This document summarizes topics related to post-quantum cryptography including how quantum computers work, quantum speed-up algorithms like Shor's algorithm, challenges in building quantum computers, and post-quantum cryptographic algorithms like code-based, lattice-based, multivariate, and hash-based approaches. It notes issues like unclear security levels of new approaches, potential risks if deployment is too late, and implementation issues that could impact security.