A Comprehensive List of Algorithms Used by Cryptocurrencies
Author: Manus AI Date: December 2, 2025
Introduction
The functionality and security of any cryptocurrency are fundamentally dependent on a suite of cryptographic and computer science algorithms. These algorithms serve distinct, critical roles, primarily categorized into three main groups: Hashing Algorithms for data integrity and Proof-of-Work (PoW), Consensus Mechanisms for distributed agreement on the state of the ledger, and Digital Signature Algorithms for transaction authentication and ownership verification. This report provides a comprehensive, categorized list of the most prominent algorithms used across the cryptocurrency landscape.
1. Hashing Algorithms
Hashing algorithms are one-way functions that take an input (e.g., a transaction or a block of data) and produce a fixed-size, unique output string called a hash or digest. In cryptocurrencies, they are used for creating block headers, verifying data integrity, and as the core component of Proof-of-Work mining 1. The choice of hashing algorithm often dictates the type of hardware best suited for mining, with some being more resistant to specialized hardware like Application-Specific Integrated Circuits (ASICs).
| Algorithm | Primary Use | Key Features | Notable Coins |
| SHA-256 | Proof-of-Work (PoW), Transaction Hashing | Highly secure, ASIC-friendly, part of the SHA-2 family. | Bitcoin (BTC), Bitcoin Cash (BCH), Bitcoin SV (BSV) |
| Scrypt | Proof-of-Work (PoW) | Memory-hard, designed to be ASIC-resistant (though ASICs now exist). | Litecoin (LTC), Dogecoin (DOGE) |
| Ethash | Proof-of-Work (PoW) | Memory-hard, used for Ethereum’s PoW phase before the transition to PoS. | Ethereum Classic (ETC) |
| X11 | Proof-of-Work (PoW) | A chain of 11 different hashing algorithms, designed to be ASIC-resistant. | Dash (DASH) |
| CryptoNight | Proof-of-Work (PoW) | Memory-bound, designed for CPU/GPU mining, often used for privacy coins. | Monero (XMR) |
| Keccak-256 | General Hashing, Address Generation | A variant of SHA-3, used for transaction and block hashing. | Ethereum (ETH) |
| Blake2b/Blake3 | General Hashing, PoW | Faster and more modern than SHA-2, used in various protocols. | Decred (DCR), Grin (GRIN) |
| Argon2d | Proof-of-Work (PoW) | Highly memory-intensive, winner of the Password Hashing Competition. | Vertcoin (VTC) |
2. Consensus Mechanisms
Consensus mechanisms are the protocols that ensure all participants in a distributed network agree on a single, true state of the ledger. They are arguably the most crucial set of algorithms, as they govern the security, decentralization, and scalability of the blockchain 2.
| Mechanism | Description | Key Advantage | Notable Coins |
| Proof-of-Work (PoW) | Participants (miners) expend computational power to solve a cryptographic puzzle to validate blocks. | High security, proven decentralization, and resistance to Sybil attacks. | Bitcoin (BTC), Ethereum Classic (ETC) |
| Proof-of-Stake (PoS) | Participants (validators) are chosen to validate blocks based on the amount of coin they “stake” as collateral. | Energy efficiency, lower barrier to entry for validation, and faster block finality. | Ethereum (ETH), Cardano (ADA), Solana (SOL) |
| Delegated Proof-of-Stake (DPoS) | Token holders vote for a limited number of delegates or witnesses to validate transactions on their behalf. | High transaction speed and scalability due to a small, fixed set of validators. | EOS, Tron (TRX), Cosmos (ATOM) |
| Proof-of-Authority (PoA) | Blocks are validated by pre-approved, trusted accounts (authorities) who are known and verified entities. | Very high performance and throughput, suitable for private or consortium chains. | VeChain (VET), Binance Smart Chain (BSC) |
| Proof-of-History (PoH) | A sequence of computations that cryptographically verifies the passage of time, used as a global clock for the network. | Enables extremely fast transaction finality and high throughput when combined with PoS. | Solana (SOL) |
| Proof-of-Capacity (PoC) | Mining power is determined by the amount of hard drive space dedicated to the network, often called “plotting.” | More accessible and energy-efficient than PoW, as it relies on storage rather than computation. | Chia (XCH), Burstcoin (BURST) |
| Byzantine Fault Tolerance (BFT) Variants | A class of consensus algorithms (e.g., Practical BFT, Tendermint) that can tolerate a certain number of malicious nodes. | Instant finality and high throughput, often used in PoS systems for block finalization. | Ripple (XRP), Stellar (XLM), Algorand (ALGO) |
3. Digital Signature Algorithms
Digital signature algorithms are essential for ensuring the authenticity and integrity of transactions. They allow a user to prove ownership of their funds without revealing their private key, by cryptographically “signing” a transaction with their private key 3.
