Key Recovery from Decayed Memory Images and Obfuscation of Cryptographic Algorithms