Market Cap: $2.53T 0.27% 24h Vol: $171.12B 14.10% BTC Dom: 56.27% 0.05%

All Scrypt-N cryptocurrencies

Browse all cryptocurrencies using Scrypt-N with live prices, market cap, and trading volume.
# Coin Ticker Price 24h % Market Cap Volume (24h)

What is Scrypt-N?

Scrypt-N (also known as Scrypt-Adaptive-N or Scrypt-Jane) is an evolution of the original Scrypt hashing algorithm that introduces an automatically increasing memory requirement over time. While standard Scrypt uses a fixed memory parameter (N), Scrypt-N implements a schedule where the N parameter doubles at predetermined block heights or time intervals. This means the algorithm progressively demands more RAM for mining as the blockchain ages, starting from a manageable memory footprint and scaling upward according to a pre-programmed schedule embedded in the protocol rules.

The adaptive N-factor is the key innovation that distinguishes Scrypt-N from regular Scrypt. By continuously increasing memory requirements, the algorithm creates a moving target for ASIC manufacturers — any ASIC designed for the current N-factor will become obsolete when N increases, as the chip would lack sufficient memory to mine efficiently. This provides a longer-lasting form of ASIC resistance compared to fixed-parameter algorithms. The trade-off is that mining hardware requirements also increase for legitimate miners over time, potentially reducing the pool of participants who can mine effectively. The underlying cryptographic security relies on the same Scrypt primitives (Salsa20 core, PBKDF2-SHA256), which have been well-studied and are considered secure.

Scrypt-N was popularized through its implementation in the Scrypt-Jane library and was first notably adopted by Vertcoin in 2014, which used it as part of its strong anti-ASIC philosophy before later switching to Lyra2RE. Other early adopters included ExeCoin and GPUcoin. The concept of adaptive difficulty parameters influenced the broader design philosophy of ASIC-resistant algorithms, demonstrating that time-varying parameters could be an effective strategy against hardware centralization. While Scrypt-N itself has seen declining adoption as newer ASIC-resistant algorithms like RandomX and ProgPoW have emerged, its core insight — that mining parameters should evolve over time — remains influential in the ongoing debate about mining decentralization.

Advertise

Are you looking to advertise? We offer press release publications, display banners, featured listings and more.

Contact us for questions, submit a PR or request our media kit.