHash, or Skunk, hashing algorithm was developed and is used by the cryptocurrency Signatum (SIGT). It is used for…

0 Coins

Stanford Folding is a hashing algorithm that uses computer power to simulate the process of protein folding in the human…

0 Coins

X11 Evo is based on the X11 algorithm. It uses eleven different hashing functions, just like X11, however, the difference…

0 Coins

X16R is an algorithm based on the classic X11 algorithm. It uses sixteen chained hashing algorithms instead of eleven. Blake,…

0 Coins

X16S is an algorithm based on the classic X11 algorithm. It uses sixteen chained hashing algorithms instead of eleven. The…

0 Coins

CryptoNight Alloy is an ultra heavy algorithm based on the original CryptoNight algorithm. It is a Proof of Work (PoW)…

0 Coins

CryptoNight Arto is based on the original CryptoNight algorithm.…

0 Coins

Developed by the Masari (MSR) cryptocurrency, CryptonightFast (CN-Fast) is a Proof of Work (PoW) algorithm that mitigates potential attacks and…

0 Coins

Based on the CryptoNight Heavy algorithm, CryptoNight Haven is a Proof of Work (PoW) algorithm with tweaks that makes it…

0 Coins

SonoA is a new algorithm, using seventeen SHA3 hashing algorithms with a unique hashing order. SonoA doesn't just cycle through…

0 Coins

Cuckoo Cycle is a Proof of Work (PoW), memory bound algorithm invented by John Tromp. The amount of memory needed…

0 Coins

ProgPoW, short for Programmatic Proof of Work, was designed to close the efficiency gap available to specialised ASIC mining rigs.…

HEX

0 Coins

HEX is an ASIC resistant, Proof of Work (PoW) algorithm. Similar to X16R, it is comprised of sixteen different algorithms;…

0 Coins

LBK3 is a new algorithm being developed by the Vertical (VTL) cryptocurrency.…

PHI

0 Coins

0 Coins

The Polytimos algorithm was created for the Polytimos coin, using several algorithms, Skein, Shabal, Echo, Luffa, Fugue and Gost. It…

0 Coins

Renesis combines eight totally different hashing algorithms, to make for and advanced and safe mining algorithm. The team behind the…

0 Coins

Also known as Streebog, GOST R 3410 2012 is a Proof of Work (PoW) algorithm. It was created to replace…

0 Coins

X22i is another variation of the X11 algorithm, using twenty two different algorithms instead of the traditional eleven. The 'i'…