1.
Methods for Protection of Key in Private Key Cryptography . IJIRCST [Internet]. 2024 Mar. 4 [cited 2025 Apr. 3];5(2):239-41. Available from: https://journals.acspublisher.com/index.php/ijircst/article/view/13496