| Algorithm | Primary Use | Key Features | Notable Coins |
| Elliptic Curve Digital Signature Algorithm (ECDSA) | Transaction Signing, Key Generation | The long-standing standard for most cryptocurrencies, based on elliptic curve cryptography (specifically the secp256k1 curve for Bitcoin and Ethereum). | Bitcoin (BTC), Ethereum (ETH) |
| EdDSA (Ed25519) | Transaction Signing | A modern alternative to ECDSA, known for being faster, more secure, and easier to implement correctly. | Solana (SOL), Polkadot (DOT), Cardano (ADA) |
| Schnorr Signatures | Transaction Signing, Multi-signatures | More efficient and private than ECDSA, allowing for the aggregation of multiple signatures into a single, smaller signature (known as MuSig). | Bitcoin (BTC) (via the Taproot upgrade) |
| BLS Signatures (Boneh–Lynn–Shacham) | Signature Aggregation, Consensus | Allows multiple signatures from different parties to be combined into a single, small signature, which is highly beneficial for scaling PoS consensus. | Ethereum 2.0 (Beacon Chain), Filecoin (FIL) |
Conclusion
The cryptocurrency ecosystem is built upon a diverse and evolving set of algorithms. While SHA-256 and ECDSA remain the foundational algorithms for Bitcoin, newer blockchains are increasingly adopting more modern, efficient, and scalable alternatives such as PoS consensus, EdDSA signatures, and memory-hard hashing algorithms like Argon2d. The continuous innovation in these cryptographic primitives is what drives the ongoing development and specialization of the blockchain industry.
References
# Hashing Algorithms Supported by cpuminer
**Author:** Manus AI
**Date:** December 2, 2025
## Introduction
The `cpuminer` family of software, particularly the highly optimized `cpuminer-opt` fork, is a multi-threaded CPU miner designed to support a vast array of Proof-of-Work (PoW) hashing algorithms. This extensive support allows users to mine a wide variety of cryptocurrencies that are often more CPU-friendly and resistant to specialized hardware like ASICs. The following list details the algorithms explicitly supported by `cpuminer-opt`, along with their associated coins where specified in the documentation [1].
## Comprehensive List of Supported Algorithms
The algorithms are listed by the name used in the miner’s command line (`–algo` parameter). This list demonstrates the diversity of algorithms a modern CPU miner can handle, ranging from single-hash functions to complex chained algorithms.
| Algorithm Name | Associated Coin(s) | Algorithm Type/Notes |
| :— | :— | :— |
| **allium** | Garlicoin | Multi-hash algorithm |
| **anime** | Animecoin | Multi-hash algorithm |
| **argon2d250** | N/A | Argon2d variant (memory-hard) |
| **argon2d500** | N/A | Argon2d variant (memory-hard) |
| **argon2d4096** | N/A | Argon2d variant (memory-hard) |
| **blake** | Blake-256 (SFR) | Blake family |
| **blake2b** | Blake2b 256 | Blake family |
| **blake2s** | Blake-2 S | Blake family |
| **blakecoin** | blake256r8 | Blake family |
| **bmw** | BMW 256 | Multi-hash algorithm |
| **bmw512** | BMW 512 | Multi-hash algorithm |
| **c11** | Chaincoin | Multi-hash algorithm |
| **decred** | Decred | Blake-256-based |
| **deep** | Deepcoin (DCN) | Multi-hash algorithm |
| **dmd-gr** | Diamond-Groestl | Groestl variant |
| **groestl** | Groestl coin | Groestl family |
| **hex** | x16r-hex | Multi-hash algorithm |
| **hmq1725** | Espers | Multi-hash algorithm |
| **jha** | Jackpotcoin | Multi-hash algorithm |
| **keccak** | Maxcoin | Keccak family |
| **keccakc** | Creative coin | Keccak family |
| **lbry** | LBC, LBRY Credits | Multi-hash algorithm |
| **lyra2h** | Hppcoin | Lyra2 variant |
| **lyra2re** | lyra2 | Lyra2 variant |
| **lyra2rev2** | lyra2v2 | Lyra2 variant |
| **lyra2rev3** | lyrav2v3 | Lyra2 variant |
| **lyra2z** | N/A | Lyra2 variant |
| **lyra2z330** | Lyra2 330 rows | Lyra2 variant |
| **m7m** | N/A | Multi-hash algorithm |
| **minotaur** | N/A | Multi-hash algorithm |
| **minotaurx** | N/A | Multi-hash algorithm |
| **myr-gr** | Myriad-Groestl | Groestl variant |
| **neoscrypt** | NeoScrypt(128, 2, 1) | Scrypt variant (memory-hard) |
| **nist5** | Nist5 | Multi-hash algorithm |
| **pentablake** | Pentablake | Multi-hash algorithm |
| **phi1612** | phi | Multi-hash algorithm |
| **phi2** | N/A | Multi-hash algorithm |
