This invention relates to cryptographic communications methods and systems
that protect a server from a connection depletion attack. Specifically,
the invention presents a method for allocating a resource comprising the
steps of receiving a resource allocation request from a client, imposing
a computational task and a time limit for correct completion of the task
upon the client, verifying that the task was performed correctly within
the time limit, and allocating the resource if the task was correctly
performed within the time limit.