lt;pgt;Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.lt;/pgt;lt;pgt;Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.lt;/pgt;lt;pgt;Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.lt;/pgt;lt;pgt;High Level Overview of the class topics;lt;/pgt;lt;ulgt;lt;ligt;Introduction to post-quantum cryptographylt;/ligt;lt;ligt;Attacks on DLOG and factoringlt;/ligt;lt;ligt;Lattices and related algorithmslt;/ligt;lt;ligt;LWE and Regevamp;#39;s encryption schemelt;/ligt;lt;ligt;NTRU and NTRUPrimelt;/ligt;lt;ligt;Codes and cryptosystemslt;/ligt;lt;ligt;Isogenies and elliptic curveslt;/ligt;lt;ligt;MQ problem and its variantslt;/ligt;lt;ligt;Other candidates for PQClt;/ligt;lt;ligt;Side-channel attacks and countermeasureslt;/ligt;lt;/ulgt;