| **polytimos** | Ninja | Multi-hash algorithm |
| **power2b** | MicroBitcoin (MBC) | Yespower variant |
| **quark** | Quark | Multi-hash algorithm |
| **qubit** | Qubit | Multi-hash algorithm |
| **scrypt** | Litecoin, Dogecoin | Scrypt (memory-hard) |
| **scrypt:N** | N/A | Parameterized Scrypt |
| **scryptn2** | N/A | Scrypt variant |
| **sha256d** | Double SHA-256 | Standard Bitcoin algorithm |
| **sha256dt** | N/A | SHA-256 variant |
| **sha256q** | Quad SHA-256, Pyrite (PYE) | SHA-256 variant |
| **sha256t** | Triple SHA-256, Onecoin (OC) | SHA-256 variant |
| **sha3d** | Double keccak256 (BSHA3) | Keccak variant |
| **sha512256d** | N/A | SHA-512 variant |
| **skein** | Skein+Sha (Skeincoin) | Multi-hash algorithm |
| **skein2** | Double Skein (Woodcoin) | Multi-hash algorithm |
| **sonoa** | Sono | Multi-hash algorithm |
| **timetravel** | Machinecoin (MAC) | Multi-hash algorithm |
| **timetravel10** | Bitcore | Multi-hash algorithm |
| **tribus** | Denarius (DNR) | Multi-hash algorithm |
| **vanilla** | blake256r8vnl (VCash) | Blake variant |
| **veltor** | VLT | Multi-hash algorithm |
| **verthash** | Vertcoin (VTC) | Memory-hard, Verthash variant |
| **whirlpool** | N/A | Multi-hash algorithm |
| **whirlpoolx** | N/A | Multi-hash algorithm |
| **x11** | Dash | Chained algorithm (11 hashes) |
| **x11evo** | Revolvercoin | X11 variant |
| **x11gost** | sib (SibCoin) | X11 variant |
| **x12** | Galaxie Cash (GCH) | Chained algorithm (12 hashes) |
| **x13** | X13 | Chained algorithm (13 hashes) |
| **x13bcd** | bcd | X13 variant |
| **x13sm3** | hsr (Hshare) | X13 variant |
| **x14** | X14 | Chained algorithm (14 hashes) |
| **x15** | X15 | Chained algorithm (15 hashes) |
| **x16r** | N/A | Chained algorithm (16 hashes, randomized) |
| **x16rv2** | Ravencoin (RVN) | X16R variant |
| **x16rt** | Gincoin (GIN) | X16R variant |
| **x16rt-veil** | Veil (VEIL) | X16R variant |
| **x16s** | Pigeoncoin (PGN) | X16R variant |
| **x17** | N/A | Chained algorithm (17 hashes) |
| **x20r** | N/A | Chained algorithm (20 hashes, randomized) |
| **x21s** | N/A | Chained algorithm (21 hashes) |
| **x22i** | N/A | Chained algorithm (22 hashes) |
| **x25x** | N/A | Chained algorithm (25 hashes) |
| **xevan** | Bitsend (BSD) | Multi-hash algorithm |
| **yescrypt** | Globalboost-Y (BSTY) | Yescrypt variant (memory-hard) |
| **yescryptr8** | BitZeny (ZNY) | Yescrypt variant |
| **yescryptr8g** | Koto (KOTO) | Yescrypt variant |
| **yescryptr16** | Eli | Yescrypt variant |
| **yescryptr32** | WAVI | Yescrypt variant |
| **yespower** | Cryply | Yespower variant (memory-hard) |
| **yespowerr16** | Yenten (YTN) | Yespower variant |
| **yespower-b2b** | N/A | Yespower variant |
| **zr5** | Ziftr | Multi-hash algorithm |
## Parameterized Algorithms
In addition to the explicitly named algorithms, `cpuminer-opt` offers support for variations of the **Scrypt**, **Yescrypt**, and **Yespower** families by allowing the user to specify parameters such as the memory cost parameter (`-N`), the block size parameter (`-R`), and a key string (`-K`). This flexibility allows the miner to support many coins that use a custom configuration of these base algorithms.
The table below provides examples of coins that use parameterized versions of these base algorithms, which are mined by passing specific arguments to the miner:
| Algorithm Name | Parameters | Associated Coin(s) |
| :— | :— | :— |
| **cpupower** | `–algo yespower –param-key “CPUpower: The number of CPU working or available for proof-of-work mining”` | CPUpower |
| **sugarchain** | `–algo yespower –param-key “Satoshi Nakamoto 31/Oct/2008 Proof-of-work is essentially one-CPU-one-vote”` | Sugarchain |
| **yespowerlitb** | `–algo yespower –param-key “LITBpower: The number of LITB working or available for proof-of-work mini”` | LITB |
| **yespoweric** | `–algo yespower –param-key “IsotopeC”` | IsotopeC |
| **yespowerurx** | `–algo yespower –param-key “UraniumX”` | UraniumX |
| **yespoweradvc** | `–algo yespower –param-key “Let the quest begin”` | Advcash |
| **yespowerltncg** | `–algo yespower –param-r 32 –param-key “LTNCGYES”` | LTNCG |
| **yespowertide** | `–algo yespower –param-r 8` | Tide |
***
## References
[1] Supported Algorithms. *JayDDee/cpuminer-opt Wiki*. (Source for the comprehensive list of supported algorithms)
