Verification of Cryptographic Schemes in the Computational Model