[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: resistance to swamping attacks.
I'm no expert in cryptography, but it seems to me that what is needed is
a function which is expensive for the originator of a packet to
calculate, but cheap for the receiver to verify. This will make sure
that the source of a swamping attack must have a much larger CPU than
the receiver. I don't know if there are any such functions, but perhaps
the cryptographically sophisticated among us could enlighten?
Follow-Ups:
References: