Cryptocurrency Algorithms (Page 6)

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

Search Algorithms

Stanford Folding

1 Coin

Stanford Folding is a hashing algorithm that uses computer power to simulate the process of protein folding in the human…

Tensority

1 Coin

Tensority is an ASIC-friendly algorithm based on the Proof of Work consensus. Tensority is currently utilised by just one cryptocurrency,…

X11 Evo

1 Coin

X11 Evo is based on the X11 algorithm. It uses eleven different hashing functions, just like X11, however, the difference…

Equihash 210,9

1 Coin

This modified version of the Equihash algorithm is sometimes refered to as Aion, or Equihash 210,9. It was developed by…

Argon2ad

Argon2d

1 Coin

Argon2 was the winner of the Password Hashing Competition, back in July 2015. The algorithm has a high resistance to…

ZR5

1 Coin

ZR5, like NIST5 algorithm, uses all five algorithms. These five algorithms, Grøstl, Skein, Blake, Keccak and JH, were the finalists…

Whirlpool

1 Coin

Whirlpool was developed back in the year 2000, but is still going strong today. It is a 512 bit hash…

Yescrypt R8

CryptoNight Alloy

1 Coin

CryptoNight Alloy is an ultra heavy algorithm based on the original CryptoNight algorithm. It is a Proof of Work (PoW)…

CryptoNight Arto

1 Coin

CryptoNight Arto is based on the original CryptoNight algorithm.…

Cuckoo Cycle

1 Coin

Cuckoo Cycle is a Proof of Work (PoW), memory bound algorithm invented by John Tromp. The amount of memory needed…

Yescrypt R24

Equihash 96,5

SHA-1

1 Coin

SHA-1, designed by the United States National Security Agency (NSA), is a hashing algorithm that takes an input and outputs…

HSR

JH

1 Coin

JH is a hashing algorithm created by Hongjun Wu. It was submitted to the National Institute of Standards and Technology…

Lyra2

1 Coin

Lyra2 is an evolution of the Lyra algorithm, designed by Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade,…
Showing 91 to 108 of 124 results
Page 6 of 7