so I guess you are referring to Post-Quantum (PQ) algorithms.
This topic is not so much about hashing (SHA3, etc..) or block ciphers (AES, etc..) since both are kinda well understood in a PQ-scenario, and seem to be provable secure (and probably just need to increase the bits, due to Grover's algorithm) but it is about asymmetric cryptography.
When we talk about asymmetric cryptography we basically mean, that you have a public key and a private key, and you can encrypt with one of them, and decrypt with the other. Asymmetric cryptography is also fundamental to signatures.
So quantum safe (or post quantum)-algorithms are mostly concerned about that: asymmetric cryptography.
The main difference to asymmetric crypto which is used these days is the underlying problem of the algorithms. Taking RSA for example, the hardness comes from the problem, that it is hard to find the prime factors of a large enough number. However with a quantum computer this problem could be solved in polynomial time with Shor's algorithm and thus would be broken. Shor's algorithm could also be used to solve the discrete logarithm problem, which also plays an important role in today's modern cryptography.
These quantum safe algorithms you are talking about try to utilize different underlying problems (based on lattices, codes, ...) where no algorithm from a quantum (and non quantum) computer which can solve them is known yet.
Currently there is a
NIST PQ Competition going, which tries to find and standardize such algorithms. There are several papers and presentations about that topic, in case you want to dig deeper.
Edit:
Maarten Bodewes pointed out Tanja Lange's videos about the underlying problems in PQ-Cryptography, which I will link here.