Electron acceptorAn electron acceptor is a chemical entity that accepts electrons transferred to it from another compound. It is an oxidizing agent that, by virtue of its accepting electrons, is itself reduced in the process. Electron acceptors are sometimes mistakenly called electron receptors. The electron accepting power of an acceptor molecule is measured by its electron affinity (A) which is the energy released when filling the lowest unoccupied molecular orbital (LUMO).
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Photovoltaic effectThe photovoltaic effect is the generation of voltage and electric current in a material upon exposure to light. It is a physical and chemical phenomenon. The photovoltaic effect is closely related to the photoelectric effect. For both phenomena, light is absorbed, causing excitation of an electron or other charge carrier to a higher-energy state. The main distinction is that the term photoelectric effect is now usually used when the electron is ejected out of the material (usually into a vacuum) and photovoltaic effect used when the excited charge carrier is still contained within the material.
Thin-film solar cellThin-film solar cells are made by depositing one or more thin layers (thin films or TFs) of photovoltaic material onto a substrate, such as glass, plastic or metal. Thin-film solar cells are typically a few nanometers (nm) to a few microns (μm) thick–much thinner than the wafers used in conventional crystalline silicon (c-Si) based solar cells, which can be up to 200 μm thick. Thin-film solar cells are commercially used in several technologies, including cadmium telluride (CdTe), copper indium gallium diselenide (CIGS), and amorphous thin-film silicon (a-Si, TF-Si).
Public key fingerprintIn public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer to, they can be used to simplify certain key management tasks. In Microsoft software, "thumbprint" is used instead of "fingerprint." A public key fingerprint is typically created through the following steps: A public key (and optionally some additional data) is encoded into a sequence of bytes.
Energy harvestingEnergy harvesting (EH, also known as power harvesting, energy scavenging, or ambient power) is the process by which energy is derived from external sources (e.g., solar power, thermal energy, wind energy, salinity gradients, and kinetic energy, also known as ambient energy), then stored for use by small, wireless autonomous devices, like those used in wearable electronics, condition monitoring, and wireless sensor networks. Energy harvesters usually provide a very small amount of power for low-energy electronics.
Electron donorIn chemistry, an electron donor is a chemical entity that donates electrons to another compound. It is a reducing agent that, by virtue of its donating electrons, is itself oxidized in the process. Typical reducing agents undergo permanent chemical alteration through covalent or ionic reaction chemistry. This results in the complete and irreversible transfer of one or more electrons. In many chemical circumstances, however, the transfer of electronic charge to an electron acceptor may be only fractional, meaning an electron is not completely transferred, but results in an electron resonance between the donor and acceptor.