X 13

The X 13 algorithm uses 13 sides of hashing taken into use with 13 kind of hash functions which include big names such as cubehash, luffa, skein, keccak, jh, groestl, bmw, and blake. By this process the X 13 algorithm becomes one of the safest algorithm for the purpose of cryptography. It has got sufficient flexibility making its alliance of selection of the hash functions which are further to be chosen. In the world of modern cryptography the X 13 algorithm is taken in as the most innovative approaches for the mining of crypto currency. By all standards, the X 13 algorithm is considered to be safer and cryptographically intricate as in comparison of SHA 256 algorithm which is deployed in the crypto currency Bitcoin.

Contact With Us

Please fill in the form below and we will contact you within 24 hours.

  • Hashgains

Emission Model Of X 13 Algorithm

Proof of work is done in every 240 seconds which is set as the target of the block which means that 15 blocks per every 60 minutes are produced. To say in a day of 24 hours - 360 blocks are produced.

Every block in the starting is made up of 8 nodes. The payout keeps on halving with every year in progression.

The POS generation comes at 10% in the first year; 5% for the next year and shall remain constant at 1% for all subsequent years.

Network Model

The crypto currency is running over the platform of X 13 algorithm such as DeepOnion which works out by sending the DeL traffic through the TOR (The Onion Network) network causing it to be doubly secured via the anonymous methodology for the transactions. The crypto currencies’ clients operate using a permanent TOR address which way is of the address of The DeepOnion which itself is a kind of identity proof for the cryptographic analysis happening within the service. It also protects the spoofing and hacking attacks.


Cryptocurrencies Which Use X 13 Algorithm For Their Code Execution

This is the list of crypto currencies which use X 13 algorithm for their proof of work: