Tensority is very much ASIC friendly and works well in mining Bytom coins which also has incorporated chips which accelerate artificial intelligence, thus making the mining more encrypted and favourable. Tensority operates in five steps: which are cache calculation, matrix construction, a series of operations between the matrices, and hash matrix generation, followed by the authentication or validation of the work.