Elliptic curve cryptography makes it very easy to check if a curve point is valid. If it’s on the curve, and is not a low order point, then it’s valid. An extra check that it is canonical might be needed, but that’s also easy.
On the other hand, post-quantum cryptosystems generally don’t allow validating inputs without the secret key. This gives rise to a wide variety of chosen-ciphertext assisted side channel attacks, which can leak the whole secret key. This makes implementations on devices like smart cards much harder.
Why do post-quantum cryptosystems generally have this unfortunate property? I know that CSIDH does not have this problem, and that one can avoid it for other systems using a zero-knowledge proof. But I have yet to see those deployed.
