LyraREv2 ensures the network’s security and integrity by utilizing a variety of cryptographic hashes, such as the Blake, CubeHash, Lyra2, KECCA, BMW, etc. Many computations are carried out by miners using the Lyra2rev2 algorithm with high-performance GPUs or CPUs.

Showing all 3 results