1. Classical cryptography, symmetrical and asymmetrical cryptosystems, mathematical complexity, quantum key distribution. Epsilon-security, authentication, quantum secret growing. 2. Discrete variables, non-cloning theorem, Bell inequalities. 3. Discrete-variable protocols: BB84, E91, modifications, information post-processing. 4. Classical information theory: discrete variables; Security analysis, QBER, individual/collective attacks. 5. Practical implementations: decoy-state, plug-and-play. 6. Practical issues: sources, channels, detectors, quantum hacking. 7. Continuous variables, Gaussian states, coherent-state protocol, squeezed-state protocol, entanglement-based implementation. 8. Classical information theory: continuous variables. Quantum capacity. Security analysis of continuous-variable protocols: individual/collective attacks, extremality of Gaussian states. 9. Practical issues: attenuation, noise, side-channels. 10. Realistic post-processing, finite-size effects.  11. Perspectives: secure quantum computing, quantum networking, repeaters, device-independent security. 
         
         
     | 
    
        
            
                
                - 
                    G. Van Assche. (2006). Quantum Cryptography and Secret-Key Distillation. Cambridge University Press. 
                
 
            
                
                - 
                    Ch. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd. (2012). Gaussian quantum information. 
                
 
            
                
                - 
                    M. Dušek, N. Lütkenhaus, M. Hendrych. (2006). Quantum Cryptography. 
                
 
            
                
                - 
                    M.A. Nielsen, I.L. Chuang. (2000). Quantum Computation and Quantum Information. Cambridge University Press. 
                
 
            
                
                - 
                    N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. (2002). Quantum cryptography. 
                
 
            
                
                - 
                    V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev. (2009). The security of practical quantum key distribution. 
                
 
            
         
         
         
     |