“Methods for Protection of Key in Private Key Cryptography ” (2024) International Journal of Innovative Research in Computer Science & Technology, 5(2), pp. 239–241. Available at: https://acspublisher.com/journals/index.php/ijircst/article/view/13496 (Accessed: 28 November 2024).