Proof Techniques for Cryptographic Processes