Table of Contents 1. Introduction 2. Elements of Quantum Information Theory 3. Introducing Quantum Key Distribution 4. Quantum Conference Key Agreement 5. Quantum Key Distribution with Imperfect Devices 6. Beyond Point-to-Point Quantum Key Distribution 7. Device-Independent Quantum Cryptography 8. Conclusion and Outlook