Cryptocurrency Algorithms (Page 2)

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

Search Algorithms

Lyra2z

13 Coins

The Lyra2z algorithm was created by the Zcoin (XZC) cryptocurency in order to combat cloud mining operations. Based on the…

QuBit

13 Coins

Qubit was designed for CPU mining, but after GPU mining software became popular, this way of mining became less effective.…

CryptoNight V7

12 Coins

CryptoNight V7 is the seventh version of the original CryptoNight algorithm. It introduces a change in Proof of Work (PoW),…

Blake

11 Coins

This hashing algorithm was entered in the SHA-3 National Institute of Standards and Technology (NIST) cryptographic algorithm competition, back at…

CryptoNote

PoS 3.0

10 Coins

The PoS 3.0 algorithm is version 3 of the Proof of Stake (PoS) algorithm. The algorithm aims to provide fare…

Lyra2RE

8 Coins

The Lyra2RE algorithm is a NIST5 based chained algorithm that was developed in July, 2014, by the Vertcoin (VTC) team.…

SHA-3

8 Coins

Created by Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, SHA-3 (Secure Hash Algorithm Version 3), also known…

Grøstl

8 Coins

Grøstl is a tweaked version of its predecessor, called Grøstl-0, which was a hashing algorithm submitted to the National Institute…

Dagger Hashimoto

8 Coins

Dagger-Hashimoto, designed by Vitalik Buterin and the Ethereum team, is an initial version of the Ethash Proof of Work algorithm.…

Skein

8 Coins

Derived from threefish, the Skein algorithm is a cryptographic hash function that came in the top five of a National…

C11

7 Coins

C11 gets its name from the eleven hashing algorithms that are chained together. These algorithms are blake, Blue Midnight Wish,…

SHA-512

6 Coins

SHA-512 is the same as SHA-256, however, it is 50% faster and uses a 64-bit platform, rather than a 32-bit…

SkunkHash

6 Coins

The SkunkHash, or Skunk, hashing algorithm was developed and is used by the cryptocurrency Signatum (SIGT). It is used for…

Yescrypt R32

CryptoNight Lite V7

6 Coins

CryptoNight Lite v7 is another variant of the CryptoNight algorithm.…

Blake2s

5 Coins

Blake2s is the second algorithm based on BLAKE2, the other being Blake2b. Blake2s is optimized for 8 to 32-bit platforms.…

PHI1612

5 Coins

The PHI1612 hashing algorithm combines both Proof of Work (PoW) and Proof of Stake (PoS) systems, users can switch between…
Showing 19 to 36 of 124 results
Page 2 of 7