INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XI, November 2025
6.
Hybrid cryptography and side-channel evaluation: Integrated TSA key exchange with symmetric AES
payload encryption, and evaluate side-channel resistance to ensure resilience in physically accessible
IoT devices.
REFERENCES
1. Abdelaal, M.A., Moustafa, A.I., Kasban, H., Saleh, H., Abdallah, H.A., & Afifi, M.Y.I. (2025).
DNAInspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption Sensors,
2. Aljrees, T., Kumar, A., Singh, T. (2023). Enhancing IoT Security through a Green and Sustainable
Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.
3. Allioui, H., & Mourdi, Y. (2023). Exploring the Full Potentials of IoT for better Financial Growth and
4. Almutairi, M., & Sheldon, F.T. (2025). IoT-Cloud Integration Security: A Survey of Challenges,
5. Bani Yassein, M., Qawasmeh, E., Khamayseh, Y., & Mardini, W. (2017). Comprehensive Study of
Symmetric Key and Asymmetric Key Encryption Algorithms. 2017 10th International Conference on
Information and Communication technology for Embedded Systems (IC-ICTES). IEEE, 10-12 May
6. Bodur, H., & Kara, R. (2015). Secure SMS Encryption Using RSA Encryption Algorithm on Android
Encryption Using RSA Encryption Algorithm on Android Message Application/citation/download.
7. Diko, E., & Ibraimi, M. (2023). RSA & Extended Euclidean Algorithm with Example of Exponential
RSA Ciphers, RSA Example Solution with Extended Euclidean Algorithm. Vision International
8. Elamir, M., Mabrouk, M., & Marzouk, S. (2022). Secure Framework for IoT Technology Based on RSA
and
DNA
Cryptography.
Egyptian
Journal
of
Medical
human
Genetics,
23(1),
46.
9. Emam, A. (2017). Analysis of RSA Digital Signature Key generation using Strong Prime. International
Journal of Computer (IJC), 24(9), 43-49.
10. Koulouras, G., Katsoulis, S., & Zantalis, F. (2025). Evolution of Bluetooth Technology: BLE in the IoT
11. Ma, C. (2024). Exploring RSA Cryptography: Principles and Applications in Image Encryption and
Microcontroller
Security.
Applied
and
Computational
Engineering,
94.203-209.
12. Mehta, J., & Rana, H. (2025). Safest-Value of the Number of Primes in RSA Modulus and an Improved
13. Mondal, S., & Primajaya, A. (2024). The Implementation of RSA Algorithm in Text Messages
Encryption and Decryption. JATI (Jurnal Mahasiswa Teknik Informatika), 8(6), 12620-12624.
14. Nagar, C., Vyas, D., & Malpani, D. (2017). Internet of Things (IoT): A Concept of Combining
Computers, Sensors, and Networks to Monitor and Control Devices.
15. Nguyen, H.P., & Chen, Y. (2024). Lightweight, Post-Quantum Secure Cryptography Based on Ascon:
Hardware
Implementation
in
Automotive
Applications.
Electronics,
13(22),
4550.
16. Patterson, J.C., Buchanan, W.J., & Turino, C. (2025). Energy Consumption Framework and Analysis of
Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), 42.
17. Prakash, B., Srivast, S., Kumar, R., Prajapati, S., & Kaur, G. (2025). A Numerical and Security Analysis
of RSA: From Classical Encryption to Post-Quantum Strategies. Preprint, 10.21203/rs.3.rs-6347614/v1.
18. Radhakrishnan, I., Jadon, S., & Honnavalli, P.B. (2024). Efficiency and Security Evaluation of
Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors, 24(12), 4008.
Page 841