Meet Ledger Nano™ Gen5, the most playful signer yet

Discover now

The most playful signer yet

Meet Ledger Nano™ Gen5

Shop now Learn more

ASIC-Resitant

Jan 16, 2026 | Updated Jan 16, 2026
An ASIC-resistant algorithm is a Proof-of-Work design that aims to keep mining accessible by minimizing the advantage of ASIC miners.

What Is ASIC-Resistant?

ASIC-resistant is a term describing a Proof-of-Work mining algorithm designed to prevent the dominance of ASIC (Application-Specific Integrated Circuit) miners. It’s a direct response to the mining centralization seen on networks like Bitcoin, where the high cost and specialization of ASIC miners have pushed out everyday users.

The core goal of ASIC-resistance is to level the playing field for network security. By making it uneconomical to build specialized ASICs, these algorithms allow anyone with consumer-grade hardware, like a CPU or GPU (graphics card), to participate profitably in mining. This helps in decentralizing network security and reducing the risk of a few large entities controlling the network’s hash rate.

How Does ASIC-Resistance Work?

ASIC-resistance works by creating a computational problem that is difficult to specialize in hardware.

One common method is to use a memory-hard algorithm. These algorithms are designed to require a significant amount of RAM (memory) in addition to raw processing power. While an ASIC can be built to perform a specific processing task (like Bitcoin’s SHA-256) with incredible speed, it is very expensive and difficult to build large amounts of fast memory directly onto a custom chip.

General-purpose GPUs, on the other hand, are already designed with high-speed memory to handle complex graphics, making them well-suited for these tasks. This negates the massive efficiency gains an ASIC miner would normally have.

Examples of this approach include Monero’s RandomX algorithm, which is optimized for CPUs, and Ethash, which was used by Ethereum before it transitioned to Proof-of-Stake and was designed to be mined with GPUs.

It’s important to note that ASIC-resistant strategies do not stay effective permanently, as ASICs are constantly evolving to overcome them. For example, the algorithm Scrypt used by Litecoin was originally intended to be memory-hard, but efficient ASICs were eventually developed for it.

To maintain resistance, some projects like Monero have had to perform network upgrades (hard forks) to change their algorithm, intentionally making any new ASICs obsolete.

Fungibility

Fungibility describes the property of an asset whose units of equivalent value are readily interchangeable with one another.

Full definition

Mobile Wallet

A mobile wallet is a built-in feature or software application that can be installed on a smartphone. In crypto, the program stores users’ private keys and allows them to interact with their digital assets.

Full definition

Zero-Knowledge Machine Learning (zkML)

Zero-knowledge machine learning is a cryptographic technique that facilitates the verification of machine learning models on blockchain protocols without disclosing the underlying computations or data.

Full definition

Own your crypto future

Stay informed with security tips, updates, and exclusive offers from Ledger

Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time. Learn more

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.