speaker-photo

Engin Zeydan

Tutorial Presenter
CTTC
To be defined

2 November 2025 List of Tutorials

From Theory to Practice: Applying Quantum Key Distribution and Post-Quantum Cryptography for 6G Networks

The tutorial proposal focuses on the convergence of quantum threats in the domain of 6G networks. It aims to provide an in-depth study of this convergence, starting with background information on quantum attacks, post-quantum cryptography, and quantum key distribution. It will then explore its execution to 6G networks and their quantum-based threats. The tutorial will include a step-by-step demonstration of two of the demos to illustrate the practical implementation of these concepts. The tutorial is designed for participants with no prerequisite knowledge and aims to introduce them to the application of post-quantum cryptography and quantum key distribution to protect the 6G networks. As this topic is gaining significance and relevance in the telecommunications industry, the tutorial offers attendees the opportunity to learn about cutting-edge security issues for 6G networks and their specific applications from the cybersecurity perspective.