Cryptocurrency Algorithms (Page 4)

A mining hash algorithm acts like a signature for a data file. An almost unique hash is created to validate a cryptocurrency transaction on the blockchain. A hash is a number generated from a string of text and depending on the algorithm, varies in length. The longer the hash, the stronger it is. Due to the length, it is almost impossible to create the same hash twice. However, a longer hash means more processing time. Hence why different coins, such as Bitcoin and Ethereum, have opted for different algorithms.

We've listed many of the cryptographic algorithms below. Click through to see which coins use it and a little bit about the algorithm.

Search Algorithms

Pascal

Blake256

2 Coins

Blake256 is the predecessor to Blake2s, based on the original Blake algorithm. There are several versions of Blake now. The…

Leased Proof of Stake (LPoS)

2 Coins

Leased Proof of Stake is an advanced version of the Proof of Stake (PoS) algorithm. Traditionally in the Proof of…

Scrypt²

2 Coins

The Scrypt² algorithm is a memory hard version of the original Scrypt algorithm.…

CryptoNight V8

2 Coins

CryptoNight V8 is the eighth version of the original CryptoNight algorithm. It came into being after a scheduled fork and…

Blake256r8

CryptoNight Lite

2 Coins

The CryptoNight Lite, CryptoNight Light algorithm is based on the standard CryptoNight algorithm. The hashing scratchpad has reduced from 2MB…

M7M

2 Coins

An improved version of the M7M algorithm, M7M was also created only for CPU mining. After the invention of GPUs…

Wild Keccak

2 Coins

Wild Keccak is a Proof of Work (PoW) memory-hard hashing algorithm based on the Keccak algorithm. It uses external scratchpad,…

Myriad-Groestl

2 Coins

Myriad-Groestl is a cryptocurrency specific algorithm, created for and used by Myriad (XMY). It is sometimes referred to as Myr-Groestl…

Scrypt-N

2 Coins

Scrypt-N is a modified version of the original Scrypt algorithm, developed for Litecoin (LTC). The goal is the same as…

Shabal256

2 Coins

Shabal is a hashing algorithm that was submitted by a group of French researchers, as part of a National Institute…

X14

2 Coins

X14 was originally created to avoid ASIC mining, thus providing fare coin distribution. Based on X11, X14 uses fourteen different…

Aergo

2 Coins

Aergo uses three algorithms, Proof of Work (POW), Proof of Stake (POS) and Delegated Proof of Stake (DPOS). It was…

Allium

2 Coins

Allium is a Proof of Work (PoW) algorithm specifically designed for Garlicoin. Garlicoin was running on the Scrypt-N, but after…

CryptoNight Haven

2 Coins

Based on the CryptoNight Heavy algorithm, CryptoNight Haven is a Proof of Work (PoW) algorithm with tweaks that makes it…

ProgPoW

2 Coins

ProgPoW, short for Programmatic Proof of Work, was designed to close the efficiency gap available to specialised ASIC mining rigs.…

HEX

2 Coins

HEX is an ASIC resistant, Proof of Work (PoW) algorithm. Similar to X16R, it is comprised of sixteen different algorithms;…
Showing 55 to 72 of 124 results
Page 4 of 7