The document discusses elliptic curves in cryptography. It introduces elliptic curves, elliptic curve addition and multiplication, and how they can be used in public key cryptography. It describes elliptic curve Diffie-Hellman key exchange, where two parties establish a shared secret key over an elliptic curve. It also discusses how isogenies, which are rational maps between elliptic curves, can be used in post-quantum cryptographic protocols like the supersingular isogeny Diffie-Hellman key exchange. This protocol allows secure key exchange that is conjectured to be secure against both quantum and classical computers.