Results 181 to 190 of about 1,030,100 (373)
ABSTRACT In this work, we introduce a trifluoromethoxy (OCF3) group as a pseudo‐halogen terminal group design for non‐fullerene acceptors, which combines strong inductive electron‐withdrawing ability with moderate resonance donation. The as‐synthesized BTP‐OCF3, when benchmarked against its methoxy analogue BTP‐OCH3, demonstrates narrowed bandgap ...
Chunliang Li +16 more
wiley +1 more source
Enabling Power Systems With SQKD in Presence of Remote Nodes
Semi-quantum key distribution (SQKD) can be applied in power systems to share unconditionally secure keys between the power substations and the local controllers.
Mariam Gado, Muhammad Ismail
doaj +1 more source
Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis [PDF]
E.O. Samsonov +5 more
openalex +1 more source
Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee +7 more
wiley +1 more source
Fast Implementation of Privacy Amplification in Continuous-Variable Quantum Key Distribution [PDF]
Jinpeng He, Xiangyu Wang, Song Yu
openalex +1 more source
Molten KNO2 treatment induces a lowrefractive index disordered carbon shell on fluorescent nanodiamonds, enhancing fluorescence emission while preserving spin coherence. Machine learningassisted correlative TEMPL enables direct single‐particle resolution of this enhancement relative to air‐oxidized nanodiamonds of similar morphology, establishing a ...
Parkarsh Kumar +10 more
wiley +1 more source
Quantum vs post‐quantum security for future networks: Survey
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj +1 more source
Quantum key distribution with finite resources: Secret key rates via Rényi entropies [PDF]
Silvestre Abruzzo +3 more
openalex +1 more source
Two pyridinium‐based ionic liquid templated hybrid manganese halides, (C4Py)2[MnCl4] and (C4Py)2[MnBr4], display similar bulk structures but show significantly different photoluminescence behaviors due to the bromine heavy‐atom effect. Their stable local Mn environments remain intact even in the molten state, allowing applications such as luminescence ...
Biswajit Bhattacharyya +22 more
wiley +1 more source

