This website uses cookies for functionality, analytics and advertising purposes as described in our Privacy Policy. If you agree to our use of cookies, please continue to use our site.
Typically used within the crypto world to describe the proof-of-work protocols that aim to prevent the use of ASICs for mining. Typically, this is achieved by making certain adjustments such that a ASIC will not have any competitive advantage over consumer hardware, or through inclusion of many various algorithm that makes it difficult for ASICs to have an edge against regular hardware.
The aim of ASIC resistant algorithms are usually to avoid the centralization of mining in that typically happens as ASIC machines.