Mining algorithms
This is a list of the major cryptocurrencies with their key features and workes on different algorithms
Coins | Year | Ticker | Algorithm | Key characteristic |
---|---|---|---|---|
Bitcoin | 2009 | BTC | SHA-256 | The flagman of digital currencies is recognized as one thousand and one pravaselect in the European Union |
Ethereum | 2015 | ETH | Dagger-Hashimoto | The idea of creating the computing power to implement virtually any digital project |
Steemit | 2016 | SHA-256 | Multimedia content can be integrated with other web hosts | |
Ripple | 2013 | ECDSA | Currency created for banks to make faster and more secure transactions | |
DigiByte | 2014 | Designed to eliminate the weaknesses of Bitcoin & Litecoin | ||
Monero | 2014 | XMR | CryptoNight | Designed for anonymous monetary transactions |
Siacoin | 2015 | blake2b | The main idea of data storage | |
Litecoin | 2011 | LTC | Scrypt | Litecoin is a clone of Bitcoin with a faster transactions |
Ethereum Classic | 2015 | Dagger-Hashimoto | This is the same Etherium, but developers have a conflict, and they divided coin, the price is much cheaper | |
Dogecoin | 2013 | DOGE | Scrypt | Completely copied algorithm with Litecoin with some modifications. Popularity due to large investments in advertising and symbol-a picture of the famous dog known and respected in narrow circles |
NEM | 2015 | blockchain | There is a service of notarization and allows you to make instant payments and money transfers around the world without high commissions. All wallets are protected | |
Syscoin | 2014 | Scrypt | Has an unusual encryption algorithm and is focused on decentralized trade. Syscoin is not a cryptocurrency plus a platform – it is a platform built into a cryptocurrency. | |
Augur | 2015 | Smart contract | Augur uses power to predict financial markets | |
Dash | 2014 | DASH | X11 | Virtually eliminate tracking of the sender. At the request of the user can not be used to tranzactii directly. |
Hatch | 2018 | X11 | Fork of Dash. | |
2012 | BCN | CryptoNight | Protect your money the most secure and advanced encryption algorithms. Them impossible to crack. The attempt of hacking would require huge amounts of expensive electricity and computing power of a supercomputer. You are the only one who can get access to your wallet. At least so say the developers | |
2014 | Scrypt | Позволяет вам получать оплату за фотографии, которые вы публикуете | ||
2016 | LBRY | Using lbry users can create and share content such as music, movies, paintings, etc. In the process of downloading content the user may require a fee for access | ||
2015 | The target is to use the blockchain to provide various 100% decentralized services | |||
Decred | 2015 | In fact it is a hybrid proof-of-work proof-of-stake (PoW/PoS) consensus-based system that aims to balance between the PoW miners and PoS voters that would create a more robust concept of consensus | ||
Einsteinium | 2014 | Scrypt | Just like kickstarter for science projects | |
2013 | GRC | BOINC | System that by combining computing power helps to solve problems in medicine, biology, mathematics, climatology, astrophysics and other Sciences | |
2014 | Lyra2RE | Positioning itself as the fork is fully protected from ASIC miners. Oppose monopolization of mining | ||
2014 | CryptoNight | Anonymous cryptocurrency the next generation because the network code is always updated with minimal development costs and close to 0% Protocol errors | ||
Potcoin | 2014 | Scrypt | Is a coiun of legal marijuana industry | |
Peercoin | 2012 | PPC | SHA-256 | Is interesting in possibility of obtaining coins is not only mining graphics card, but also the generation of new coins with the coins already in the wallet |
Namecoin | 2011 | NMC | SHA-256 | The main use of Namecoin is a censorship resistant top level domain .bit, which is functionally similar to .com or .net domains, but does not depend on ICANN, the main governing body for domain names |
2014 | NXT | The target – is to prove that the electronic currency can be a good class of investment assets. | ||
2015 | Dagger-Hashimoto | The idea is to use the newest blockchain technology to create anything that can represent the community and the team, using a decentralized Autonomous organization with a self-design to keep it truly decentralized | ||
2014 | X11 | Currency based on the platform Ethereum and securely fixed amount of diamonds | ||
FoldingCoin | 2014 | Uses your computer to simulate the process of protein folding in the human body. The results obtained in this study will be used for production and obtaining new medical preparations, methods of treatment and maybe with your help will be open new discoveries in medicine and research protein in particular, and for the treatment of deadly diseases | ||
2014 | X13 | If you use NAVTech and Tor you can protect your identity when making private purchases on the Internet. | ||
2014 | Scrypt | The advantage of VIA is that the confirmation of intellectual property rights and the performance of services is accomplished through publication in the blockchain. | ||
2014 | Scrypt | DNotes — peer-to-peer decentralized cryptocurrency transmitted over the Internet, which enables instant payments to anyone in the world. It quickly and safely with a minimum commission according to the developers | ||
2014 | Vcash was designed as an innovative and promising. It prevents eavesdropping and censorship, promotes decentralized, energy-efficient and instant network transactions |
This is a list of algorithms are used by different cryptocurrencies
Algorithm | Coins |
---|---|
SHA-256 | Bitcoin, Mastercoin, MazaCoin, Namecoin, NuBits, Peercoin, BitcoinDark, , , , , Tigercoin, , , Titcoin, , , Curecoin, Zetacoin, , , Unobtanium, Blakecoin, , Ixcoin, Bytecoin |
Scrypt | Auroracoin, Coinye, Synereo, Syscoin,GameCredits, Dogecoin, Litecoin, Potcoin, , , ,, , , , , , , Worldcoin, |
Vertcoin, , , , | |
Yacoin, , | |
X11 | Dash, , , , , , , , , , , , , , Hatch |
X13 | Cloakcoin, , , , , , ,, |
X15 | , |
Groestl | Groestlcoin, Securecoin, |
Quark | , , |
Qubit | , , |
NeoScrypt | Feathercoin, , , |
SHA-3 (Keccak) | Maxcoin,, , |
, , , Blakecoin, | |
Ethash | , Shift, , Ethereum Classic, Ethereum |
Lyra2REv2 | , Vertcoin |
See Also on BitcoinWiki
References
https://mining-cryptocurrency.ru/algoritmy-kriptovalyut/
http://bitcoinguide.online/a-list-of-cryptocurrency-algorithms/