Post-quantum cryptography is rapidly evolving to counter threats posed by quantum computing, and elliptic curves combined with isogeny methodologies offer a promising avenue. This approach leverages ...