ASIC Proof POW Algorithm

ASIC Proof POW Algorithm

Introduction Yes, I said it…not ASIC resistant, ASIC proof. Current cryptocurrency proof of work algorithms have gone to great lengths to be “ASIC resistant” using various techniques generally involving memory capacity hardness, memory bandwidth hardness or general...