Retargeted with every block
Maxcoins transaction security has been upgraded with next-generation, Keccak SHA-3 algorithm for Proof of Work. Whilst SHA-2 was designed and developed closed-door by the NSA, Keccak was subject t...
“Proof for the SHA3 Claim that 256 bit security is “POST-QUANTUM SUFFICIENT”? What security do Cryptographic Sponges offer against generic quantum attacks? Quantum Attac...
Maxcoin addresses use Schnorr for signing algorithm allowing exciting developments such as “native multisig” to be used, and an upgraded cryptographic field for key generation and an increase in pe...
Schnorr Signing Algorithm
Maxcoin Philosophy & Principles