This lecture covers the CSIDH algorithm, a post-quantum cryptographic scheme based on isogenies. It discusses the history of shared secret computation, the impact of quantum computing, the inner workings of CSIDH, and its security and performance. The lecture explains how CSIDH works, its theoretical background, and its comparison with other cryptographic schemes.