Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.High Level Overview of the class topics;Introduction to post-quantum cryptographyAttacks on DLOG and factoringLattices and related algorithmsLWE and Regev's encryption schemeNTRU and NTRUPrimeCodes and cryptosystemsIsogenies and elliptic curvesMQ problem and its variantsOther candidates for PQCSide-channel attacks and countermeasures