<div dir="auto">+10M sent.<br clear="all"><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature">Milad Afshari</div></div></div><div><br></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Wed, Apr 24, 2024 at 16:49 Peter Thomassen <<a href="mailto:peter@desec.io">peter@desec.io</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Dear friends of ATLAS,<br>
<br>
We're conducting a research project [1] involving ATLAS measurements with multiple PQC signing implementations (Falcon, XMSS, Dilithium, Sphincs+) to see how many clients choke, in various scenarios, depending on the response packet properties that come with such responses. The idea is to help inform how good or bad the situation is, and which aspects need further research.<br>
<br>
We'd like to do a very comprehensive measurement, and expect our measurements to use around 25M credits total. (We currently have 3M.)<br>
<br>
If anyone is willing to donate the missing amount to this project, that would be very much appreciated!<br>
<br>
My RIPE account is <a href="mailto:peter@desec.io" target="_blank">peter@desec.io</a>. Thank you very much for considering and your generosity!<br>
<br>
Best,<br>
Peter<br>
<br>
[1]: <a href="https://nlnet.nl/project/PQ-DNSSEC-Testbench/" rel="noreferrer" target="_blank">https://nlnet.nl/project/PQ-DNSSEC-Testbench/</a><br>
<br>
-- <br>
<a href="https://desec.io/" rel="noreferrer" target="_blank">https://desec.io/</a><br>
<br>
-- <br>
ripe-atlas mailing list<br>
<a href="mailto:ripe-atlas@ripe.net" target="_blank">ripe-atlas@ripe.net</a><br>
<a href="https://mailman.ripe.net/" rel="noreferrer" target="_blank">https://mailman.ripe.net/</a><br>
</blockquote></div></div>