Paul, Bikram2023-01-192023-10-202023-01-192023-10-202023ROLL NO.146102038https://gyan.iitg.ac.in/handle/123456789/2258Supervisor: Trivedi, GauravThe achievements we have made in the field of varied technology have largely fueled modern human growth. Data and digital information based innovations are playing a major role in the accelerated growth. Personal and other important secret data are considered vital asset since historical time and have become prime focus for the current information and digital generation. Various rudimentary data encryption methodologies, such as, Caesar cipher, Scytale cipher, Vigen`ere cipher, Steganography, Enigma machine were introduced in the past. With the invention of digital computers, to introduce greater resilience in security newer symmetric (e.g. DES, AES etc.) and asymmetric (e.g. RSA, ECC etc.) cryptography schemes are formulated in late ′90s, which are acting as the primary protector of data against adversary and unwanted intruders.enHardware SecurityFPGASoC AcceleratorLattice Homomorphic PQCChaos PQCLow Power IoTQuantum ComputingDesign and Implementation of Lattice and Chaos based Post-Quantum Cryptography AlgorithmsThesis