In the context of developing a cryptographic protocol resilient against quantum computing attacks, SHA-3 is the most appropriate choice. Here's why: * Quantum Computing Threats: Quantum computers can potentially break current cryptographic methods like RSA and ECC due to Shor's algorithm. Traditional hash functions like SHA-256 might not offer sufficient security in a post-quantum world. * SHA-3 Overview: SHA-3, part of the Secure Hash Algorithm family, was designed with quantum resistance in mind. It was selected through an open competition by NIST, ensuring it incorporates advanced cryptographic techniques. * Resilience: SHA-3's design is fundamentally different from SHA-2, providing enhanced security properties, including resistance to various attack vectors that might be feasible with quantum computing advancements. References: * NIST SHA-3 Standard:NIST FIPS PUB 202 * Research on quantum-resistant cryptography:IEEE Xplore