Second-harmonic generationSecond-harmonic generation (SHG, also called frequency doubling) is a nonlinear optical process in which two photons with the same frequency interact with a nonlinear material, are "combined", and generate a new photon with twice the energy of the initial photons (equivalently, twice the frequency and half the wavelength), that conserves the coherence of the excitation. It is a special case of sum-frequency generation (2 photons), and more generally of harmonic generation.
High harmonic generationHigh harmonic generation (HHG) is a non-linear process during which a target (gas, plasma, solid or liquid sample) is illuminated by an intense laser pulse. Under such conditions, the sample will emit the high harmonics of the generation beam (above the fifth harmonic). Due to the coherent nature of the process, high harmonics generation is a prerequisite of attosecond physics. Perturbative harmonic generation is a process whereby laser light of frequency ω and photon energy ħω can be used to generate new frequencies of light.
Nonlinear opticsNonlinear optics (NLO) is the branch of optics that describes the behaviour of light in nonlinear media, that is, media in which the polarization density P responds non-linearly to the electric field E of the light. The non-linearity is typically observed only at very high light intensities (when the electric field of the light is >108 V/m and thus comparable to the atomic electric field of ~1011 V/m) such as those provided by lasers. Above the Schwinger limit, the vacuum itself is expected to become nonlinear.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
NanoparticleA nanoparticle or ultrafine particle is usually defined as a particle of matter that is between 1 and 100 nanometres (nm) in diameter. The term is sometimes used for larger particles, up to 500 nm, or fibers and tubes that are less than 100 nm in only two directions. At the lowest range, metal particles smaller than 1 nm are usually called atom clusters instead.
Physical attractivenessPhysical attractiveness is the degree to which a person's physical features are considered aesthetically pleasing or beautiful. The term often implies sexual attractiveness or desirability, but can also be distinct from either. There are many factors which influence one person's attraction to another, with physical aspects being one of them. Physical attraction itself includes universal perceptions common to all human cultures such as facial symmetry, sociocultural dependent attributes and personal preferences unique to a particular individual.
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Mode lockingMode locking is a technique in optics by which a laser can be made to produce pulses of light of extremely short duration, on the order of picoseconds (10−12 s) or femtoseconds (10−15 s). A laser operated in this way is sometimes referred to as a femtosecond laser, for example, in modern refractive surgery. The basis of the technique is to induce a fixed phase relationship between the longitudinal modes of the laser's resonant cavity. Constructive interference between these modes can cause the laser light to be produced as a train of pulses.