ReadWhitepaper
Artigos
Stories ▾
All Stories →
Whitepaper Deep Dive Section-by-section whitepaper analysis Origin Story Project founding and publication context Technical Explainer Simplified technical deep dives Impact & Legacy Industry influence and lasting effects Comparison Cross-whitepaper analysis and contrasts
RSS Feed
Figuras
Glossário ▾
All Terms →
Consensus Cryptography Mining Transactions Network Smart Contracts Tokenomics DeFi Scaling Governance Wallets & Keys Stablecoins
Gráfico Buscar
🇺🇸 English English 🇰🇷 한국어 Korean 🇯🇵 日本語 Japanese 🇨🇳 中文简体 Chinese (Simplified) 🇪🇸 Español Spanish 🇧🇷 Português Portuguese 🇮🇳 हिन्दी Hindi 🇸🇦 العربية Arabic 🇫🇷 Français French 🇷🇺 Русский Russian 🇩🇪 Deutsch German 🇹🇷 Türkçe Turkish 🇻🇳 Tiếng Việt Vietnamese 🇮🇩 Bahasa Indonesia Indonesian 🇹🇭 ไทย Thai
Artigos Stories Figuras Glossário Gráfico Buscar
Glossário

Termos relacionados

Block 47 Mining 14 Proof of Work 28 SHA-256 17 State 36 Transaction 74

Categoria

mining

ASIC

ASIC

Mining 4 references

Circuito Integrado Específico de Aplicação, hardware especializado projetado para executar com eficiência uma computação específica (por exemplo, mineração de Bitcoin). Os ASICs podem dominar a mineração PoW para determinados algoritmos.

Aparece em 4 seções de whitepapers

Ethereum logo
$ETH Ethereum
Blockchain and Mining
...et. However, Ethereum's memory-hard mining algorithm (Ethash) is designed to be ASIC-resistant, promoting a more decentralized mining ecosystem. The difficulty adju...
Solana logo
$SOL Solana
Proof of History Sequence
...rged timeline. In practice, the fastest SHA-256 hardware available is commodity ASIC or high-end CPU hardware, and the difference in single-core performance between...
Dogecoin logo
$DOGE Dogecoin
Background
...mputational power, Scrypt was intended to resist the advantage that specialized ASIC (Application-Specific Integrated Circuit) mining hardware held over general-pur...
Bitcoin Cash logo
$BCH Bitcoin Cash
Network Architecture
...SHA-256 proof-of-work algorithm, identical to Bitcoin. This means that the same ASIC mining hardware can be used to mine either chain, and miners can switch between...

Related Stories

Technical Explainer

How Proof-of-Work Mining Actually Works: From Hash Puzzles to Block Rewards

A beginner-friendly explanation of SHA-256 mining, difficulty adjustment, and why Bitcoin uses more electricity than so…

ReadWhitepaper

Leia white papers sobre criptografia em mais de 15 idiomas com tradução lado a lado.

Contente

  • Artigos
  • Stories
  • Figuras
  • Glossário
  • Gráfico
  • Buscar
  • Sobre

Desenvolvedores

  • Documentos da API
  • OpenAPI
  • llms.txt
  • llms-full.txt

Assinatura

  • RSS
  • Atom
  • Stories RSS
  • Sitemap
  • robots.txt

Jurídico

  • Termos
  • Privacidade
© 2026 ReadWhitepaper Construído para a comunidade criptográfica.