Comment by namibj
There are post quantum KEMs though that authenticate with a classical mechanism, which limits quantum attacks to interactive from the previous total breakage of recorded ciphertext exchanges (e.g. Wireshark capture at a router encountered in both directions of the traffic flow).
Are there? I’ve advocated for such constructions in the past, but I’ve never seen an actual proposal. Do you have a link?