Bibliography

References

Smith, A. (2023). *Post-quantum security protocols: A modern review*. Journal of Cryptographic Systems, 45(3), 101-119.

Johnson, L. (2022). *Quantum computing and cryptographic vulnerabilities*. Cybersecurity Monthly, 18(2), 55-64.

National Institute of Standards and Technology. (2023). Post-quantum cryptography project. https://csrc.nist.gov/projects/post-quantum-cryptography

Website Media Reference

Description: AI-generated digital image illustrating quantum key exchange.
Tool: Canva AI Assistant
Date Created: 30-06-2025
URL: https://www.canva.com/ai-assistant/
Attribution: This image was generated using Canva AI Assistant.
Annotation: This visual aids in understanding how quantum algorithms affect modern encryption. It illustrates the process of key exchange, showing how quantum-safe methods differ from classical RSA. The concept is central to the research on PQC. It also reflects how future threats can be visually communicated. It enhances learner engagement on the topic.

Description: AI-generated video simulating a quantum-safe network environment.
Tool: Runway ML
Date Created: 30-06-2025
URL: https://runwayml.com/
Attribution: This video was generated using Runway ML.
Annotation: The video demonstrates a simulated environment under a quantum-safe cryptographic protocol. It visually represents the transition from classical to post-quantum algorithms. This supports the theoretical part of the research paper. It also helps viewers connect abstract cryptographic terms with real-world visuals. The video is effective for educational purposes.