XMRig支持的挖矿算法
https://xmrig.com/docs/algorithms
Algorithms
Algorithm can be defined in 3 ways:
- By pool, using algorithm negotiation, in this case no need specify algorithm on miner side.
- Per pool
coin
option, currently only usable values for this option ismonero
,arqma
anddero
. - Per pool
algo
option.
coin
useful for pools without algorithm negotiation support or daemon to allow automatically switch algorithm in next hard fork. If you use xmrig-proxy don't need specify algorithm on miner side.
Algorithm names 31
Name | Memory |
---|
Version | Description | Notes | ||
---|---|---|---|---|
gr | - | 6.16.0+ | GhostRider (Raptoreum) | CPU only, not supported by xmrig-proxy |
rx/graft | 2 MB | 6.15.0+ | RandomGRAFT | |
cn/upx2 | 128 KB | 6.12.0+ | CryptoNight-Femto (variant of CryptoNight V2 for Uplexa). | |
argon2/chukwav2 | 1 MB | 6.4.0+ | Argon2id (Chukwa v2). | CPU only |
cn/ccx | 2 MB | 6.2.0+ | Conceal (CCX) | |
kawpow | - | 6.0.0+ | KawPow (Ravencoin) | GPU only, not supported by xmrig-proxy |
rx/keva | 1 MB | 5.9.0+ | RandomKEVA (RandomX variant for Keva). | |
cn-pico/tlo | 256 KB | 5.5.0+ | CryptoNight-Pico (Talleo). | |
rx/sfx | 2 MB | 5.4.0+ | RandomSFX (RandomX variant for Safex). | |
rx/arq | 256 KB | 4.3.0+ | RandomARQ (RandomX variant for ArQmA). | |
rx/0 | 2 MB | 3.2.0+ | RandomX (Monero). | |
argon2/chukwa | 512 KB | 3.1.0+ | Argon2id (Chukwa). | CPU only |
argon2/ninja | 256 KB | 3.1.0+ | Argon2id (NINJA) | CPU only |
rx/wow | 1 MB | 3.0.0+ | RandomWOW (RandomX variant for Wownero). | |
cn/fast | 2 MB | 3.0.0+ | CryptoNight variant 1 with half iterations. | |
cn/rwz | 2 MB | 2.14.0+ | CryptoNight variant 2 with 3/4 iterations and reversed shuffle operation. | |
cn/zls | 2 MB | 2.14.0+ | CryptoNight variant 2 with 3/4 iterations. | |
cn/double | 2 MB | 2.14.0+ | CryptoNight variant 2 with double iterations. | |
cn/r | 2 MB | 2.13.0+ | CryptoNightR (Monero's variant 4). | |
cn-pico | 256 KB | 2.10.0+ | CryptoNight-Pico. | |
cn/half | 2 MB | 2.9.0+ | CryptoNight variant 2 with half iterations. | |
cn/2 | 2 MB | 2.8.0+ | CryptoNight variant 2. | |
cn/xao | 2 MB | 2.6.4+ | CryptoNight variant 0 (modified). | |
cn/rto | 2 MB | 2.6.4+ | CryptoNight variant 1 (modified). | |
cn-heavy/tube | 4 MB | 2.6.4+ | CryptoNight-Heavy (modified). | |
cn-heavy/xhv | 4 MB | 2.6.3+ | CryptoNight-Heavy (modified). | |
cn-heavy/0 | 4 MB | 2.6.0+ | CryptoNight-Heavy. | |
cn/1 | 2 MB | 2.5.0+ | CryptoNight variant 1. | |
cn-lite/1 | 1 MB | 2.5.0+ | CryptoNight-Lite variant 1. | |
cn-lite/0 | 1 MB | 0.8.0+ | CryptoNight-Lite variant 0. | |
cn/0 | 2 MB | 0.5.0+ | CryptoNight (original). |
Alternative algorithm names (aliases) can be found in source code.
标签:
安全分析
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 全程不用写代码,我用AI程序员写了一个飞机大战
· MongoDB 8.0这个新功能碉堡了,比商业数据库还牛
· 记一次.NET内存居高不下排查解决与启示
· 白话解读 Dapr 1.15:你的「微服务管家」又秀新绝活了
· DeepSeek 开源周回顾「GitHub 热点速览」
2019-07-17 RBF神经网络——直接看公式,本质上就是非线性变换后的线性变化(RBF神经网络的思想是将低维空间非线性不可分问题转换成高维空间线性可分问题)
2019-07-17 如何利用AI识别未知——加入未知类(不太靠谱),检测待识别数据和已知样本数据的匹配程度(例如使用CNN降维,再用knn类似距离来实现),将问题转化为特征搜索问题而非决策问题,使用HTM算法(记忆+模式匹配预测就是智能),GAN异常检测,RBF
2018-07-17 暴力破解研究论文
2018-07-17 利用ModSecurity防御暴力破解
2018-07-17 IRC BOT原来是利用IRC下发C&C命令——在xx云环境遇到了,恶意软件开的是6666端口
2018-07-17 暴力破解字典列表
2018-07-17 暴力破解攻击工具汇总——字典很关键,肉鸡也关键