Cryptocurrency Algorithms (Page 7)

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

Search Algorithms

Polytimos

1 Coin

The Polytimos algorithm was created for the Polytimos coin, using several algorithms, Skein, Shabal, Echo, Luffa, Fugue and Gost. It…

Renesis

1 Coin

Renesis combines eight totally different hashing algorithms, to make for and advanced and safe mining algorithm. The team behind the…

GOST R 3410 2012

1 Coin

Also known as Streebog, GOST R 3410 2012 is a Proof of Work (PoW) algorithm. It was created to replace…

X22i

1 Coin

X22i is another variation of the X11 algorithm, using twenty two different algorithms instead of the traditional eleven. The 'i'…

SHA-256Q

SHA-256T

SHA-224

1 Coin

SHA-224 is part of the SHA-2 family of cryptographic hash functions. SHA-2 was originally designed by the U.S. National Security…

Sia

Energi

CryptoNight Saber

Aion

Ubqhash

AnonyPoW

Random Hash

Rainforest

ERC-20

Showing 109 to 124 of 124 results
Page 7 of 7