Security;Polynomials;Computers;Register Transfer Level;Encapsulation;Cryptography;NIST;Decoding;Field Programmable Gate Arrays;Engines;Hardware Security;Post-Quantum Cryptography;Code-Based Cryptography;Key Establishment Mechanism