Showing the single result
Tensority Miners use a certain proof-of-work algorithm for matrices and tensors. Tensority is very much ASIC friendly and works well in mining Bytom coins. It has incorporated chips which accelerate artificial intelligence, thus making the mining more encrypted and favourable.
Tensority operates in five steps: cache calculation, matrix construction, a series of operations between the matrices, and hash matrix generation, followed by the authentication or validation of the work.