Proof techniques for cryptographic processes | IEEE Conference Publication | IEEE Xplore