Documentation

List of Cryptocurrency Hashing Algorithms

Hashing algorithms are used for mining coins of cryptocurrencies. There is a large set of different hashing algorithms. The OG of them was SHA-256d, used by Bitcoin. Since then, a lot more for different purposes have been used or created by different cryptocurrencies. The reason for this large set is that different hashing algorithms have different use-cases. For instance, some of them are extremely difficult to mine using GPUs or ASICs (application-specific integrated circuit), and are thus only mineable profitably using CPUs. One example here is Cryptonight.

Below is a list of all hashing algorithms found in our database as of June 2021:

  • Argon2d
  • AstroBWT
  • Beam Hash
  • Blake-256
  • Blake2b
  • C11
  • Cryptonight
  • Cryptonight Adaptive
  • Cryptonight Conceal
  • Cryptonight Fast
  • Dagger
  • Delegated Proof-of-Stake
  • Directed Acyclic Graph (DAG)
  • Equihash
  • Ethash
  • Groestl
  • HMQ1725
  • Hex
  • Keccak
  • Lyra2RE
  • Lyra2REv3
  • Lyra2z
  • MTP
  • Multiple Algorithms
  • NIST5
  • NeoScrypt
  • Proof of Importance
  • Proof of Research
  • Proof of Stake
  • Proof of Stake Velocity
  • Proof of Stake-Time
  • Quark
  • Random-WOW
  • RandomARQ
  • RandomX
  • SHA-256
  • SHA-3
  • Scrypt
  • Scrypt-N
  • Sigma
  • Skein
  • Skunkhash
  • Timetravel 10
  • Ubqhash
  • X11
  • X13
  • X15
  • Xevan
  • Yespower 1.0
  • x16r
  • x16s